Top Five Considerations for a Secure Cloud Configuration

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Top Five Considerations for a Secure Cloud Configuration-6 Next

Continuously watch for anomalies

Even when we are as diligent about security hygiene as possible, sometimes threatening situations still occur. Having a team that is rewarded for being 'all hands on deck' about security in these dynamically changing cloud conditions and elastic compute environments is vital to responding to breaking conditions.

Anomalies can suddenly appear or fly under the radar. Traditional security isn't able to keep pace in these environments and, worse, can weigh down cloud flexibility.

Heuristic monitoring takes too long to discern actionable patterns. Getting a baseline of every server is a waste, since each propagated from known good images. Monitoring for file changes and configuration changes, like adding a user account, gives a more streamlined approach for anomalous behavior that can be thwarted quickly.

Unlike traditional servers, cloud servers are pretty susceptible to outside attack if the right preparations are not made. Many enterprises don't realize or understand that security responsibilities are shared with their cloud service provider. Cloud providers are typically responsible for securing the underlying infrastructure, while the buyer is responsible for securing the specific workloads that will run in that infrastructure for IaaS.

Starting a cloud server workload without proper configuration is like putting out a beacon alerting hackers to an easy mark. In fact, a CloudPassage study called The Gauntlet showed that even a novice hacker can compromise a poorly configured cloud server in a matter of hours. 

This slideshow features five important considerations for safe configurations of cloud servers that all enterprises should cover before launching into the cloud.


Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

More Slideshows

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

cloud50-190x128.jpg How to Use the Cloud to Become a High-Velocity Business

Cloud SaaS adoption allows organizations to gain the flexibility and scalability necessary for creating a high-velocity business. ...  More >>

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.