preview

Cloud Case Study

Decent Essays

Going to the Cloud is like switching off your electricity generator and moving to the power grid. Cloud mobility and the Internet of Things (IoT) has provided businesses with greater flexibility in the services they offer and the improvement of processes behind those offerings. With the driving of Cloud based applications, primarily motivated by the benefits of the fast on-demand availability of big tech cloud providers such as Amazon AWS, Google Cloud and Microsoft Azure – new types of services are beginning to replace functions that were traditionally done in-house.

What is often missed is the reality that the increased use of cloud services is driving further breaches of unauthorized access of sensitive information in the cloud, …show more content…

You also need to ensure your Cloud is backed up regularly, and those backup images are stored securely offsite a safe distance away. It is also best-practice to ensure those backups remain encrypted to avoid compromise, stored offline and require multi-factor authentication when access is required.

In the event of a crisis when your office space may not be available, your backup data won’t be affected and your employees will be able to log in remotely.

3. Design effective policies and procedures, and educate your staff on them!

Create an appropriate use policy for your cloud applications, which defines key terms, proper use methodology, details what is permitted, objectives and responsibilities. Effective governance is half of security. Your policies also need to demonstrate an incident response plan and which third party service provider you have engaged to manage threats should they become apparent.

Policies should also be reviewed annually, and processes should be audited by an external service provider to ensure integrity and efficiency.

Provide training material to employees that highlights the appropriate use policy, and for best practice, provide a regular training assessment to educate for proper practice.

If any high risk issues or breaches are identified in a period, the governance team should also schedule the policies for review and revise the training accordingly.

4. Don’t compromise on

Get Access