Security in the cloud

Share this article:
David Ting
David Ting
Preparing to transform to the cloud model? Most businesses focus initially on architecture and cost benefits. Security teams must be integrally involved in the discussion from the beginning – identifying potential vulnerabilities and developing policies to mitigate security concerns.

Cloud computing breaks down two barriers normally protecting your network – physical and perimeter security – and can increase the threat of unauthorized access to data and applications. Using strong authentication should be considered to ensure only properly identified employees are connected.

In addition, user education of potential security threats, vulnerabilities and adherence to proper protocols is critical to ensuring your cloud environment is secure. Users are susceptible to a variety of threats, especially socially engineered attacks. So, make sure security policies are clearly articulated and employees have an understanding of security protocols.

Businesses can no longer arbitrarily trust that the person accessing the network has authorized clearance. Transactions and access to sensitive data must be pre-empted with re-verification steps to ensure the right person is ordering medications or conducting financial transactions.

Cloud computing brings an array of benefits to businesses, but also brings new levels of vulnerabilities. Involving your security team early in the project and reviewing the security issues above ensures that operating in a cloud doesn't mean you are flying blind.



David Ting is the founder/CTO of Imprivata. He can be contacted at dting@imprivata.com
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in Opinions

Me and my job: Chris Sullivan, vice president of advanced solutions, Courion

Me and my job: Chris Sullivan, vice president ...

This month we get to know Chris Sullivan, vice president of advanced solutions at Courion.

Threat of the month: SVPENG

Threat of the month: SVPENG

We take a closer look at SVPENG, malware that's capable of launching two different types of attacks.

Security assessment stability

Security assessment stability

We should be asking if it is worth the cost of constantly switching security assessment companies, says Ken Stasiak CEO, SecureState.