Cloud Computing & Hosted PBX News – Dallas, TX
Cloud Computing & Hosted PBX News – Dallas, TX

Five Steps To Secure Cloud Computing

cloud-security-stepsHPE has identified the five key capabilities necessary for securing a hybrid cloud environment:

Data-centric security: Protecting data is the core of security and compliance controls. Data needs to be secured at rest, in motion and while in use. It should maintain an index with a searchable data format after it is protected and the encryption should be multi-layered.

Dynamic infrastructure hardening: Just like on-premises machines, the cloud infrastructure needs to be updated and hardened to reduce attack surfaces. Traffic between virtual machines needs to be secured, and core operating systems should be patched and hardened to prevent hypervisor breakouts.

Monitor, detect and respond to breaches and security events: Businesses need complete visibility into all parts of their hybrid cloud environments. There must be a method to collect and analyze log data from multiple sources into a single location and format. The data must be meaningful and actionable—providing specific steps and actions for a coordinated response from security teams.

Continuous regulatory compliance: Compliance is critical. A cloud solution must adhere to a consistent set of auditable controls across the entire hybrid cloud environment. The model should be policy-based and include integrated tools that automatically check for compliance drift against common regulatory standards.

Shared access management: The hybrid cloud solution must also have a common method for shared identity and access management across all components. It should include a portal for administrative functions, as well as an integration point with the established enterprise directory services. Ideally, it would also offer a federated single sign on (SSO) for multiple cloud environments.

Author: Chris Steffen

Source

Brian