Five Insights for Building Trust in the Cloud

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Five Insights for Building Trust in the Cloud-6 Next

What's the fix?

Since banning cloud services within an organization is not an option, IT executives should shift their focus toward building a secure, trusted and audit-ready (STAR) cloud environment.

Secure

A secure cloud environment has the appropriate controls to protect the confidentiality, availability and integrity of the systems and data that reside in the cloud. Appropriate procedural and technical protections are in place to protect data at rest, in transit and in use.

Trusted

A trusted cloud environment is designed to stand the test of time. It should provide high availability and resilience to adverse events.

Audit-ready

An audit-ready cloud environment has continuous compliance and is certified to meet specific industry regulations and legislation. Appropriate procedural and technical protection is in place, documented and can be verified for compliance purposes.

Not that long ago, cloud computing was little more than a speck on the horizon. We heard reports of it rapidly becoming a mainstream technology, but it had yet to make a meaningful impact on our technology landscape. According to EY's Global Information Security Survey, in 2010, 30 percent of respondents indicated that their organization used or was planning to use cloud computing-based services. In 2011, the percentage had risen to 44 percent. By 2012, cloud computing had reached a technological tipping point: Almost 60 percent of survey respondents said their organization was using or planned to use cloud computing services. And yet, 38 percent of respondents said that they had not taken any measures to mitigate the risks of using cloud computing services. This disruptive technology was advancing faster than many could secure it.

A more recent Forrester Research report suggests that for 73 percent of surveyed businesses in Europe and North America, security remains a major concern when considering cloud computing.

One of the first principles of improving information security is taking control of your environment. It would therefore feel counterintuitive for an organization to surrender control of its IT infrastructure and data to a third party. And yet this approach may offer the best opportunity to address increasingly complex security and privacy challenges. Rather than becoming an organization's worst security nightmare, cloud computing platforms may offer its best hope to create a more secure IT environment by strengthening controls and improving information and security capabilities.

Here are five insights for executives from EY for creating an environment that is secure, trusted and audit-ready.

 

Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

 
More Slideshows

Classroom tech Ten New Technologies Transforming the Classroom

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences. ...  More >>

IBM Watson How and Why Companies Are Incorporating the Power of IBM Watson

Watson continuously learns from previous interactions, gaining in value and knowledge over time. Learn how companies are harnessing that AI power to create and improve products and services. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.