Security in the cloud

Share this article:
David Ting
David Ting
Preparing to transform to the cloud model? Most businesses focus initially on architecture and cost benefits. Security teams must be integrally involved in the discussion from the beginning – identifying potential vulnerabilities and developing policies to mitigate security concerns.

Cloud computing breaks down two barriers normally protecting your network – physical and perimeter security – and can increase the threat of unauthorized access to data and applications. Using strong authentication should be considered to ensure only properly identified employees are connected.

In addition, user education of potential security threats, vulnerabilities and adherence to proper protocols is critical to ensuring your cloud environment is secure. Users are susceptible to a variety of threats, especially socially engineered attacks. So, make sure security policies are clearly articulated and employees have an understanding of security protocols.

Businesses can no longer arbitrarily trust that the person accessing the network has authorized clearance. Transactions and access to sensitive data must be pre-empted with re-verification steps to ensure the right person is ordering medications or conducting financial transactions.

Cloud computing brings an array of benefits to businesses, but also brings new levels of vulnerabilities. Involving your security team early in the project and reviewing the security issues above ensures that operating in a cloud doesn't mean you are flying blind.



David Ting is the founder/CTO of Imprivata. He can be contacted at dting@imprivata.com
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in Opinions

Technology alone isn't going to secure IoT connected devices

Technology alone isn't going to secure IoT connected ...

It's clear that vulnerabilities continue to exist, despite our best efforts to combat them. In fact, we have addressed many of the same problems before.

DDoS is the new spam...and it's everyone's problem now

DDoS is the new spam...and it's everyone's problem ...

As new solutions emerge, it's critical for organizations to protect themselves by being informed, aware, and acting whenever possible. Those that don't take action are playing a very dangerous game.

Securing the autonomous vehicle

Securing the autonomous vehicle

We are now in the fast lane towards a driverless future. Will we have to brake for hackers?