https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-5653101863891512
Home Tech The five core principles of maintaining ownership of your data in the cloud

The five core principles of maintaining ownership of your data in the cloud

by Brian Wafula
0 comment

131df98By JJ Milner Managing Director at Global Micro

The number one concern that organisations have about putting their sensitive data into the cloud is security. There are five core principles that provide confidence in cloud data ownership and security.

Risk-conscious organisations should be able to take advantage of all the benefits the cloud has to offer while still maintaining full service functionality and independently securing their cloud data.

“Cloud solutions have to be secure, and have to offer organisations control over their own data security,” says JJ Milner, the managing director of Global Micro. “While cloud providers should offer assurances and SLA’s, it is also important for their clients to be able to have control over and confidence about any security measures that are in place.”

Global Micro has determined five core principles that should shape any organisation’s approach to data ownership in the cloud.

Core Principle One – Persistently protect your information

Just like matter, data exists in three states: in transit, at rest and in use. In order for enterprise data to be secure, it has to be protected persistently in all three states. If the data is not encrypted in use (that is, while being processed by a cloud service provider), it is exposed and therefore, vulnerable. Current end user best practices, as defined by the Cloud Security Alliance, now also mandates encryption in use for data hosted and processed at a cloud service provider.

Core Principle Two – Control the keys, control the data

It is a simple fact that the person or entity that controls and manages the encryption keys has effective control over the data. The customer by definition is no longer in control of their data if it is the cloud service provider that holds the encryption keys.

With direct control of the encryption keys, businesses can:

  • Maintain their responsibility for compliance requirements for adequate data protection safeguards,
  • Address data residency and privacy regulations for data stored and processed in the cloud,
  • Respond directly to government and law enforcement subpoenas for cloud data, and
  • Implement and enforce best practices for securing and governing cloud data.

Core Principle Three – Encryption must be transparent to employees and simple to manage

For employees:

  • Encryption must operate automatically in the background and not require individual employees to do anything different. In other words, encryption should NOT require people to determine whether a specific email should be encrypted or to take additional steps to send or receive messages.

For IT and Security:

  • The encryption solution should integrate into your existing IT environment as well as into the target service such as Office 365 and interoperate with existing security, management and IT solutions such as anti-virus, email hygiene, archiving and identity federation.
  • 100% of emails must automatically be encrypted with a validated encryption scheme – not deterministic word-level encryption.

Core Principle Four –Preserve application functionality

Encryption in use should not compromise the application’s functionality and critical server-side processes such as search, sort and index must continue to work.

Core Principle Five – It must be affordable and cost effective

  • Enterprises move to the cloud to gain cost efficiencies and flexibility. Encryption pricing must be affordable and preserve the value proposition of migrating to the cloud.

“By thinking through these principles and challenging your cloud provider to deliver the necessary solutions, while not hampering functionality, your organisation can take the next steps into the cloud with the confidence that your security is not being left to chance,” says Milner.

You may also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-5653101863891512
%d bloggers like this: