Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
    data analytics and truck accident claims
    How Data Analytics Reduces Truck Accidents and Speeds Up Claims
    7 Min Read
    predictive analytics for interior designers
    Interior Designers Boost Profits with Predictive Analytics
    8 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Cloud Computing > Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches
Big DataCloud ComputingITRisk Management

Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches

onlinetech
onlinetech
3 Min Read
network security credentials to stop data breaches
Shutterstock Photo License - Sergey Nivens
SHARE

Gartner recently released recommendations for gaining transparency into cloud software as a service (SaaS) contracts – including emphasis on annual security audits and certification by a third party to verify a cloud vendor’s operating/product security.

Gartner also recommends that contracts allow for an option to terminate the agreement in the event of a security breach if the provider fails on any material measure. Gartner’s report, Cloud Contracts Need Security Service Levels to Better Manage Risk reveals that 80 percent of IT procurement professionals will remain dissatisfied with SaaS contract language and protections that relate to security over the next two years.

“We continue to see frustration among cloud services users over the form and degree of transparency they are able to obtain from prospective and current service providers,” said Alexa Bona, vice president and analyst at Gartner.

So how can you maintain complete transparency into your cloud service provider’s ability to provide ongoing secure services? The following is relevant to cloud infrastructure as a service (IaaS) providers that may offer services to other software as a service (SaaS) providers:

More Read

Business Analytics and IBM
The Future of Marketing: Combining Big Data with Intuition
A Big Cryptographic Boost for On-Demand BI and Extranets?
Fortifying Enterprise Digital Security Against Hackers Weaponizing AI
Fascination with Hadoop pushes, pulls Big Data analytics into mainstream. (Part One)
  • Check compliance audit reports. The list of security audits that should be conducted by an independent third-party auditor at least annually is a long one – it just depends what you’re looking for and what industry you’re in. Take this Data Center Audits Cheat Sheet with you to your data center visit.
  • Visit the actual data center. Verify your cloud service provider owns and operates their facilities, and then schedule a tour to check out their physical and technical security. Talk to their staff and ensure they’ve been trained to handle sensitive data, as well as their policies around access.
  • Compare industry compliance requirements with their offering.  Knowing who’s responsible for what clears up any gaps in your overall security, and clarifying what they offer and don’t also gives you insight into the scope of their services.
  • Find out what their breach notification policies are. Ask if the clause includes a standard notification policy if they discover a breach, and what the procedure involves after the event. Get your team involved to manage their end and ensure contacts are identified.
  • Invest in Third Party Risk Tools. The right software tools can help mitigate third- and even fourth-party data breaches.

Gaining transparency into your cloud provider’s environment may take more upfront work on your organization’s part, but it could be worth it in the end – the Ponemon Institute revealed that the cost of a data breach is rising across the globe in 2013 Cost of Data Breach Study: Global Analysis (PDF).

TAGGED:cloud security
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

image fx (60)
How Finance & BI Teams Choose Accounting Software
Big Data Business Intelligence Exclusive
Why the AI Race Is Being Decided at the Dataset Level
Why the AI Race Is Being Decided at the Dataset Level
Artificial Intelligence Big Data Exclusive
image fx (60)
Data Analytics Driving the Modern E-commerce Warehouse
Analytics Big Data Exclusive
ai for building crypto banks
Building Your Own Crypto Bank with AI
Blockchain Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Cloud Computing
Cloud ComputingComputingITSecurity

Middle East Focus: Moving to the Cloud Computing

7 Min Read

Top Stories in Cybernews

7 Min Read

Cloud Security: Vetting Applications and Cloud Providers for Compliance and Security

6 Min Read

Alteryx 8.5 and the Data Artisan: Focusing on the User Experience of the “New Boss”

8 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive
data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?