Keeping Your Data And Applications Secure On The Cloud

Keeping Your Data And Applications Secure On The Cloud

When you have all your data and applications permanently stored within your enterprise, you can get away with big security holes and poor data management practices without a serious external threat. However, once your applications and data move to the cloud, your margin for error becomes much smaller. Confidential enterprise data could be traveling all over the public Internet, enabling your employees to work anywhere, anytime, while at the same time exposing data to malicious eyes.  In this post, I will cover some of the things your organization needs to get right to prevent unauthorized access.

Mind the channel

If you are on a public network with an unprotected Wi-Fi connection (such as in an airport or a coffee shop), avoid accessing confidential corporate data. An attack could range from a low-tech physical eavesdropping of your screen to a more high-tech capturing of your data in the channel. Make sure your channel is authenticated and encrypted with protocols such as IPSec,TLS/SSL, SSH and systems such as VPN. If you are sending critical data in plain text, you are inviting trouble.

Implement well-designed user access control

Properly planned user access control is needed for all your data and applications. Employees must be able to access only data they have a need to access. Also mind the flow of information outside the security perimeter. For instance, you must never allow your sales people to export all the CRM data to an excel sheet that they could easily take with them when they leave the company. Always make sure that data access happens through your security interfaces and very few bulk export options are allowed for regular security privileges.

Compartmentalize/segregate data

In 2009, Twitter had a bad security breach that made all the internal discussions and confidential business data public and threatened the future of the young network. The hacker gained access to a single compromised personal Gmail account of an employee and was able to successfully access spreadsheets and documents on Google docs that contained all the corporate information.

Although Google was not at fault in this case, it shows how easy it was for the hacker to access all the corporate information after gaining access to one account. Audit your data storage systems and make sure they are compartmentalized enough to avoid cascading security failures. Classify the information based on the security level and implement high-level security for the most confidential information. Thus, a breach of a low-security account should not expose the data in a high-security account.

Educate your employees

No amount of secure protocols will help if your employees are not trained in security best practices. Mandate them to have strong passwords that are periodically changed. Educate them to never send the passwords as plain text through SMS, email, etc. (you would be surprised by how many employees in tech companies break this basic rule). All the data must be properly encrypted, and the keys must be recycled carefully.

By Balaji Viswanathan

Balaji

Balaji Viswanathan is the founder of Agni Innovation Labs that helps startups and small businesses with their marketing and tech strategy. He has a Masters in Computer Science from the University of Maryland and has been blogging for the past 7 years on technology and business related topics.

5 Responses to Keeping Your Data And Applications Secure On The Cloud

    •  @m_raoul Ideally the systems have to be set in a way the employees don’t need to exchange the passwords. However if passwords indeed have to be shared (such as during account creation), you can do one of the following:
      1. Set a temporary password that needs to be changed immediately upon receipt
      2. Encrypt the password before sending (Outlook has this support)

  1. Third-party audit and certification is another measure a Cloud Vendor can take to further complement its security architecture. It also ensures end users that an external organization has validated the security mechanism of this vendor unbiased and they can be assured that their data will remain secured with their infrastructure.

  2. Nice article. Thanks Balaji for taking pain in compiling data protection steps. I would like to add some more points here, which are also important.
    Secure Computing Architecture- For enterprises, it is crucial to implement secure computing architecture when dealing with personal data. As such, there should be some policies in place for securing the data.
    Privacy Impact Assessment- The assessment is to identify what and how personal data is collected, stored, used and disclosed. It will then help analyzing the possible privacy impacts of the cloud computing solution.
    Transferring personal data to third party provider- Third party provider should have security measures in place to safeguard user data and to minimize the impact on privacy of personal data. The provider must keep personal data effectively secure against unauthorized access and conduct.

  3. Nice article. Thanks Balaji for taking pain in compiling data protection steps. I would like to add some more points here, which are also important.
    Secure Computing Architecture- For enterprises, it is crucial to implement secure computing architecture when dealing with personal data. As such, there should be some policies in place for securing the data.
    Privacy Impact Assessment- The assessment is to identify what and how personal data is collected, stored, used and disclosed. It will then help analyzing the possible privacy impacts of the cloud computing solution.
    Transferring personal data to third party provider- Third party provider should have security measures in place to safeguard user data and to minimize the impact on privacy of personal data. The provider must keep personal data effectively secure against unauthorized access and conduct.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

What is the 12/12 Program?

