KeywordsThese the security the supplier the cloud environment this
Whenever I hear the phrase "send this file to my Gmail," The office echoes, any IT expert realizes how difficult it is to stop these employees from using the company's external electronic devices, especially if the services offered by the company's equipment vendors do not fully meet the needs of those employees.
Those strange emails may not be the cause of headaches for security professionals, but because cloud computing and SaaS (Http://www.aliyun.com/zixun/aggregation/13763.html > Software as Services) Some normal commercial applications and large amounts of data storage can be offered at low prices, with the risk of misuse of cloud applications.
At the same time, more and more people are starting to be interested in business cloud applications (cloud apps), so CIOs need to work with suppliers and internal departments to reduce risk.
CIOs ' concerns about security are divided into two parts. First, how do you protect data? The "flight mode" that exists between customer and application host data is usually protected by HTTPS or other security channels, which are provided by the vendor. However, the use of data is also included in the scope of consideration, but the use of encryption is unusual. At the same time, vendors have to develop processes for data security processing.
The second security concern is access to data. When employees use multiple programs from different vendors, they often use the same password. Incredibly, they also write down the codes and post them on the table to remind themselves. Manage these availability and secure single sign-on in multiple programs is the real challenge.
Fortunately, a list of security-related clouds has now been published to help the CIO self-test.
The following list comes from Forrester and recommends different security in the following areas:
Data protection
Vulnerability Management
Identity authentication Management
Physical and employee management
Availability
Apply Security
Incidence of reaction
Privacy
This list lists the issues that a series of IT leaders should consider when they investigate suppliers, such as: "Do you have a background check for all the people involved?" How large are these inspections? "The list can also be seen as a technical standard for suppliers to follow."
Although the cloud extends IT security issues, internal it has been seriously plagued by its own problems. Viruses, hackers, and backward data management are actually more prone than they admit.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.