Brokering the Cloud Services
The Cloud (and DMS)
Conducting Cloud Operations Economically
Leveraging Cloud for Enhanced Productivity
Making The Best Use Of Public Cloud Infrastructures
Waylan Johnson, Vp, Cloud Architecture & Operations, Swbc
Reaping what you sow from Cloud computing in variable Industries
Enrique Leon, Director, Cloud Services, American Sugar Refining
From Sceptic to Believer, My Path to Cloud Security
Rhys Macfarlane, Chief Security Officer, Luxury Escapes
Planning for a successful cloud-based strategy
Simon Marley, Associate Director, Cloud Architect, Willis Towers Watson
Thank you for Subscribing to CIO Applications Weekly Brief
Top Cloud Security Best Practices for 2022
Experts advise organizations to look for an IAM solution that allows them to define and enforce access policies on the basis of the principle of least privilege. These policies should also be based on permission capabilities based on roles.
Fremont, CA: Security has been the primary concern among enterprises considering the public cloud since the dawn of the cloud computing era. Many organizations believe that storing data or running applications on infrastructure that they do not directly manage is inherently risky.
In this article, we are discussing top best practices for cloud security:
Deploying an Identity and Access Management Solution
Unauthorized access is the fourth biggest threat to public cloud security identified in CloudPassage's report (and growing – 53 percent, up from 42 percent in 2020). While the methods used by hackers to gain access to sensitive data become more sophisticated with each new attack, a high-quality identity and access management (IAM) solution can help mitigate these threats.
Experts advise organizations to look for an IAM solution that allows them to define and enforce access policies on the basis of the principle of least privilege. These policies should also be based on permission capabilities based on roles. Furthermore, multi-factor authentication (MFA) can reduce the risk of malicious actors gaining access to sensitive information, even though they steal usernames and passwords.
Organizations should also look for an IAM solution that works in hybrid environments, including private data centers and cloud deployments. This can simplify end-user authentication and make it much easier for security staff to ensure that policies are enforced consistently across all IT environments.
Understanding Your Shared Responsibility Model
The enterprise is solely responsible for all security issues in a private data center. However, things are much more complicated in the public cloud. While the cloud customer is ultimately responsible for IT security, the cloud provider assumes responsibility for some aspects of IT security. This is referred to as a shared responsibility model by cloud and security professionals.
Leading IaaS and platform as a service (PaaS) providers, such as Amazon Web Services (AWS) and Microsoft Azure, offer documentation to their customers so that all parties understand where specific responsibilities lie based on the type of deployment. The diagram below, for instance, shows that Microsoft is responsible for application-level controls in software as a service (SaaS) models, but the customer is responsible for IaaS deployments. Microsoft and its customers share responsibility for PaaS models.