Now, many companies are starting to consider migrating existing applications, data, and infrastructure into the cloud. A recent survey shows that cloud deployment will be a major test and non-critical business application, and many companies are also planning to integrate key business applications into the cloud to take advantage of the low-cost, flexible, and efficient benefits it brings.
However, the migration of production systems such as e-mail and personnel files to cloud environments raises concerns about privacy and data security, a concern that has risen to unprecedented levels. In fact, security has been one of the three main reasons that affect the enterprise moving applications and data into the cloud. So how do we protect against risk in the cloud migration in order to fully enjoy the convenience and benefits of the cloud?
Next, I'll show you ten tips for implementing a secure cloud migration:
I. Identity and access Management control
You need to know who is accessing your data and how they are accessing the data and whether they have permission to modify it. A simple and straightforward audit identity and access management control system, including suppliers, subcontractors, and employees, should be included in the system.
Ii. Return on Investment
Cloud computing can help achieve high security ROI (Roi,return on investment) because you don't need to hire a security team specifically to eliminate your security concerns. First assess the security costs of current data center operations, and then set up appropriate security control mechanisms to meet SLA service level agreements to achieve high ROI.
Iii. Business Continuity
We want to make sure that the business lasts uninterrupted. This requires that we be able to ensure that downtime is within reasonable bounds for business continuity. You need to clear your bottom line if you need to have an insurance liability problem with the cloud service business interruption.
Iv. Security Configuration
This paper enumerates the data based on information priority and the security level of strategic management, which makes the security configuration of the privacy data. In the long run, this helps to save costs.
V. Reports and Notifications
How are you aware of the incident when you encounter data leaks or cyber attacks? According to the type of event to work out the corresponding incident report and the person to be involved in the report, fully understand what kind of incidents need to take legal measures to safeguard their legitimate rights and interests.
Vi. Identifying Risks
Clouds can help businesses achieve efficiencies, but they also face greater risk of data exposure. Based on this understanding, it is necessary to ensure that security controls are in place to protect the data, such as encrypting e-mail messages that are exchanged.
Vii. Privacy Data
If your privacy data, such as your personal record, is stored in the cloud, you need to predetermine what event reporting method is, and the associated precautions, and the stored privacy data needs to be met by the relevant privacy specification (PCI, HIPAA, and so on).
Viii. Assessing the Cloud environment
Consistent auditing and evaluation allows you to update any missing links in your security solution to improve compliance and effectiveness. It can also provide a "trusted and validated" component model.
IX. cooperate with the investigation
When you are asked to cooperate with the in-house or law enforcement agencies, you need to have a plan in advance. You need to give the cloud service the full support of the incident investigation you are involved in beforehand.
X. EXIT strategy
Be 100% sure what services the cloud provider will provide you with, how they will provide you with data, how to filter the spam in your system, how to back up your data, and ensure that you have the right to hold on to accountability.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.