This program is designed to better handle the thousands of requests we receive from people looking to submit articles. The 12/12 program is the commitment of 12 articles delivered over a 12-month period.  

Wait! What if I just want to submit one article?

Our popular pay as you go sponsorship program provides the flexibility to submit as you wish and is designed for all budgets.

Contributors

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

What Ever Happened To Google Glass?

What Ever Happened To Google Glass?

What Ever Happened to Google Glass? It was supposed to be the next big thing in tech so where did it go? Last year you could not go anywhere without hearing about some insane new use for the product and now it seems to have vanished in a plume of smoke. A Lackluster Rollout Back

Posted on by

Big Data

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data in Your Garden Big Data and IoT initiatives are springing up all across the globe, making cities, protesters–and just about everything else–smarter. However, thus far there’s been little attention paid to the interactions between these bizarre technologies and living things other than humans. Biology, that is, human biology is one field where Big

Who Holds the Key to the City: Big Data and City Management

Who Holds the Key to the City: Big Data and City Management

Big Data and City Management Cities like New York, Madrid, and especially Rio de Janeiro are augmented with Big Data-powered initiatives that range from combating crime with predictive analytics (New York & Madrid) to providing real-time data for improved management. Although Big Data is no panacea and is mainly used in conjunction with a greater

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities And Big Data As Anthony Townsend argues in his SMART CITIES, even though the communications industry has changed beyond recognition since its inception, the way we consume power has remained stubbornly anachronistic. The rules of physics are, of course, partially to blame, for making grid networks harder to decentralize, as opposed to communication

Internet of Things

Where’s the Capital of the Internet of Things?

Where’s the Capital of the Internet of Things?

Where’s the Capital? We all know the capitals of fashion are London, New York and Paris, while the capital of film is Hollywood (or Bollywood!) – but what’s the new capital of the internet? Specifically, the internet of things? The answer – according to new research by Ozy – might surprise you. It’s not Tokyo, Seoul,

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities And Big Data As Anthony Townsend argues in his SMART CITIES, even though the communications industry has changed beyond recognition since its inception, the way we consume power has remained stubbornly anachronistic. The rules of physics are, of course, partially to blame, for making grid networks harder to decentralize, as opposed to communication

Aggregated News

Popular News Sources

iCloud Photos web client opens just before iOS 8.1 launch

iCloud Photos web client opens just before iOS 8.1 launch

With Monday’s scheduled release of Apple’s iOS 8.1 update, the first major upgrade for the latest version of the iPhone/iPad operating system, to include a new iCloud Photos service, it appears the web version has rolled out a few days early for those with beta access. Registered developers who log in to their account on

Samsung: Nice Stock if You Can Get It

Samsung: Nice Stock if You Can Get It

Samsung: Nice Stock if You Can Get It World’s leading maker of memory chips is highly profitable. Read the source article at online.wsj.com About Latest Posts BalajiBalaji Viswanathan is the founder of Agni Innovation Labs that helps startups and small businesses with their marketing and tech strategy. He has a Masters in Computer Science from

Cloud Analytics Market (by Cloud Business Intelligence & Predictive Analytics) Expected to Cross $16.52 Billion by …

Cloud Analytics Market (by Cloud Business Intelligence & Predictive Analytics) Expected to Cross $16.52 Billion by …

Cloud Analytics Market report gives the detailed analysis trends and forecasts, competitive landscape, key drivers, restraints and opportunities in North America, Western Europe, Eastern Europe, Middle East and Africa, Japan, Asia-Pacific (Ex-Japan) and Latin America ( http://www.marketsandmarkets.com/Market-Reports/cloud-based-business-analytics-market-959.html ) (PRWeb October 18, 2014) Read … Read the source article at prweb.com About Latest Posts BalajiBalaji Viswanathan is