DZone
Cloud Zone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
  • Refcardz
  • Trend Reports
  • Webinars
  • Zones
  • |
    • Agile
    • AI
    • Big Data
    • Cloud
    • Database
    • DevOps
    • Integration
    • IoT
    • Java
    • Microservices
    • Open Source
    • Performance
    • Security
    • Web Dev
DZone > Cloud Zone > A Checklist for Customer Cloud Security

A Checklist for Customer Cloud Security

Ben Kepes user avatar by
Ben Kepes
·
Nov. 14, 11 · Cloud Zone · Interview
Like (0)
Save
Tweet
2.38K Views

Join the DZone community and get the full member experience.

Join For Free
I often hear how Cloud is insecure from people who claim that unauthorized access is a real and significant risk for users of Cloud Computing. It always kind of frustrates me as, in my (admittedly somewhat biased) view, Cloud is as secure, if not more so, than traditional IT.

In our Cloud security whitepaper on CloudU, we spent a bunch of time talking about why Cloud Computing is in fact potentially significantly more secure than traditional models of IT delivery while at the same time pointing out the fact that there’s still stuff that organizations need to think about when using Cloud.

At the same time however we were totally realistic about the fact that there are still some things that end customers need to think about in terms of security. Sometimes the most useful thing for folks making a change is a simple checklist of things to think about and so, to that end, here’s our picks of things to think about when moving your organization to the Cloud;

  • Firewalls – Customers still need to think about controlling the traffic in, and out, of their organization. Hardware and software firewalls ensure your traffic can bunch through, but the baddies are kept at bay
  • Patches – You may be using lots of Cloud applications, but it’s still a safe bet that you have some desktop applications or, if not, at least some operating systems. These all need to have the latest versions of software running on them
  • Backups – Unless everything you have is on the Cloud, you need to think about backing up your data, preferably off-site
  • Controlling access to the Cloud – there’s no use being hyper secure if your employees leave mobile devices sitting around the place that people can access your sensitive data from. You need to think about policies and password protection for any device accessing your data
  • Staff security – your biggest threat comes form within. Hire your staff well and make sure they don’t put you at risk, either maliciously or otherwise
  • Passwords – the bane of our existence. Such an important area that we’ll come back to this one for more detail

Ensure these six points are dealt with, and you’re all set to enjoy a safe and rewarding Cloud experience.

We’re covering all things Cloud at CloudU, our Cloud Computing educational series. We’d love you to sign up to receive whitepapers and webinar invitations.



Source:
Cloud computing security

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Debugging Java Collections Framework Issues in Production
  • 7 Traits of an Effective Software Asset Manager
  • Testing Schema Registry: Spring Boot and Apache Kafka With JSON Schema
  • Unit Vs Integration Testing: What's the Difference?

Comments

Cloud Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • MVB Program
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends:

DZone.com is powered by 

AnswerHub logo