What Should You Look For In A Cloud Security Vendor?
Protecting the security of your cloud data during its transmission, storage, and access is an ongoing, fundamental concern as technology continues to evolve, intrusion possibilities increase, and BYOD becomes more common. Here are the five areas to consider when evaluating how the security of your cloud vendor stacks up.
How is My Data Physically Protected?
Any potential problem or threat to the physical data center should be covered from every angle, with continual and back up protection plans in place. Environmental controls should be systematic through proactive care and maintenance of the data center, including fire detection and suppression systems, climate and temperature controls, and 24/7 electrical power with redundancy and generator backup. It also means consistent identification and problem resolution for electrical, mechanical, and other systems for ongoing equipment operability.
How do I know Transmission Over the Network is Secure?
Encryption for data in transit over the network should be at the most advanced level—such as 256-bit SSL—and include enterprise-grade security measures over networks without WAN or VPN controls (like many companies these days). Additionally, advanced network security protection such as unique key management functionality is recommended.
How is My Data Protected in the Cloud?
Data stored in the cloud should be protected with the strictest authentication and access controls. Stored data should be encrypted, such as with 256-bit AES.
When it comes to file retention and version control, the customers should be able to enforce their own retention policies. They should also be able to remove access for single accounts if desired. This means that if a hacker gains access to the data of one company, they do not gain access to any other companies’ data. Customer access to data should be controlled by 2-factor encryption. Data compartmentalization schemes ideally utilize a multi-pronged segregation approach, with the following types of measures in place: access credentials, customer meta data with the use of S3 buckets and unique 256 AET encryption keys.
How is Data Access Managed?
The need of users to retrieve data must be weighed against the security of data access itself. Access to data should require single sign-on with SAML 2.0, as well as multi-step authentication, such as two-factor encryption-based credentials and use of a different PIN entry each time.
Access controls by the customer should also be available by different and separate admin roles, such as a server or profile administrator, based on their responsibility for data access. The cloud vendor should not have any access to the company’s data unless expressly permitted by the customer.
The customer should be able to set access controls for different roles, such as server or profile administrator, based on their responsibility for data access.
In order to provide transparency and accountability, there should be a complete audit trail of all data access activity available.
What Happens to Data if a Disaster or Failure Occurs?
In case of disaster such as power or other data center failure, service levels and data access should still be maintained. This can be achieved with data redundancy controls, such as having separate data centers clustered in key global regions and multi-zone redundancy in case failure occurs in any one zone.
No matter how cloud technology changes, end-to-end data protection is a must. Find out how your cloud vendor secures its data from all points.
By Srivatsan Srinivasan
Senior Product Marketing Manager at Druva.
- The Golden Age of Wearable Technology - August 23, 2016
- Cybersecurity Experts Racing to Keep Pace with Growing Cyber Threats - August 22, 2016
- Artificial Intelligence In The Enterprise - August 19, 2016
- Rounding Out Your Security Strategy With The Enterprise Cloud - August 18, 2016
- Big Data Is Taking The Digital World By Storm - August 17, 2016