SlideShare a Scribd company logo
1 of 12
Download to read offline
TIPS
10
FOR CIOS

D ATA S E C U R I T Y I N T H E C L O U D
NO.1

NEW PARADIGM,
NEW SKILLS
IT organizations are typically made up of specialists
such as server technicians and network engineers.
The more cloud services you introduce into your
organization, the less the skills of these specialists
may be required. Consider job functions with broader
responsibilities and expertise that bring together IT
and business management talents – integrated services
manager, director of cloud services or ITIL management
supervisor, for example. These professions will
be increasingly necessary to direct collaborative
interactions with cloud services providers (CSPs)
that produce better cloud and business alignment,
management and security implementations.

“The more cloud services
you introduce into your
organization, the less the
skills of these specialists
may be required.”
pg 1
NO.2

OVERDOING
DUE DILIGENCE
A business decision as important as outsourcing
to the cloud demands thorough due diligence.
Indecisiveness is another matter. Employees and
business managers want cloud services. If IT doesn’t
make them available in a timely fashion, users will
provision services themselves without giving much
thought to security. In fact, a corporate ‘no cloud’
policy may only encourage them to purchase the less
secure, non-enterprise versions of applications and
services on their credit cards.

“a corporate ‘no cloud’ policy
may only encourage them
to purchase the less secure,
non-enterprise versions of
applications and services on
their credit cards.”
pg 2
NO.3

RISK VERSUS VALUE
Extracting maximum value from cloud services is an
exercise in risk management. Are the economic gains
that a cloud solution promises greater than the risks it
entails? Balancing business risk/value is new territory
for many IT shops. An enormous variable in achieving
balance is the CSP itself; do its capabilities, integrity
(business and infrastructure) and performance history
add to or diminish risk? It is imperative to find a CSP
that is able to meet or augment your organization’s
governance practices and all that they entail, from
standards, policies and procedures to infrastructure
design, monitoring and access controls.

“Are the economic
gains that a cloud
solution promises
greater than the
risks it entails?”
pg 3
NO.4

YOURS, MINE
OR OURS
When establishing responsibilities for cloud security,
assume nothing. Be clear as to your data security
requirements, policies and practices. And be clear
as to what data requires the highest levels of security.
This is important not simply to ensure you get the right
level of protection. The more security, the more costly
the services are likely to be. Pay only for what you
truly need for specific data sets, and demand that
your CSP is able and willing to satisfy your particular
requirements. Reach definitive agreement on who is
responsible for what, and how these responsibilities
will be met over the long term.

“And be clear as to
what data require
the highest levels of
security.”
pg 4
NO.5

SECURITY BEGINS
AT HOME, PART I
BYOD. Employees want their mobility and mobile
access, leaving you to provide them with secure
access to data and applications on any device,
anywhere and at any time. Isolate corporate data,
such as that stored in the cloud, from personal data
on mobile devices. Consider cloud-delivered desktops
that segment the access device from corporate
applications and data. Simply install the connecting
app on the home device; from there, everything
runs on the centralized, well-managed infrastructure.
Protect the data, not the device.

“Employees want their mobility
and mobile access, leaving you to
provide them with secure access
to data and applications on any
device, anywhere and at any time.”

pg 5
NO.6

SECURITY BEGINS
AT HOME, PART II
Certain corporate and business data is accessible
only to certain employees. In many ways, they hold
the keys to the kingdom, having access to your most
critical and valuable data assets such as databases,
financial information or intellectual property. Keep
their skills and your policies for handling data
securely up to par. Implement stronger access control
procedures. Scrutinize their on-the-job activities more
closely than the average employee.

“In many ways, they hold
the keys to the kingdom,
having access to your most
critical and valuable data
assets such as databases,
financial information or
intellectual property.”
pg 6
NO.7

LOVE YOUR DATA?
ENCRYPT IT.
The best cloud encryption solution is the one aligned
with your enterprise’s business and security objectives.
This includes understanding all internal and external
data governance policies (including data privacy
and residency) and compliance mandates, such
as PCI, HIPAA, GLBA, Safe Harbor, etc. However,
data encryption alone does not guarantee data
confidentiality. That happens when an authorized
team controls the encryption process and the
encryption keys. When security is a regulatory
requirement, or intellectual property needs protecting,
enterprises should deploy and manage encryption
themselves. But, a trusted cloud provider can be on
the team as well; new products are coming to market
that allow secure split-key responsibility.

“The best cloud encryption
solution is the one aligned with
your enterprise’s business and
security objectives.”
pg 7
NO.8

HIDE-AND-GO-SEEK
Know where your CSPs’ data centers are located
and where they store your data. If they move
your data, you need to know that. Many CSPs
spread data among different data centers, which
may include those in other countries. This raises
jurisdictional and compliance issues. It also can
make it more difficult to retrieve your data when you
want it. If you have heavily regulated data such as
healthcare records or financial information, be sure
the provider has the experience and the necessary
third-party audit reports to satisfy all compliance
requirements, and have them prove it.

“It also can make it more
difficult to retrieve your
data when you want it.”

pg 8
NO.9

RISK MANAGEMENT
ADVANTAGES
Certain aspects of cloud homogeneity, centralization
and virtualization can simplify event and log
management, allowing potential security or resiliency
problems to be spotted sooner and addressed more
quickly than they could in a traditional IT environment.
Once identified and fixed, automation tools allow the
CSP to apply the solution throughout the infrastructure.
Furthermore, CSPs can focus attention and investments
in security on a small number of highly scaled
environments. Ask the CSP about dashboards that
let you monitor and track your data, and that give
you better insight into how well its infrastructure is
performing on your behalf.

“Once identified and fixed,
automation tools allow the
CSP to apply the solution
throughout the infrastructure.”

pg 9
NO.10

DON’T GO IT ALONE
By 2015, more data and applications will be in
the cloud than not. As the Borg said in Star Trek,
“resistance is futile.” However, instead of being
assimilated, assimilate the cloud into your business
via a well-planned, well-executed strategy that
clearly spells out your complete range of security
requirements top to bottom. Don’t stop at finding a
CSP that can simply do the job. Seek out a provider
that is capable of contributing to your strategy,
providing continuing guidance, tailoring the ideal
solution and bringing ideas to the table. Cloud
computing is critical to the continuing success of your
business. Partner with a provider that wants to grow
with you and for you.

“Seek out a provider that is capable
of contributing to your strategy,
providing continuing guidance,
tailoring the ideal solution and
bringing ideas to the table.”
pg 10
Get a FREE consultation TODAY:
866.473.2510 | Peak10.com
Contact us about your RFP requirements

More Related Content

What's hot

Big security for_big_data
Big security for_big_dataBig security for_big_data
Big security for_big_data
Shyam Sarkar
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
 

What's hot (20)

DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT Infrastructure
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
IDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPRIDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPR
 
Webinar: Worried about privacy of your data on public cloud - Bring your own key
Webinar: Worried about privacy of your data on public cloud - Bring your own keyWebinar: Worried about privacy of your data on public cloud - Bring your own key
Webinar: Worried about privacy of your data on public cloud - Bring your own key
 
Big security for_big_data
Big security for_big_dataBig security for_big_data
Big security for_big_data
 
Adapting for the Internet of Things
Adapting for the Internet of ThingsAdapting for the Internet of Things
Adapting for the Internet of Things
 
Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – Finance
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
Big data security
Big data securityBig data security
Big data security
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of view
 
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud ComputingGlobal Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat Protection
 
Peter Grimmond – Harnessing the power of data
Peter Grimmond – Harnessing the power of dataPeter Grimmond – Harnessing the power of data
Peter Grimmond – Harnessing the power of data
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the Cloud
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 

Similar to 10 Tips for CIOs - Data Security in the Cloud

Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
drewz lin
 
S E C U R I T Y P R O B L E M W I T H C L O U D C O M P U T I N G
S E C U R I T Y  P R O B L E M  W I T H  C L O U D  C O M P U T I N GS E C U R I T Y  P R O B L E M  W I T H  C L O U D  C O M P U T I N G
S E C U R I T Y P R O B L E M W I T H C L O U D C O M P U T I N G
Martin Bioh
 
Data issue affrecting Cloud computing
Data issue affrecting Cloud computingData issue affrecting Cloud computing
Data issue affrecting Cloud computing
Martin Bioh
 
10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16
Peak 10
 
5 must haves - cloud confidence
5 must haves - cloud confidence5 must haves - cloud confidence
5 must haves - cloud confidence
Sean Dickson
 
On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud software
TCM infosys
 

Similar to 10 Tips for CIOs - Data Security in the Cloud (20)

10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
The Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses BackThe Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses Back
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Security with Cloud Computing
Security with Cloud ComputingSecurity with Cloud Computing
Security with Cloud Computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
S E C U R I T Y P R O B L E M W I T H C L O U D C O M P U T I N G
S E C U R I T Y  P R O B L E M  W I T H  C L O U D  C O M P U T I N GS E C U R I T Y  P R O B L E M  W I T H  C L O U D  C O M P U T I N G
S E C U R I T Y P R O B L E M W I T H C L O U D C O M P U T I N G
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Data issue affrecting Cloud computing
Data issue affrecting Cloud computingData issue affrecting Cloud computing
Data issue affrecting Cloud computing
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud Environments
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud Computing
 
