Security for the Cloud: Data Integrity, Data Resilience and Data Security

Data Integrity, Data Resilience and Data Security

Given the recent rise in popularity of cloud-based solutions, it is not surprising that there is a concern in the minds of many people regarding the security of their data.

This is safeguarding the data against:

  • Unauthorized access
  • Data corruption or loss
  • Hardware failure

In reality, you will use much of the same precautions for cloud-based solutions as you would for a solution running in a corporate datacentre.

Data Integrity



When you are running an application on a server, you normally configure a suitable backup routine so that it is safe in the event of a data-loss incident. It does not matter if this is a corrupt entry in a database file, deletion of user data or even a more disastrous data loss due to a fire or theft.  Usually, the data will backup to portable media on a regular basis which will then be stored in an off-site location.

If you migrate an application to a cloud-based provider, it is important to consider how to backup the data. This can be to traditional backup media which will need storing off-site, or you can take advantage of the physically-diverse locations to store the backups in a completely different place. Your backup schedule and how long backups are kept will be a trade-off between the critical of the data and any legislative requirements against the associated costs.

Another important aspect to consider is the testing of the backup process. For an important system, you should aim to run a disaster recovery test on a regular basis. For this, you should aim to restore a fully working copy of your system from a recent backup. Luckily with a cloud solution, this process can occur a lot quicker than it would in a traditional datacentre environment.

Data Resilience

For a local system, you might look into using multiple resilient servers configured as part of a cluster. With modern clustering technology these can be locating in physically diverse datacentres. If you lose a server, or even a datacentre, the entire system will fail over to the other servers and the users will hardly notice a thing.

With a cloud-based application, this resilience is automatically built-in. By hosting your application on the cloud it is completely unaffected by the loss of a physical device or location.

Data Security

Data security is a hot-topic at the moment. Any unauthorized access can result in embarrassment for your business and even loss of money though theft. As always when it comes to security, limit access only to those people that specifically need access to the data or application. One of the worst mistakes that you can make is to relax access to your data and allow too many people in. It is also good practice to check the access on a regular basis and remove any users who no longer need access to the data.

You should always check with your hosting company that their servers and applications have a regular patch schedule to ensure that any discovered security flaws in the software are fixed. This is particularly important when your application runs on a Windows platform.

Even with the best policies and technical experts, there are still security holes that can slip through the gap. A regular security audit and penetration test will help to find and fill any of these holes, before the hackers do.

The principles behind data security in a cloud-based environment are no different from any other kind of hosting. Make sure that you set up you procedures correctly from the outset and perform regular audits of these procedures and will have covered yourself as much as you possible can.

Image Source: Evron

By Dave Schofield

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Are You SURE You Are Ready For The Cloud?: Security of Business

Are You SURE You Are Ready For The Cloud?: Security of Business

Cloud Business Security Last month I went into the financial side of moving to the cloud. This month I am going to focus on the other main reason I have seen customers migrate to the cloud: Security of business. When I say security, I do not mean username and passwords, but a stability of the environment…

DRaaS: Can Make Providers Life Easier

DRaaS: Can Make Providers Life Easier

DRaaS Planning Earlier in Part 1 this week we’ve touched on “What Is DRaaS?”. Now we will explore this a little further.  Disaster recovery situations are always high pressure, stressful affairs which require cool heads and excellent planning. What can service providers of DRaaS to do to make life easier for their customers and to…

From Illusion To Reality: Up Personal On Cloud Computing Privacy

From Illusion To Reality: Up Personal On Cloud Computing Privacy

Cloud Computing Privacy We are under an illusion around the cloud computing. Without a doubt the benefits are incredible. However, cloud impacts personal user privacy and potentially exposes their private data in ways they may not have anticipated. Given that users don’t usually read the terms of service and privacy policies, it is unclear how…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

The Rise of Fintech and the End of Traditional Banking

The Rise of Fintech and the End of Traditional Banking

The Rise of Fintech Developments in financial technology, or fintech, are changing the way we make payments, with new products gradually transforming how personal and commercial transactions are processed. The pace of these developments has opened up a whole range of opportunities for fintech start-ups and new players; but the arrival of cutting-edge technology has…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor