Protect your business in a cloud environment

Source: Internet
Author: User
Keywords These the security the supplier the cloud environment this
Whenever I hear the phrase "send this file to my Gmail," The office echoes, any IT expert realizes how difficult it is to stop these employees from using the company's external electronic devices, especially if the services offered by the company's equipment vendors do not fully meet the needs of those employees.

Those strange emails may not be the cause of headaches for security professionals, but because cloud computing and SaaS (Http://www.aliyun.com/zixun/aggregation/13763.html > Software as Services) Some normal commercial applications and large amounts of data storage can be offered at low prices, with the risk of misuse of cloud applications.

At the same time, more and more people are starting to be interested in business cloud applications (cloud apps), so CIOs need to work with suppliers and internal departments to reduce risk.

CIOs ' concerns about security are divided into two parts. First, how do you protect data? The "flight mode" that exists between customer and application host data is usually protected by HTTPS or other security channels, which are provided by the vendor. However, the use of data is also included in the scope of consideration, but the use of encryption is unusual. At the same time, vendors have to develop processes for data security processing.

The second security concern is access to data. When employees use multiple programs from different vendors, they often use the same password. Incredibly, they also write down the codes and post them on the table to remind themselves. Manage these availability and secure single sign-on in multiple programs is the real challenge.

Fortunately, a list of security-related clouds has now been published to help the CIO self-test.

The following list comes from Forrester and recommends different security in the following areas:

Data protection

Vulnerability Management

Identity authentication Management

Physical and employee management

Availability

Apply Security

Incidence of reaction

Privacy

This list lists the issues that a series of IT leaders should consider when they investigate suppliers, such as: "Do you have a background check for all the people involved?" How large are these inspections? "The list can also be seen as a technical standard for suppliers to follow."

Although the cloud extends IT security issues, internal it has been seriously plagued by its own problems. Viruses, hackers, and backward data management are actually more prone than they admit.

(Responsible editor: The good of the Legacy)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.