5 must haves - cloud confidence
5 must haves - cloud confidence5 must haves - cloud confidence
5 must haves - cloud confidence
 
On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud software
 

More from Peak 10

7_Questions_DR_Plan_6-23-16
7_Questions_DR_Plan_6-23-167_Questions_DR_Plan_6-23-16
7_Questions_DR_Plan_6-23-16
Peak 10
 
10 Tech Trends for 2014
10 Tech Trends for 201410 Tech Trends for 2014
10 Tech Trends for 2014
Peak 10
 
Five Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration MethodsFive Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration Methods
Peak 10
 

More from Peak 10 (19)

7_Questions_DR_Plan_6-23-16
7_Questions_DR_Plan_6-23-167_Questions_DR_Plan_6-23-16
7_Questions_DR_Plan_6-23-16
 
IT Industry terms, a guide to getting it right.
IT Industry terms, a guide to getting it right.IT Industry terms, a guide to getting it right.
IT Industry terms, a guide to getting it right.
 
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of ChoiceTOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
 
Advantages of Converged Infrastructures
Advantages of Converged InfrastructuresAdvantages of Converged Infrastructures
Advantages of Converged Infrastructures
 
New Tampa Data Center - Peak 10
New Tampa Data Center - Peak 10New Tampa Data Center - Peak 10
New Tampa Data Center - Peak 10
 
Cloud Migration
Cloud Migration Cloud Migration
Cloud Migration
 
Buyers Guide To Cloud
Buyers Guide To CloudBuyers Guide To Cloud
Buyers Guide To Cloud
 
Governance Tips for Midmarket IT Leaders
Governance Tips for Midmarket IT LeadersGovernance Tips for Midmarket IT Leaders
Governance Tips for Midmarket IT Leaders
 
Tips for Securing ePHI in the Cloud
Tips for Securing ePHI in the CloudTips for Securing ePHI in the Cloud
Tips for Securing ePHI in the Cloud
 
Top 10 Reasons for Colocation
Top 10 Reasons for ColocationTop 10 Reasons for Colocation
Top 10 Reasons for Colocation
 
Tips For Being Compliance Ready
Tips For Being Compliance ReadyTips For Being Compliance Ready
Tips For Being Compliance Ready
 
Security Hurts Business - Don't Let It
Security Hurts Business - Don't Let ItSecurity Hurts Business - Don't Let It
Security Hurts Business - Don't Let It
 
How to solve your IT problems in 7 days
How to solve your IT problems in 7 daysHow to solve your IT problems in 7 days
How to solve your IT problems in 7 days
 
The Whats, Whys and Hows of Database as a Service
The Whats, Whys and Hows of Database as a ServiceThe Whats, Whys and Hows of Database as a Service
The Whats, Whys and Hows of Database as a Service
 
13 Tips for Cloud Security
13 Tips for Cloud Security13 Tips for Cloud Security
13 Tips for Cloud Security
 
10 Tech Trends for 2014
10 Tech Trends for 201410 Tech Trends for 2014
10 Tech Trends for 2014
 
Five Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration MethodsFive Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration Methods
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered Desktop
 
CIO: Your Survival Guide
CIO: Your Survival GuideCIO: Your Survival Guide
CIO: Your Survival Guide
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

