Cloud Chivalry – Provider Pride

Cloud Chivalry – Provider Pride

As cloud deployments gain popularity, increasing attention is paid to provider security strength. The cloud security alliance, for example, releases a yearly list of top threats, covering everything from malicious use, data loss, and service hijacking. Heightened public awareness of the cloud has led to oddly intuitive feelings of insecurity – if data resides off-site, it must surely be less secure.

Though it’s hard to imagine cloud providers with shield raised against whatever virtual attack might breach a client’s peace, there’s an increasing need for solid cloud security – cloud chivalry, even – which defends otherwise helpless company data from attack. Public and private providers have responded; in many cases, cloud deployments are now more secure than local servers.

Here are three simple ways spot knight-like providers.

Secure Priorities

All cloud deployments require trust. Companies entrust their provider with critical data and expect a measure of care in return. Because cloud computing is still a maturing technology, standard wording does not exist for security in most service-level agreements, meaning company IT professionals need to evaluate providers on a case-by-case basis.

The first sign of a trustworthy provider is their willingness to talk about security concerns. Not only should responsibilities be spelled out in an agreement – with clear expectations for both provider and customer – but there should be evidence of careful thought in security design. Cloud computing offers fertile ground for startup providers and tempting fruit for tech giants; secure providers are those who commit fully to the cloud, rather than attempt to tack on services bit by bit. Look for the total package.

Optimal Protection

Once you’ve identified a tentative provider, consider specifics. While the physical security of an off-site storage location is important, including 24/7 monitoring and controls to prevent data loss or damage – it’s important that storage architecture goes beyond the basics. This means taking measures to isolate workloads in shared tenancy, in turn preventing accidental cross-contamination on a physical server. Providers should be aware of not only potential threats from beyond a storage facility but understand the interconnected nature of their compute offering: what affects a single customer affects many.

Administrative Access

It’s also important to consider access. While cloud chivalry includes a certain amount of trust extended to third-party providers, these providers need clear-cut access polices. Company IT pros should always have access to their data, and provider admins should only need data access for specific circumstances. No access should ever go unrecorded, and companies should always be kept in the data-use loop.

Cloud security is simpler than much media hype makes it seem. Providers are crucial in the defense of data, and it’s getting easier to separate knaves from knights.

By Doug Bonderud,

Doug Bonderud is a freelance writer, cloud proponent, business technology analyst and a contributor on the Dataprise Cloud Services website.

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

The Lighter Side Of The Cloud – Fathers Day
The Lighter Side Of The Cloud – The Weatherman
The Lighter Side Of The Cloud – The Crystal Ball

Recent

Using Mobile Technology To Price, Quote and Engage Customers

Using Mobile Technology To Price, Quote and Engage Customers

Using Mobile Technology To Price, Quote and Engage Customers To remain competitive in the e-commerce age, companies are starting to recognize that one price does not fit all, and in fact, the marketplace demands a great deal of versatility. Individual consumers have experienced this when dealing with sophisticated B2C retailers such as Amazon, a company…

The Lighter Side Of The Cloud – New Responsibilities

The Lighter Side Of The Cloud – New Responsibilities

By Al Johnson Are you looking to supercharge your Newsletter, Powerpoint presentation, Social media campaign or Website? Our universally recognized tech related comics can help you. Contact us for information on our commercial licensing rates.  About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information.…

5 Ways Unified Communications Can Benefit Your Employees

5 Ways Unified Communications Can Benefit Your Employees

Unified Communications Could you imagine a world where successful companies no longer needed office space to function on a day-to-day basis. Defined as “an industry term used to describe all forms of call and multimedia/cross-media message management functions,” unified communications is quickly making this dream more of a reality for any firm looking to achieve…

Popular Archives

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

NEWS

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue The integral integration of cyber security and cloud technology seemed to be the hottest issue at the busy RSA 2015 Conference in San Francisco. Interested parties packed security and cloud service booths for the duration of the conference. Several prominent publications covered the increased importance of securing their private information that’s…

Imperfect Security: The RSA Conference And The Illusion Of Safety

Imperfect Security: The RSA Conference And The Illusion Of Safety

The RSA Conference And The Illusion Of Safety This year’s 2015 RSA Conference is taking place from April 20th to 24th, in San Francisco, California. Here, security leaders from across the vast expanse of tech, politics, and more will gather to discuss the past, present, and future of security. From application security to technology infrastructure,…

Technology Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising