Midsize Insider

All

Cloud Security Checklist for Midsize Business

Added by on Apr 30, 2013
Topic: Security & Resiliency

Even the best systems can have cloud security flaws, but midsize businesses can avoid the pitfalls before disaster strikes by creating a checklist of security concerns before migrating to the cloud. If the IT manager creates a checklist and reviews security before deployment, many of the common mistakes can be avoided. The alternative to provisioning security can be a tragedy for the business if hackers are able to obtain data or corrupt server processes after the migration. Once the hackers are able to access the private or public cloud, it can take several weeks to recover from the damage.File:Monitor padlock.svg

Define Who Should Have Access

Current authorization technology allows the IT manager granular control of network access. This means the IT manager can provide access to each section of the network applications. Additionally, the IT manager must specify who can access the dashboard, which gives the user control to network resources. Each authorized user should be specified, so only those users can access the sections of the network necessary for job performance.

Identify Network Areas for Vulnerabilities

Vulnerabilities are typically any part of the network connected to the Internet. Firewalls are standard security hardware blocks from the Internet to the internal private cloud, but other areas can also create vulnerabilities. For instance, if the business has an application program interface (API) that communicates with internal databases or processes, an added layer can be designed to block hackers from accessing data through a vulnerable API.

Data Encryption and Passing Data on the Internet

Any data that passes outside of the internal network to the public cloud or over the Internet is vulnerable to hackers "sniffing" that data. Sniffing is a technique in which plain text data crosses over a wire, and the message can be intercepted by software or hardware devices. To protect this data, IT managers should implement encryption software to protect that data. Even though it can still be intercepted, the data will be secure and cannot be read by the hacker.

IBM offers several services that help businesses identify risks, create security checklists, and implement security plans to protect current and future data. IBM allows a midsize business to leverage its corporate software and security analysis to keep the corporate internal network safe from unauthorized users, including hackers that can steal data and corrupt work processes.

This post was written as part of the IBM for Midsize Business program, which provides midsize businesses with the tools, expertise and solutions they need to become engines of a smarter planet. Like us on Facebook. Follow us on Twitter.

Help Us Improve!

Was this article helpful?

Links from this article