42. Key Takeaway – Securing the Cloud
Operations
§ Encrypt data when possible, segregate
key management from cloud provider
§ Adapt secure software development
lifecycle
§ Understand provider’s patching,
provisioning, protection
§ Logging, data exfiltration, granular
customer segregation
§ Hardened VM images
§ Assess provider IDM integration, e.g.
SAML, OpenID
Governance
§ Secure cloud engagement before
procurement – contracts, SLAs,
architecture
§ Know provider’s BCM/DR, financial
viability, employee screening
§ Identify data location when possible
§ Plan for provider termination & return
of assets
§ Preserve right to audit
§ Reinvest provider cost savings into due
diligence
43. For more information, contact: ACinfotec Consulting Services
02-670-8980-3 | services@acinfotec.com | www.acinfotec.com
THANK YOU
DRIVING BUSINESS EXCELLENCE