Security for the Cloud: Data Integrity, Data Resilience and Data Security

Data Integrity, Data Resilience and Data Security

Given the recent rise in popularity of cloud-based solutions, it is not surprising that there is a concern in the minds of many people regarding the security of their data.

This is safeguarding the data against:

  • Unauthorized access
  • Data corruption or loss
  • Hardware failure

In reality, you will use much of the same precautions for cloud-based solutions as you would for a solution running in a corporate datacentre.

Data Integrity



When you are running an application on a server, you normally configure a suitable backup routine so that it is safe in the event of a data-loss incident. It does not matter if this is a corrupt entry in a database file, deletion of user data or even a more disastrous data loss due to a fire or theft.  Usually, the data will backup to portable media on a regular basis which will then be stored in an off-site location.

If you migrate an application to a cloud-based provider, it is important to consider how to backup the data. This can be to traditional backup media which will need storing off-site, or you can take advantage of the physically-diverse locations to store the backups in a completely different place. Your backup schedule and how long backups are kept will be a trade-off between the critical of the data and any legislative requirements against the associated costs.

Another important aspect to consider is the testing of the backup process. For an important system, you should aim to run a disaster recovery test on a regular basis. For this, you should aim to restore a fully working copy of your system from a recent backup. Luckily with a cloud solution, this process can occur a lot quicker than it would in a traditional datacentre environment.

Data Resilience

For a local system, you might look into using multiple resilient servers configured as part of a cluster. With modern clustering technology these can be locating in physically diverse datacentres. If you lose a server, or even a datacentre, the entire system will fail over to the other servers and the users will hardly notice a thing.

With a cloud-based application, this resilience is automatically built-in. By hosting your application on the cloud it is completely unaffected by the loss of a physical device or location.

Data Security

Data security is a hot-topic at the moment. Any unauthorized access can result in embarrassment for your business and even loss of money though theft. As always when it comes to security, limit access only to those people that specifically need access to the data or application. One of the worst mistakes that you can make is to relax access to your data and allow too many people in. It is also good practice to check the access on a regular basis and remove any users who no longer need access to the data.

You should always check with your hosting company that their servers and applications have a regular patch schedule to ensure that any discovered security flaws in the software are fixed. This is particularly important when your application runs on a Windows platform.

Even with the best policies and technical experts, there are still security holes that can slip through the gap. A regular security audit and penetration test will help to find and fill any of these holes, before the hackers do.

The principles behind data security in a cloud-based environment are no different from any other kind of hosting. Make sure that you set up you procedures correctly from the outset and perform regular audits of these procedures and will have covered yourself as much as you possible can.

Image Source: Evron

By Dave Schofield

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom Journey Science, being derived from connected data from different customer activities, has become pivotal for the telecommunications industry, providing the means to drastically improve the customer experience and retention. It has the ability to link together scattered pieces of data, and enhance a telco business’s objectives. Siloed approaches are becoming obsolete…

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the bidding of shadowy hackers. When you can’t access Netflix anymore,…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…