">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Friday, February 26, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Tech

The five core principles of maintaining ownership of your data in the cloud

Brian Wafula by Brian Wafula
7 years ago
in Tech
7 min read
0

131df98By JJ Milner Managing Director at Global Micro

The number one concern that organisations have about putting their sensitive data into the cloud is security. There are five core principles that provide confidence in cloud data ownership and security.

Risk-conscious organisations should be able to take advantage of all the benefits the cloud has to offer while still maintaining full service functionality and independently securing their cloud data.

“Cloud solutions have to be secure, and have to offer organisations control over their own data security,” says JJ Milner, the managing director of Global Micro. “While cloud providers should offer assurances and SLA’s, it is also important for their clients to be able to have control over and confidence about any security measures that are in place.”

Global Micro has determined five core principles that should shape any organisation’s approach to data ownership in the cloud.

Core Principle One – Persistently protect your information

Just like matter, data exists in three states: in transit, at rest and in use. In order for enterprise data to be secure, it has to be protected persistently in all three states. If the data is not encrypted in use (that is, while being processed by a cloud service provider), it is exposed and therefore, vulnerable. Current end user best practices, as defined by the Cloud Security Alliance, now also mandates encryption in use for data hosted and processed at a cloud service provider.

Related posts

South Africa’s API developer Stitch raises $4m to make Africa a world-leader in fintech

February 25, 2021
0

Gozem appoints Othmane Bouhlal, co-founder of French ride-hailing firm Chauffeur-Privé’s to its board

February 25, 2021
0

How to Choose a Forex Broker?

February 25, 2021
0
tractor

Teenage Boy Has Created An Equipment That Lifts Objects Off The Ground

February 25, 2021
0

Core Principle Two – Control the keys, control the data

READ  U.S. Commerce Secretary Pledges to Protect a Free and Open Internet

It is a simple fact that the person or entity that controls and manages the encryption keys has effective control over the data. The customer by definition is no longer in control of their data if it is the cloud service provider that holds the encryption keys.

With direct control of the encryption keys, businesses can:

  • Maintain their responsibility for compliance requirements for adequate data protection safeguards,
  • Address data residency and privacy regulations for data stored and processed in the cloud,
  • Respond directly to government and law enforcement subpoenas for cloud data, and
  • Implement and enforce best practices for securing and governing cloud data.

Core Principle Three – Encryption must be transparent to employees and simple to manage

For employees:

  • Encryption must operate automatically in the background and not require individual employees to do anything different. In other words, encryption should NOT require people to determine whether a specific email should be encrypted or to take additional steps to send or receive messages.

For IT and Security:

  • The encryption solution should integrate into your existing IT environment as well as into the target service such as Office 365 and interoperate with existing security, management and IT solutions such as anti-virus, email hygiene, archiving and identity federation.
  • 100% of emails must automatically be encrypted with a validated encryption scheme – not deterministic word-level encryption.

Core Principle Four –Preserve application functionality

Encryption in use should not compromise the application’s functionality and critical server-side processes such as search, sort and index must continue to work.

Core Principle Five – It must be affordable and cost effective

  • Enterprises move to the cloud to gain cost efficiencies and flexibility. Encryption pricing must be affordable and preserve the value proposition of migrating to the cloud.
READ  IHS Launches Vendor Upskill Pilot Programme for its local partners in Nigeria.

“By thinking through these principles and challenging your cloud provider to deliver the necessary solutions, while not hampering functionality, your organisation can take the next steps into the cloud with the confidence that your security is not being left to chance,” says Milner.

Readers 867

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Brian Wafula

Brian Wafula

Related Posts

Startups

South Africa’s API developer Stitch raises $4m to make Africa a world-leader in fintech

February 25, 2021
0
Ride Hailing

Gozem appoints Othmane Bouhlal, co-founder of French ride-hailing firm Chauffeur-Privé’s to its board

February 25, 2021
0
Columnists

How to Choose a Forex Broker?

February 25, 2021
0
tractor
Startups

Teenage Boy Has Created An Equipment That Lifts Objects Off The Ground

February 25, 2021
0
student-bluetooth-ft
Tech

High School Student Has Created An Amazing Bluetooth Speaker Using A Water Gallon

February 25, 2021
0
nokia-image
Tech

Nairobi Court Has Summoned Former Nokia CEO For Illegally Collecting Tax Information Of A Kenyan Tech Company

February 25, 2021
0
A salesman checks a customer's iPhone at a mobile phone store in New Delhi, India, July 27, 2016. REUTERS/Adnan Abidi
Tech

iPhone Is Number One In Global Smart Phone Sales

February 24, 2021
0
uber
Tech

UK Court Confirms Uber Drivers Are Have A More “Employee” Type Relationship

February 24, 2021
0

ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

gnuGrid, Uganda’s remote off-grid monitoring startup raises $250,000 for expansion

February 25, 2021

South Africa’s API developer Stitch raises $4m to make Africa a world-leader in fintech

February 25, 2021

Usiku Games targets 8 million primary pupils to bolster STEM learning

February 25, 2021

Gozem appoints Othmane Bouhlal, co-founder of French ride-hailing firm Chauffeur-Privé’s to its board

February 25, 2021
online shop

Number Of Kenyan Internet Shoppers Drop Massively

February 25, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: