Cyber security in a cloud world



Some useful advice for managing the security of your data in today’s increasingly cloud-based world.

A recent posting in Security Week begins by enumerating several benefits the cloud may provide to strengthen security – “unlimited storage capabilities for global threat intelligence and historical data, powerful processing capabilities for security analytics, and the ability to deploy security technologies to even the most remote outposts.” However, author Marc Solomon cautions that security teams need to “think about how attackers are now banking on the increasing usage of Software as a Service apps based in the cloud and the advent of Shadow IT to steal valuable digital assets.

Being able to understand and address the main security challenges cloud apps can introduce to your organization requires visibility into what data is stored in the cloud as well as the contextual factors of how that data is being accessed or used. To help the reader, he lists and explains several questions to ask:

  • Which cloud apps are employees using and what risks do they add?
  • What files and data are exposed through these cloud apps?
  • Can I control the sensitive data shared through cloud-based apps?
  • If an attack happens, can I get to the bottom of it and set policy to prevent future attacks?

File sharing is much more fluid in a cloud-based world. Hence, you need a comprehensive way to prevent sensitive data from being uploaded for inappropriate sharing. This visibility into data and activities provides the ability to detect anomalies, conduct further investigation and take quick and decisive action.

There’s no arguing that, as Solomon puts it, the cloud is “transformative in its impact to create new business models, enable more effective collaboration, and increase productivity and agility.” However, being able to take advantage of these features requires that business take measures to address the increased risk of malicious or accidental leakage of protected or other sensitive business-critical data within and beyond the traditional security perimeter – including cloud storage. Those measures will require a combination of the right technology, security policies, and an educated user base. As Solomon is quick to point out, this can only be achieved by creating an organizational security culture in which all stakeholders work together toward building a strong defense will be most likely to thrive under the immense pressures coming from cyberattacks.

Rosella Fernandez

Yansi keim (not verified) | November 10, 2015 7:03 am

With increasing usage of Software as a Service apps based in the cloud, increasing is the number of threats to this platform as well. What primary measures should be taken care for answering

1. Which cloud apps are employees using and what risks do they add?
2.What files and data are exposed through these cloud apps?
3.Can I control the sensitive data shared through cloud-based apps?
4. If an attack happens, can I get to the bottom of it and set policy to prevent future attacks?

Nate Lord | November 10, 2015 12:06 pm

Hey Yansi - good question. Here's another blog post on cloud security that covers many of the measures required: https://digitalguardian.com/blog/8-step-framework-secure-cloud-adoption

-Nate

Please post your comments here

Digital Guardian Data Loss Prevention

Read how Digital Guardian for DLP gives you everything you need to stop sensitive data from getting out of your organization. 

Read now

Related Articles
6 Tips for Protecting Your Personal Data in the Cloud

Cloud computing brings critical convenience to our work and personal lives, but with that convenience comes security risks and challenges. These 6 tips offer some basic hygiene for cloud data protection that end users and businesses alike should follow.

Differences Among InfoSec Cloud Delivery Models (IaaS, SaaS, and PaaS) – and How to Choose

When it comes to cloud models, there are a lot to choose from: SaaS, PaaS, and IaaS. What's the difference? How do you choose? Discover the benefits and features of all three in this breakdown.

4 Steps to Keeping Patient Data in the Cloud Protected

Once patient data has been migrated to the cloud securely, it will require ongoing protection against loss or unauthorized access. Follow these four steps to keep cloud-based data protected in an ongoing basis.