dcsimg

5 Big Mistakes in Securing Cloud Application Data

  • 5 Big Mistakes in Securing Cloud Application Data-

    Weak Expiration Policies

    Weak expiration policies for authenticated sessions (tokens and cookies)

    End users, employees, mobile devices and third-party applications all connect to your cloud applications. Whenever a user or a client program logs into a cloud application, they receive an authenticated session from the application. In many cases, those sessions are left open after the interaction is complete. A hacker who gains access to this session has essentially found the key to take over the user's session and assume the identity of that user. This is a very dangerous attack that compromises all of your cloud data.

    To limit this exposure, you can create a strong policy to automatically end sessions for users and clients that are inactive for more than 30 minutes.

1 | 2 | 3 | 4 | 5 | 6 | 7

5 Big Mistakes in Securing Cloud Application Data

  • 1 | 2 | 3 | 4 | 5 | 6 | 7
  • 5 Big Mistakes in Securing Cloud Application Data-2

    Weak Expiration Policies

    Weak expiration policies for authenticated sessions (tokens and cookies)

    End users, employees, mobile devices and third-party applications all connect to your cloud applications. Whenever a user or a client program logs into a cloud application, they receive an authenticated session from the application. In many cases, those sessions are left open after the interaction is complete. A hacker who gains access to this session has essentially found the key to take over the user's session and assume the identity of that user. This is a very dangerous attack that compromises all of your cloud data.

    To limit this exposure, you can create a strong policy to automatically end sessions for users and clients that are inactive for more than 30 minutes.

In today's increasingly flexible work environment, many organizations implement and rely on cloud services like Salesforce®, Google Apps for Business™, Microsoft® Office 365™ and Box to streamline business functions, increase resource utilization and enhance corporate elasticity. Yet without proper data protection, enterprises run the risk of exposing sensitive, proprietary information.

Cloud service providers (CSPs) and their customers share responsibility for security. While cloud service providers have seen improvements in securing their platforms and offering tools to help with security, customers find it difficult to keep up with all of the responsibilities related to securing their apps. Gartner predicts that through 2020, 95 percent of cloud security failures will be the customer's fault.

To avoid such failures, Ganesh Kirti, CTO of Palerra, has put together a list of the five most common mistakes that enterprises make and provides suggestions for keeping your cloud environment safe moving forward.