Top Five Considerations for a Secure Cloud Configuration

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Top Five Considerations for a Secure Cloud Configuration-5 Next

Watch for drift

Manage drift from hardened configurations by tactfully patching. For even better cloud efficiencies, some companies forego patching altogether and rely on a refresh from completely new server images each time.

Creating additional slack with excess roles and responsibilities may introduce complications like changes outside of maintenance windows. Even when the purpose may have been to drive business agility, the balance between short-term goals and creating potential exposures needs to be carefully weighed. Though there are exceptions, for the smoothest cloud experience, loose ends should be shored up.

Unlike traditional servers, cloud servers are pretty susceptible to outside attack if the right preparations are not made. Many enterprises don't realize or understand that security responsibilities are shared with their cloud service provider. Cloud providers are typically responsible for securing the underlying infrastructure, while the buyer is responsible for securing the specific workloads that will run in that infrastructure for IaaS.

Starting a cloud server workload without proper configuration is like putting out a beacon alerting hackers to an easy mark. In fact, a CloudPassage study called The Gauntlet showed that even a novice hacker can compromise a poorly configured cloud server in a matter of hours. 

This slideshow features five important considerations for safe configurations of cloud servers that all enterprises should cover before launching into the cloud.

 

Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

 
More Slideshows

DataM63-290x195 Data Storage Today: Key Takeaways from VMworld 2016

Survey findings include pain points for secondary storage, average restore times, the growth of hyperconvergence and rate of cloud adoption in enterprises.  ...  More >>

cloud51-190x128 5 Best Practices for Managing Zombie Cloud Infrastructure

IT administrators need to identify zombie assets, verify idle status and shut off anything that is unused. Here's how to get your dormant infrastructure back in shape. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.