Top ten security tips against cloud migration risk

Source: Internet
Author: User
Keywords Security ten cloud migration implementation survey

&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp;

Now, many companies are starting to consider migrating existing applications, data, and infrastructure into the cloud. A recent survey shows that cloud deployment will be a major test and non-critical business application, and many companies are also planning to integrate key business applications into the cloud to take advantage of the low-cost, flexible, and efficient benefits it brings.

However, the migration of production systems such as e-mail and personnel files to cloud environments raises concerns about privacy and data security, a concern that has risen to unprecedented levels. In fact, security has been one of the three main reasons that affect the enterprise moving applications and data into the cloud. So how do we protect against risk in the cloud migration in order to fully enjoy the convenience and benefits of the cloud?

Next, I'll show you ten tips for implementing a secure cloud migration:

I. Identity and access Management control

You need to know who is accessing your data and how they are accessing the data and whether they have permission to modify it. A simple and straightforward audit identity and access management control system, including suppliers, subcontractors, and employees, should be included in the system.


Ii. Return on Investment

Cloud computing can help achieve high security ROI (Roi,return on investment) because you don't need to hire a security team specifically to eliminate your security concerns. First assess the security costs of current data center operations, and then set up appropriate security control mechanisms to meet SLA service level agreements to achieve high ROI.

Iii. Business Continuity

We want to make sure that the business lasts uninterrupted. This requires that we be able to ensure that downtime is within reasonable bounds for business continuity. You need to clear your bottom line if you need to have an insurance liability problem with the cloud service business interruption.

Iv. Security Configuration

This paper enumerates the data based on information priority and the security level of strategic management, which makes the security configuration of the privacy data. In the long run, this helps to save costs.


V. Reports and Notifications

How are you aware of the incident when you encounter data leaks or cyber attacks? According to the type of event to work out the corresponding incident report and the person to be involved in the report, fully understand what kind of incidents need to take legal measures to safeguard their legitimate rights and interests.

Vi. Identifying Risks

Clouds can help businesses achieve efficiencies, but they also face greater risk of data exposure. Based on this understanding, it is necessary to ensure that security controls are in place to protect the data, such as encrypting e-mail messages that are exchanged.

Vii. Privacy Data

If your privacy data, such as your personal record, is stored in the cloud, you need to predetermine what event reporting method is, and the associated precautions, and the stored privacy data needs to be met by the relevant privacy specification (PCI, HIPAA, and so on).


Viii. Assessing the Cloud environment

Consistent auditing and evaluation allows you to update any missing links in your security solution to improve compliance and effectiveness. It can also provide a "trusted and validated" component model.

IX. cooperate with the investigation

When you are asked to cooperate with the in-house or law enforcement agencies, you need to have a plan in advance. You need to give the cloud service the full support of the incident investigation you are involved in beforehand.

X. EXIT strategy

Be 100% sure what services the cloud provider will provide you with, how they will provide you with data, how to filter the spam in your system, how to back up your data, and ensure that you have the right to hold on to accountability.

(Responsible editor: Liu Fen)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.