Professional Documents
Culture Documents
Lalitha
16251A0525
As the cloud continues to mature, the possibility of permanent data loss is high.
Make sure that whatever happens, you have a secure backup of that data.
IT managers should distribute data and applications across multiple zones for
added protection, as well as adhere to best practices in daily data backup,
offsite storage and disaster recovery.
the location of your stored data is important — but nowhere near as important
as who has access to it.
Be proactive and put security measures in place to make sure that your data is
protected.
Rather than utilizing one too many passwords, implement single sign on (SSO)
authentication capabilities.
4. Encryption is key.
Cloud encryption is critical for protection. It allows for data and text to be
transformed using encryption algorithms and is then placed on a storage cloud.
Do not store encryption keys in the software where you store your data. IT
teams need to keep physical ownership of encryption keys as well as vet the
strength of the encryption techniques being used.
CC ASSIGNMENT M.Lalitha
16251A0525
Since files are zipped and encrypted with passwords, it’s important to choose
one wisely. Most passwords — 90%, to be exact — can be cracked within
seconds.
When putting measures in place to protect your cloud, think like a criminal. One
of the best ways to do this is penetration testing: an IT security practice
designed to identify and address vulnerabilities as well as minimize cloud
security threats
Certifying a cloud application is only the beginning. Make sure you have the
right cloud application governance process in place to ensure compliance with
internal and external data privacy mandates.
Train your information workers and enforce usage policies, conduct periodic
health checks and risk assessments, and stay alert to the ever-changing security
landscape.