1300 659 575    hello@polarseven.com
  • Partners
  • About Us
  • Contact
Service Desk   Let's Talk
PolarSeven PolarSeven PolarSeven PolarSeven
  • Services
    • View all Services
      • Advisory & Consulting
      • Cloud Build, Migration & Transformation
      • DevOps & Automation
      • Cloud & Cost Optimisation
      • Security & Compliance
      • Cloud Dev & App Modernisation
      • Data, Analytics & IoT
      • Remote Working
      • Well-Architected Framework Review
      • Managed Cloud
    • Industry Solutions
      • Public Sector
      • Education
    • The PolarSeven Methodology
    • Remote Working

      Powered by AWS

  • Case Studies
  • Blogs
  • AWS Meetups
  • Resources
    • AWS Cost Optimisation eBook
PolarSeven PolarSeven
  • Services
    • View all Services
      • Advisory & Consulting
      • Cloud Build, Migration & Transformation
      • DevOps & Automation
      • Cloud & Cost Optimisation
      • Security & Compliance
      • Cloud Dev & App Modernisation
      • Data, Analytics & IoT
      • Remote Working
      • Well-Architected Framework Review
      • Managed Cloud
    • Industry Solutions
      • Public Sector
      • Education
    • The PolarSeven Methodology
    • Remote Working

      Powered by AWS

  • Case Studies
  • Blogs
  • AWS Meetups
  • Resources
    • AWS Cost Optimisation eBook
  • Wednesday, 23 March 2016

7 Ways to Improve Public Cloud Security

11407110213_947da352fe_z

Is it more secure to run my own on-site data center, or to trust in cloud security?

From the beginning, users have been concerned about data security in the cloud. And up to just a few years ago, nearly everyone believed that on-site data centers were indeed safer.

But we have gone through a sea change. Surveys conducted by business software companies Exacta and Pb7 Research indicated that the number one reason why SMBs chose to migrate to the public cloud is for the additional security it provides.

Similarly, the CIO of Capital One, Rob Alexander, put enough trust in cloud security that he announced on October 2015 that Capital One was betting on Amazon Web Services for its flagship mobile banking application.

In large part, this change is due to cloud companies themselves. CSPs put such a high priority on security because they know that without a way to secure their client’s data, they would have no business to speak of.

Hence they continued investing in the latest technology to counter cyber-threats and put relentless effort in securing their systems. You even have instances where companies like Apple—which has its own iCloud—are fighting government efforts to create a back door into its own system, knowing such a thing amounts to business suicide.

Ultimately, it’s become less of a question of where one keeps their data, but what measures they take to secure it from cybercriminals. To that end, here are some important ways to continually improve the security of your public cloud:

1. Prioritize Cloud Security in your SLAs

signature-962354_640

Go over your SLA and make sure that the security guarantees are included and that they can be implemented. Remember that if it’s not clear on the contract, it can’t be enforced.

Typical items to look out for are:

  • How will my data be protected? What are the encryption policies?
  • What security standards does the CSP follow? What defenses do they have in place against security risks?
  • What is the Disaster Recovery Plan?
  • How are activities in my cloud monitored and logged?
  • How will the provider handle end-of-business operations and deletion of data?

2. Perform Regular Policy Reviews and Security Audits

interview

Care of Alan Cleaver

The Cloud Usage: Risks and Opportunities Report states that 25.5% of respondents don’t have any form of policies to ensure data security within the cloud. That alone is a cause for concern.

Your organization should take the time to create, regularly review, and update your information security policies. Having regular audits will help determine how closely you and your cloud provider are following your cloud security policies and mitigating threats. Check with your CSP on their policies regarding performing audits, as some may require permission.

If possible, you may also procure the services of third-party auditing services. This ensures objectivity when going over your security processes.

3. Follow an Efficient Monitoring and Logging system

window-1231894_640

It is critical for your operation to have access to all environment logs, including the creation, deletion, and modification of user accounts and passwords, as well as other important transactions. If something should go wrong, you will have a record of who did what and when—a crucial step for determining loopholes in cloud security.

