The Cloud (and DMS)
Conducting Cloud Operations Economically
Leveraging Cloud for Enhanced Productivity
Don't Forget the Human Side of the Artificial Intelligence Equation
VA Looks to the Cloud
Camilo Sandoval, Executive in Charge, Office of Information and Technology, U.S. Department of Veterans Affairs
Understanding the Prospects of Cloud Technology
Ramin Beheshti, CPTO, Dow Jones
Cloud - A Thoughtful Journey -Alaska Airlines Journey to Cloud...
Bob Peterson, Enterprise Architect, Alaska Airlines
Ensuring Good Weather with Clouds
Glenn Kurowski, SVP, CACI International Inc [NYSE:CACI]
Thank you for Subscribing to CIO Applications Weekly Brief
A Company Needs Both Cloud Services and the Security Team
Companies are adopting cloud computing at a faster rate. However, while choosing the best available cloud service, companies ignore their security needs thinking cloud is enough to stop hackers and miscreants. A company might notice a substantial rise in spam emails in their employee’s inbox which a security team can monitor and filter when it came through the network. Organizations falsely believe that security is the responsibility of a cloud service provider whereas safety comes after performance and scalability as the biggest responsibility. Therefore, if a breach occurs, a company still needs skilled security staff that can effectively manage risks.
Eliminating IT and security teams in place of cloud services pose a higher risk. Companies use AWS but they are not aware of the security settings, or they are not using them. Enterprises choose the “all authorized user” while expanding access to their buckets not realizing that this setting provides access to all the AWS users not just their company account. Furthermore, organizations start migrating their data to the cloud without evaluating it. This setting puts the organization at more significant risk especially if the company doesn’t have a security team.
If an organization plans to get rid of the security team, then the next plan of action is choosing the right managed security service providers (MSSP). A right MSSP can guide an organization through the ever-evolving ecosystem in the time of constant change. Additionally, the right MSSP works to overcome organizations challenges such as infrastructural challenges, software delivery needs, and compliance and auditing requirements. Choosing the right MSSP depends on the benefits offered by the vendor weighted against the risks.
The organization must determine its needs; compare the benefits offered by the vendor, evaluate the risks, and review the MSSP’s policies and procedures to make sure that they meet their standards. Identifying who owns the product and service full life cycle: configuration, patching, maintenance, reporting, and deployment, the company or the MSSP. It is not an MSSP’s duty to patch or update a system unless the service is mentioned in the contract. Pre-define who pays for what in the event of a breach. Important clauses such as minimum security standards, employee training, breach notification, insurance coverage, and response should be mentioned in the contract.