10 Tips for CIOs - Data Security in the Cloud

  • 1. TIPS 10 FOR CIOS D ATA S E C U R I T Y I N T H E C L O U D
  • 2. NO.1 NEW PARADIGM, NEW SKILLS IT organizations are typically made up of specialists such as server technicians and network engineers. The more cloud services you introduce into your organization, the less the skills of these specialists may be required. Consider job functions with broader responsibilities and expertise that bring together IT and business management talents – integrated services manager, director of cloud services or ITIL management supervisor, for example. These professions will be increasingly necessary to direct collaborative interactions with cloud services providers (CSPs) that produce better cloud and business alignment, management and security implementations. “The more cloud services you introduce into your organization, the less the skills of these specialists may be required.” pg 1
  • 3. NO.2 OVERDOING DUE DILIGENCE A business decision as important as outsourcing to the cloud demands thorough due diligence. Indecisiveness is another matter. Employees and business managers want cloud services. If IT doesn’t make them available in a timely fashion, users will provision services themselves without giving much thought to security. In fact, a corporate ‘no cloud’ policy may only encourage them to purchase the less secure, non-enterprise versions of applications and services on their credit cards. “a corporate ‘no cloud’ policy may only encourage them to purchase the less secure, non-enterprise versions of applications and services on their credit cards.” pg 2
  • 4. NO.3 RISK VERSUS VALUE Extracting maximum value from cloud services is an exercise in risk management. Are the economic gains that a cloud solution promises greater than the risks it entails? Balancing business risk/value is new territory for many IT shops. An enormous variable in achieving balance is the CSP itself; do its capabilities, integrity (business and infrastructure) and performance history add to or diminish risk? It is imperative to find a CSP that is able to meet or augment your organization’s governance practices and all that they entail, from standards, policies and procedures to infrastructure design, monitoring and access controls. “Are the economic gains that a cloud solution promises greater than the risks it entails?” pg 3
  • 5. NO.4 YOURS, MINE OR OURS When establishing responsibilities for cloud security, assume nothing. Be clear as to your data security requirements, policies and practices. And be clear as to what data requires the highest levels of security. This is important not simply to ensure you get the right level of protection. The more security, the more costly the services are likely to be. Pay only for what you truly need for specific data sets, and demand that your CSP is able and willing to satisfy your particular requirements. Reach definitive agreement on who is responsible for what, and how these responsibilities will be met over the long term. “And be clear as to what data require the highest levels of security.” pg 4
  • 6. NO.5 SECURITY BEGINS AT HOME, PART I BYOD. Employees want their mobility and mobile access, leaving you to provide them with secure access to data and applications on any device, anywhere and at any time. Isolate corporate data, such as that stored in the cloud, from personal data on mobile devices. Consider cloud-delivered desktops that segment the access device from corporate applications and data. Simply install the connecting app on the home device; from there, everything runs on the centralized, well-managed infrastructure. Protect the data, not the device. “Employees want their mobility and mobile access, leaving you to provide them with secure access to data and applications on any device, anywhere and at any time.” pg 5
  • 7. NO.6 SECURITY BEGINS AT HOME, PART II Certain corporate and business data is accessible only to certain employees. In many ways, they hold the keys to the kingdom, having access to your most critical and valuable data assets such as databases, financial information or intellectual property. Keep their skills and your policies for handling data securely up to par. Implement stronger access control procedures. Scrutinize their on-the-job activities more closely than the average employee. “In many ways, they hold the keys to the kingdom, having access to your most critical and valuable data assets such as databases, financial information or intellectual property.” pg 6
  • 8. NO.7 LOVE YOUR DATA? ENCRYPT IT. The best cloud encryption solution is the one aligned with your enterprise’s business and security objectives. This includes understanding all internal and external data governance policies (including data privacy and residency) and compliance mandates, such as PCI, HIPAA, GLBA, Safe Harbor, etc. However, data encryption alone does not guarantee data confidentiality. That happens when an authorized team controls the encryption process and the encryption keys. When security is a regulatory requirement, or intellectual property needs protecting, enterprises should deploy and manage encryption themselves. But, a trusted cloud provider can be on the team as well; new products are coming to market that allow secure split-key responsibility. “The best cloud encryption solution is the one aligned with your enterprise’s business and security objectives.” pg 7
  • 9. NO.8 HIDE-AND-GO-SEEK Know where your CSPs’ data centers are located and where they store your data. If they move your data, you need to know that. Many CSPs spread data among different data centers, which may include those in other countries. This raises jurisdictional and compliance issues. It also can make it more difficult to retrieve your data when you want it. If you have heavily regulated data such as healthcare records or financial information, be sure the provider has the experience and the necessary third-party audit reports to satisfy all compliance requirements, and have them prove it. “It also can make it more difficult to retrieve your data when you want it.” pg 8
  • 10. NO.9 RISK MANAGEMENT ADVANTAGES Certain aspects of cloud homogeneity, centralization and virtualization can simplify event and log management, allowing potential security or resiliency problems to be spotted sooner and addressed more quickly than they could in a traditional IT environment. Once identified and fixed, automation tools allow the CSP to apply the solution throughout the infrastructure. Furthermore, CSPs can focus attention and investments in security on a small number of highly scaled environments. Ask the CSP about dashboards that let you monitor and track your data, and that give you better insight into how well its infrastructure is performing on your behalf. “Once identified and fixed, automation tools allow the CSP to apply the solution throughout the infrastructure.” pg 9
  • 11. NO.10 DON’T GO IT ALONE By 2015, more data and applications will be in the cloud than not. As the Borg said in Star Trek, “resistance is futile.” However, instead of being assimilated, assimilate the cloud into your business via a well-planned, well-executed strategy that clearly spells out your complete range of security requirements top to bottom. Don’t stop at finding a CSP that can simply do the job. Seek out a provider that is capable of contributing to your strategy, providing continuing guidance, tailoring the ideal solution and bringing ideas to the table. Cloud computing is critical to the continuing success of your business. Partner with a provider that wants to grow with you and for you. “Seek out a provider that is capable of contributing to your strategy, providing continuing guidance, tailoring the ideal solution and bringing ideas to the table.” pg 10
  • 12. Get a FREE consultation TODAY: 866.473.2510 | Peak10.com Contact us about your RFP requirements