Security in the cloud

Share this article:
David Ting
David Ting
Preparing to transform to the cloud model? Most businesses focus initially on architecture and cost benefits. Security teams must be integrally involved in the discussion from the beginning – identifying potential vulnerabilities and developing policies to mitigate security concerns.

Cloud computing breaks down two barriers normally protecting your network – physical and perimeter security – and can increase the threat of unauthorized access to data and applications. Using strong authentication should be considered to ensure only properly identified employees are connected.

In addition, user education of potential security threats, vulnerabilities and adherence to proper protocols is critical to ensuring your cloud environment is secure. Users are susceptible to a variety of threats, especially socially engineered attacks. So, make sure security policies are clearly articulated and employees have an understanding of security protocols.

Businesses can no longer arbitrarily trust that the person accessing the network has authorized clearance. Transactions and access to sensitive data must be pre-empted with re-verification steps to ensure the right person is ordering medications or conducting financial transactions.

Cloud computing brings an array of benefits to businesses, but also brings new levels of vulnerabilities. Involving your security team early in the project and reviewing the security issues above ensures that operating in a cloud doesn't mean you are flying blind.

David Ting is the founder/CTO of Imprivata. He can be contacted at
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters


More in Opinions

Falling off the 'Wagon of Things'

Falling off the 'Wagon of Things'

The Internet of Things promises so much. And so the question arises, how are we going to keep all this 'stuff' safe and secure?

Know your traffic: The case for egress monitoring and filtering

Know your traffic: The case for egress monitoring ...

Our networks are our field; no one knows our network better than us, the people who maintain it. We need to use that to our advantage.

Breach shaming and the need for a new model to discuss data breaches

Breach shaming and the need for a new ...

The breach shaming trend impedes forward progress in preventing such incidents in the future and leaves consumers worrying without educating them.