Cloud Security
Cloud Security
1. Encryption
The first way to mitigate security breaches is to use a cloud service that encrypts your files both on your
local computer and in the cloud. By having two layers of encryption it protects your data both from service
providers and administrators of the service.
Your password is the key to your house - you would not just leave it anywhere lying out with your address
attached. I suspect we have all written a password on a sticky note at one point in our lives. It is ever
important to break that habit and ensure you are doing your part to not be the cause of a breach. More than
75 percent of attacks are due to weak passwords, which means you must be diligent when creating yours.
The two-factor authentication (2FA) tool is an extra layer of security that can prevent hackers from
obtaining your password and accessing your data. When you utilize 2FA, the tool will require you to take
an action on a separate device to grant access to the account after your password is used. This will ensure
that if someone does get access to your password that your data is still protected.
4. Have a Backup
Even when storing data in the cloud it is imperative to have backups. Ideally, both stored locally and in one
or multiple cloud services depending on the type of data. You can work with a cloud expert to determine
the level of redundancy you need and the schedule for those backups. For example, BAASS uses
our Hosted Cloud service which has several levels of backups and redundancies set for our data. By having
backups you reduce any downtime should there be any issues with your data in the primary location.
The cloud solution you are using should be able to provide role-based access control to ensure the correct
user is accessing only the files they need to. By having stringent control of the access levels it can provide
an additional level of protection should a user’s account be breached.
We have all glossed past the terms and conditions agreements in software before for personal use. It is
extremely important to never sign up for cloud service without reading the user agreement completely.
This document includes vital information about how the service protects your information and whether you
give permission for them to use or sell your information in any way by signing up. Also, ensure to read any
updates when the service provider updates its privacy policies.
7. Educate employees
Cyber-hygiene and security training should be a requirement for all employees. The consequences of data
breaches are higher and higher these days. These risks to your company should be fully discussed to ensure
your employees understand what is at stake. Other topics that are recommended assistance with device
usage, phishing and email scams, standards and protocols for accessing data, and passwords.
8. Brokered cloud storage access
Cloud Broker is an entity that manages the use, performance and delivery of cloud services, and
relationships between cloud providers and cloud consumers.
All the data stored in the cloud. It can be located in the cloud service provider’s system used to
transfer data from sent and received. The cloud computing has no physical system that serves this
purpose. To protect the cloud storage is the way to isolate data from client direct access. They are
two services are created. One service for a broker with full access to storage but no access to the
client, and another service for a proxy with no access to storage but access to both the client and
broker. These important two services are in the direct data path between the client and data stored
in the cloud. Under this system, when a client makes a request for data, here’s what happens:
The proxy completes the response by sending the data requested to the client.
Even if the proxy service is compromised, that service does not have access to the trusted key that
is necessary to access the cloud storage. In the multi-key solution, not eliminated all internal
service endpoints, but proxy service run at a reduced trust level is eliminated. The creation of
storage zones with associated encryption keys can further protect cloud storage from
unauthorized access.
Storage zone with encrypted keys
Cloud brokers provide services in three categories:
Aggregation: A cloud broker combines and integrates multiple services into one or more new
services.
Arbitrage: This is similar to service aggregation, except that the services being aggregated are
not fixed.
Intermediation: The cloud broker give service by improving capability and providing value
added services to cloud consumers. The improvement can be managing access to cloud services,
identity management, performance reporting, enhanced security, etc.
Because data stored in the cloud is usually stored from multiple tenants the each vendor has its
own unique method for segregating one customer’s data from another. It’s important to
understand how the specific service provider maintains data segregation. Cloud storage provider
provides privileged access to storage. Most cloud service providers store data in an encrypted
form to protect the data used in security mechanism. Hence, data cannot be accessed by the
unauthorized user.
It is important to know what impact a disaster or interruption occur on the stored data. Since data
are stored across multiples sites, it may not be possible to recover data in a timely manner.
Audit and compliance functions have always played an important role in traditional
outsourcing relationships. However, these functions take on increased importance in the
cloud given the dynamic nature of software-as-a-service (SaaS), infrastructure-as-a-
service (IaaS), and platform-as-a-service (PaaS) environments. Cloud service providers
(CSPs) are challenged to establish, monitor, and demonstrate ongoing compliance with a
set of controls that meets their customers’ business and regulatory requirements.
Maintaining separate compliance efforts for different regulations or standards is not
sustainable. A practical approach to audit and compliance in the cloud includes a
coordinated combination of internal policy compliance, regulatory compliance, and
external auditing.