What constitutes a Secure Cloud System

On August 19, 2019


Cloud security is the top priority for IT professionals in 2019, according to a survey from NetEnrich. This isn’t a surprise, given the implementation of GDPR, and large-scale data breaches frequently hitting headlines over the past year.

There is misinterpretation that cloud service providers are in charge of the security for the cloud environment. Cloud providers like AWS, GCP, Azure Cloud, etc. are responsible for the physical data centre security, server hardware , virtual machines running on the physical server. And customer is in charge for the configuration part’s security.

Cloud Service providers furnish the services from which Cloud Admin can implements the security. It doesn’t matter what kind of security defenses the cloud provider has in place if the customers don’t protect their own networks, users and applications.

One can look for below points to improve the cloud security.

  • Usage of Strong authentication tools
  • Set multiple Levels of authentication
  • Monitor logs & user activity; Analyze the events
  • Provide least privileges to users
  • Manage Compliance for data protection regulation
  • Plan & configure secure Cloud Infrastructure for application
  • Implement a data backup & recovery policy

If all the above points are looking after while using cloud and also ensure that all the controls are over who has access to what assets, what level of access they have and how those levels are maintained, you are already well on your way for secure cloud system.

To manage accessibility of Cloud Account, you can read our blog Identity Management in Cloud and for best architecture practices you can read our blog for best practices for different cloud service providers.


*

*

*

*