Cloud computing: 10 Ways to secure cloud

Source: Internet
Author: User
Keywords nbsp cloud security cloud computing

Perhaps your organization has adopted some form of cloud computing it deployment. It may be a private cloud within an enterprise that hosts an e-mail package or a service other than it (such as Salesforce.com). Cloud computing already has the conditions to deploy, but it is also a matter of concern how businesses can safely use this it resource. It is not difficult to imagine a newer technology that can lead to more security dilemmas, and we have recently been able to see media coverage of hacking news. However, if we look closely at recent events, it is not difficult to see that this kind of terrorist attacks and intrusions are often due to the lack of a basic security deployment of the enterprise, which is not necessarily a complex attack. This does not mean, of course, that all attacks are simple, but the reality is that attackers tend to focus on the simplest form of intrusion, not the hardest way to implement it. It is like a thief who is almost always in the house when no one or door is locked. When it moves to the cloud, companies need to consider basic security measures, just like locking their own doors. IBM Cloud Security Strategy CTO Harold Moss presents 10 basic Security tips:

1. Confirm Existing Foundation control
Basic control is the core of enterprise safety concept. They contain nearly 60 security controls that protect your enterprise's most important assets. They focus on ensuring that cloud technology is applied to your business and that your operations are in compliance with security controls.

2. Focus on workload
Cloud security, corporate credit is directly related to workloads. Each workload has unique considerations, such as management factors and user dependencies. By focusing on workloads, you can develop a more targeted security plan that provides more secure coverage than traditional operations.

3. Early consensus-building
Many times cloud technology is not valued by partners. As a result, important security details can be overlooked, leading to problems with consolidation and availability. The key to successful implementation of cloud security is for project stakeholders to have a good idea of the pros and cons.

4. Implement a risk mitigation plan
Cloud deployments often involve some internal and external parties. Companies should develop a documented risk mitigation plan that allows administrators and employees to quickly handle problems in the cloud. The plan should include risk documents, responses to these risks, and should also include education and training.

(Responsible editor: The good of the Legacy)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.