4. Use Encryption

Perspecsys Photos cloud security

Encryption lets you secure data going in and out of the public cloud. Cloud providers typically provide their own encryption service to their customers, but if your organization isn’t satisfied with that level of security you may also obtain encryption services from a third party. That way only you and your encryption service have access to the encryption key.

5. Enforce Secure Processes on User Side

eye-319668_640

Experian’s Data Breach Industry Forecast shows that in 2015, 60% of security breaches were caused by people within the company—that is, the employees themselves.

In order to truly ensure data protection, companies must also control who has access to their data. Your CSP’s security practices also need to be accompanied by user-side protocols and strong authentication.

You may want to include other measures aside from usernames and passwords: physical tokens, key cards,  biometrics, and so on.

6. Use the right security tools and services

Once you have a working knowledge of your CSP’s security capabilities, it would be wise to add to it as you see fit. Refer to the ISO/IEC 27000 series of standards to determine what to look out for.

You can also use tools to increase your cloud security. BitGlass, for example, allows you transparent protection for your computers and mobile devices by tracking and encrypting business data. Skyhigh Networks, on the other hand, can show you what applications your employees are using.

7. Test for Vulnerabilities

software-762486_640

Security in the cloud means that you must continually check for weaknesses. This applies every time you build a system, whether or not it’s cloud-based.

Some CSPs provide tools for vulnerability testing. For example, Amazon Inspector actively searches for risks and vulnerabilities in your AWS cloud and provides a detailed report for you.

Much of the cloud requires a shared responsibility. You and your provider must work together to ensure both your company’s and customer’s data are protected at all times. The video below discusses how we should rethink our security in the cloud.

If you want to learn more about how to increase your data security in the cloud, contact our PolarSeven AWS specialists today.

  • Facebook
  • Twitter
  • Tumblr
  • Pinterest
  • Google+
  • LinkedIn
  • E-Mail
Discover More
Read More
  • Wednesday, 23 September 2020

Hire DevOps or Utilise DevOps as a Service?

According to a recent report, the market value of DevOps will grow to US$17 billion by 2026. That means IT... read more →
Read More
  • Thursday, 13 August 2020

Five Essentials for Developing Modern Applications

Modern Applications is what we refer to cloud-native software built with today’s agility, performance and security needs in mind. It... read more →
  • Case studies
  • Services
  • Resources

Article Categories

  • Articles
  • AWS
  • AWS Industry News
  • AWS User Group
  • Cloud Computing
  • Cloud Security and Compliance
  • Containers
  • DevOps Automation
  • Miscellaneous
  • PolarSeven News
  • Remote Work
AWS Sydney User Group

Tags

Amazon AppStream 2.0 Amazon Web Services Amazon WorkSpaces application modernisation applications app modernisation AppStream AppStream 2.0 AWS aws devops AWS Spot Instances CFO Chief financial Officer cloud application security Cloud Migration cloud security Containerisation Containers continuous delivery automation DevOps devops outsourcing devops services ecs eks Fargate iaas kubernetes Landing Zones legacy applications Meetup microservices Microsoft Workloads mobile modern applications paas Polar Bear PolarSeven purpose-built databases remote work remote working saas serverless computing Session Manager User Group

Recent Articles

  • Hire DevOps or Utilise DevOps as a Service? September 23, 2020
  • Five Essentials for Developing Modern Applications August 13, 2020
  • New pricing for AWS Spot Instances July 7, 2020

PolarSeven’s vision is to be a customer centric, Amazon Web Services consultancy, where cloud computing is seen as a key enabler to our customers needs and challenges. “We help our customers achieve amazing things…..”

Links

  • Home
  • PolarSeven Methodology
  • Client Case Studies
  • Articles
  • About Us

Contact

Level 2, 13-15 Wentworth Avenue, Sydney, 2000 Phone: 1300 659 575 E-Mail: hello@polarseven.com
@2015-2021 All Rights Reserved | PolarSeven PTY LTD | Terms & Privacy Policy