Cloud and Cyber Security professionals indicate that their top concerns with cloud solutions
include lack of control over data location, potential for third party
access, and lack of visibility on the part of the service provider.
To level-set this discussion let's define the three standard cloud computing models: Platform, Infrastructure and Software ... all "As a Service" . Top mitigation strategies include: 1) Regularly update your in-house software, 2) Implement end-to-end encryption, 3) Work with a third party to assure cloud security on a regular basis, 4) Utilize a Single Sign-on (SSO) solution to add security, and 5) Do your due diligence when researching a cloud solution. Which mitigation strategies are best fitted for the 2016 cloud security landscape? Share your recommendations with the Cloud and Cyber Security Center: http://cloudandcybersecurity.blogspot.com/
To level-set this discussion let's define the three standard cloud computing models: Platform, Infrastructure and Software ... all "As a Service" . Top mitigation strategies include: 1) Regularly update your in-house software, 2) Implement end-to-end encryption, 3) Work with a third party to assure cloud security on a regular basis, 4) Utilize a Single Sign-on (SSO) solution to add security, and 5) Do your due diligence when researching a cloud solution. Which mitigation strategies are best fitted for the 2016 cloud security landscape? Share your recommendations with the Cloud and Cyber Security Center: http://cloudandcybersecurity.blogspot.com/
No comments:
Post a Comment