Perhaps your organization has adopted some form of cloud computing it deployment. It may be a private cloud within an enterprise that hosts an e-mail package or a service other than it (such as Salesforce.com). Cloud computing already has the conditions to deploy, but it is also a matter of concern how businesses can safely use this it resource. It is not difficult to imagine a newer technology that can lead to more security dilemmas, and we have recently been able to see media coverage of hacking news. However, if we look closely at recent events, it is not difficult to see that this kind of terrorist attacks and intrusions are often due to the lack of a basic security deployment of the enterprise, which is not necessarily a complex attack. This does not mean, of course, that all attacks are simple, but the reality is that attackers tend to focus on the simplest form of intrusion, not the hardest way to implement it. It is like a thief who is almost always in the house when no one or door is locked. When it moves to the cloud, companies need to consider basic security measures, just like locking their own doors. IBM Cloud Security Strategy CTO Harold Moss presents 10 basic Security tips:
1. Confirm Existing Foundation control Basic control is the core of enterprise safety concept. They contain nearly 60 security controls that protect your enterprise's most important assets. They focus on ensuring that cloud technology is applied to your business and that your operations are in compliance with security controls.
2. Focus on workload Cloud security, corporate credit is directly related to workloads. Each workload has unique considerations, such as management factors and user dependencies. By focusing on workloads, you can develop a more targeted security plan that provides more secure coverage than traditional operations.
3. Early consensus-building Many times cloud technology is not valued by partners. As a result, important security details can be overlooked, leading to problems with consolidation and availability. The key to successful implementation of cloud security is for project stakeholders to have a good idea of the pros and cons.
4. Implement a risk mitigation plan Cloud deployments often involve some internal and external parties. Companies should develop a documented risk mitigation plan that allows administrators and employees to quickly handle problems in the cloud. The plan should include risk documents, responses to these risks, and should also include education and training.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.