Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
    data analytics and truck accident claims
    How Data Analytics Reduces Truck Accidents and Speeds Up Claims
    7 Min Read
    predictive analytics for interior designers
    Interior Designers Boost Profits with Predictive Analytics
    8 Min Read
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Best Practice Cloud Security: Is Your Cloud Secure Inside and Out?
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Cloud Computing > Best Practice Cloud Security: Is Your Cloud Secure Inside and Out?
Cloud ComputingITOpen SourceSecurity

Best Practice Cloud Security: Is Your Cloud Secure Inside and Out?

LinuxIT
LinuxIT
6 Min Read
SHARE

Learn to use the Cloud security principles to reassure your customers. Last year, the UK government’s Cabinet Office outlined what constitutes ‘Cloud security principles’ in a guidance document published on 14th August 2014. These principles involve the protection of data in transit, asset protection such as customer data, a need to create some level of separation between customers in order to ensure that a compromised customer account won’t affect the service or the data of another customer, the need to develop a governance framework, and the screening of Managed Service Provider (MSP) or Cloud Service Provider (CSP) staff, to name a few areas. Cloud security is such a burning issue because data is the gold and the oil of any modern organisation. Enterprises large and small need to think about how they can prevent hackers from compromising their Cloud services. Yet not all attacks occur from outside of an organisation. Sometimes they start from within an organisation or from within a service provider. But so long as a security audit is undertaken and Cloud security principles are put in place, a Cloud environment can be as secure and in many cases even more secure than your internal IT.

Contents
Cloud security complianceFollowing best practiceStandard operating systemTakeaways:

Cloud security compliance

There is no need for organisations to develop their own Cloud security principles from scratch as there are well documented best practices, such as the Cabinet Office’s guidance document. However, the level at which Cloud security needs to be applied varies according to the legal obligations and regulatory frameworks that apply to different vertical industries. The financial services sector is one vertical that has to apply stringent Cloud security frameworks in order to protect their customers’ personal and financial data. For this reason they often opt for a private or hybrid Cloud model. The key standard that most industrial sectors have to comply with is known as ISO 27001 (ISO/IEC 27001:2013): “Using this family of standards will help your organisation manage the security of assets such as financial information, intellectual property, employee details or information entrusted to you by third parties”, says the International Standards Organisation’s website. There is also ISO/IEC 27002 (ISO/IEC 27018:2014) to consider. Some of the standards aren’t restricted to Cloud security principles. The interconnectedness of Cloud computing means that they often concern an organisation’s entire IT system. So, yes, it’s vital to find a Managed Service Provider or a Cloud Service Provider that has all of the right cloud credentials, but the weakest link could be your own internal IT. It needs to meet the very same standards that MSPs and CSPs have to comply with.

Following best practice

As well as the International Standards Organisation (ISO) there are a number of entities that are working to help enterprises to develop and implement Cloud security best practices. For example, there is the Cloud Security Alliance (CSA) which publishes a top Cloud security threats report. National and international organisations like the CSA, and specific sector-related industry bodies, can help you to keep informed about the latest legal requirements and industry regulations. This will enable you to know what constitutes best practice, and how it should be applied.

Standard operating system

The starting point is a Standard Operating Environment (SOE). Organisations with a SOE have a repeatable process for implementing secure and optimised Linux system builds across their entire IT estate, whether in-house, physical, virtual, hybrid or Cloud. An SOE needs a good management platform (SOEMP) to enforce good practice. Using SOEMP technologies such as Red Hat’s Satellite Server and Puppet, system administrators have the power to actively manage the SOE and ensure its security. For many organisations the answer is to use a Managed Services Provider that follows Cloud security principles provided by ISO/IEC 27001:2013. A service provider will have access to the best management tools and will have staff very familiar with deploying them consistently and thoroughly. Most crucially, such a provider is removed from the everyday commercial pressures and career worries within the enterprise that sometimes conflict with best security practice.

More Read

Image
5 Non-Standard Ways to Use Cloud Storage
Genesco Sues Visa Over PCI Noncompliance Fines
The Awesome Ways Big Data Is Used Today to Change Our World [VIDEO]
Silicon Valley: From Electronic Warfare to Big Data
Congratulations to Sallie Mae’s Chief Data Steward!

Takeaways:

  • Ensure you’re using a Managed Services Provider.
  • Check that you are following guidance provided by ISO/IEC 27001:2013 and other relevant standards and regulations to your industry.
  • To keep data safe, you need the best management tools.
  • Read the Cabinet Office’s document on cloud security principles as a blueprint for ensuring your cloud systems and Cloud services remain secure.
  • Work with an MSP or a CSP to ensure that your own internal systems aren’t the weakest link in the Cloud security chain.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

financial data
Engineering Trust into Enterprise Data with Smart MDM Automation
Big Data Exclusive
christina wocintechchat com 6dv3pe jnsg unsplash
How CIS Credentials Can Launch Your AI Development Career
Exclusive News
big data analytics in transporation
Turning Data Into Decisions: How Analytics Improves Transportation Strategy
Analytics Big Data Exclusive
AI and fund manager software
AI And The Acceleration Of Information Flows From Fund Managers To Investors
Artificial Intelligence Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

cybersecurity and data science
Big DataData ScienceExclusiveSecurity

How To Improve Cybersecurity With Data Science

6 Min Read

Big Data Snapshot [INFOGRAPHIC]

0 Min Read
Image
Big DataCloud ComputingHadoop

Feeling Overwhelmed About Your Data? You’re Not Alone

5 Min Read

Moving Beyond Smart Part Numbers

4 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data
ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?