开发者社区> 芷沁> 正文
阿里云
为了无法计算的价值
打开APP
阿里云APP内打开

5 ways to minimize the security risks of the cloud

简介: Like real clouds, cloud services have holes. The Cloud Security Alliance (CSA) has warned that the shared and on-demand nature of cloud computing intr
+关注继续查看

5_ways_to_minimize_the_security_risks_of_the_cloud

Like real clouds, cloud services have holes. The Cloud Security Alliance (CSA) has warned that the shared and on-demand nature of cloud computing introduces the possibility of new security risks that can erase any gains made by the switch to cloud technology1.

Below is a list of five ways enterprises can minimize security risks when moving to the cloud.

1. Replicate local security measures


Organizations can curtail the danger to their applications and data in the cloud if they replicate the same security processes that have worked for them on premise in the cloud, wherever possible. This measure will also build confidence in moving data over to the virtual cloud given that tried and tested methods will be employed to protect data.

2. Have a thorough understanding of your cloud service provider


It’s imperative to investigate a cloud service provider before any decision is made to adopt their services. Experienced providers understand the specific security needs of different industries, have multiple security measures available and provide timely and accessible support. Adequate understanding and careful review of any agreement to be made with a provider is also essential, especially with regard to their data breach policy as this is critical for handling emergencies.

3. Use encryption and multifactor authentication


The massive amount of data normally stored in the cloud makes the prospect of a data breach frightening since there’s a lot to lose. The CSA has recommended organizations use multifactor authentication and encryption to protect against data breaches of the cloud. A comprehensive security solution should also employ ongoing data monitoring.

4. Limit security risks prior to migration


When companies make the decision to transfer data and applications to the cloud, prior to the migration taking place, pre-emptive steps can be taken to reduce the security risks once the move is actually made. For example, CIOs can ensure their staff are trained with how to use the cloud securely once it is instituted in order to avoid security mishaps arising from human error following migration.

5. Have a cloud strategy in place


Gartner estimates that less than one-third of enterprises have a documented cloud strategy and even with the increasing adoption of the cloud, mapping out a cloud strategy is still perplexing to CIOs. This is unfortunate, because a cloud strategy can help ensure an organization is fully up to speed regarding how to protect data. An effective strategy should encompass all dimensions of security, including how to keep data secure, what to do if data is breached, what data is too risky to move to the cloud (such as confidential data) and so forth.
1https://chapters.cloudsecurityalliance.org/southwest/files/2016/04/The-2016-Dirty-Dozen.pdf

版权声明:本文内容由阿里云实名注册用户自发贡献,版权归原作者所有,阿里云开发者社区不拥有其著作权,亦不承担相应法律责任。具体规则请查看《阿里云开发者社区用户服务协议》和《阿里云开发者社区知识产权保护指引》。如果您发现本社区中有涉嫌抄袭的内容,填写侵权投诉表单进行举报,一经查实,本社区将立刻删除涉嫌侵权内容。

相关文章
使用IVX来创造一个自己的3D小游戏【后台和中台、React Core、three.js、Pixi.js、Krpano、antD......】
使用IVX来创造一个自己的3D小游戏【后台和中台、React Core、three.js、Pixi.js、Krpano、antD......】
82 0
用 React 结合 SAP UI5 Web Components 来开发 SAP Fiori 应用
用 React 结合 SAP UI5 Web Components 来开发 SAP Fiori 应用
30 0
面向未来的Web Components UI组件库
面向未来的Web Components UI组件库
359 0
AliOS Things增加自己的开发板STM32F407ZET6,使用CubeMX库
AliOS Things增加自定义开发板,使用CubeMX生成stm32f407zet6对应芯片板
988 0
在树莓派上借助Mono + Jexus 布署 .Net 4.0 WebForm应用
介绍 树莓派 树莓派是一种微型电脑,不到300元的成本就可以拥有一个4核1G的低功耗Linux环境,并且自带了40针IO,HDMI,WIFI,USB,100M网卡,SPI显示屏接口。
2003 0
Is a multi-cloud strategy the new normal?
The global enterprise market's determination to leverage big data has been synonymous with adopting cloud infrastructure.
1528 0
KMP + 求最小循环节 --- HUST 1010 - The Minimum Length
The Minimum Length  Problem's Link:  http://acm.hust.edu.cn/problem/show/1010   Mean:  给你一个字符串,求这个字符串的最小循环节。
965 0
The Top Cyber Security Risks
http://www.sans.org/top-cyber-security-risks/
511 0
+关注
芷沁
https://www.alibabacloud.com/blog/
文章
问答
文章排行榜
最热
最新
相关电子书
更多
Data Outsourcing in Cloud Computing:Reliability, Security and Privacy
立即下载
(in)security in building autom
立即下载
Testing Strategies in Microservice architecture
立即下载