Cloud Security Explained

As we know that cloud is nothing but a server which we (companies) take on rent to host their websites, apps and other such data. Security is very essential in cloud computing.




Cloud Security consists of set of policies, controls and technologies that work together in union to protect cloud based systems. Cloud Security is protection of data from leakage,deletion ,data breach , session hijacking, insecure APIs,etc that can comprimise cloud security. Cloud data Security becomes important as we move our data centres, business processes to the cloud.

Benefits of Cloud Security-


  • Centralized security - As cloud centralizes aplications and data, cloud security centralizes protection. Managing the entities centrally enhances traffic analysis and web filtering.
  • Reduced cost - The big advantage of using cloud storage and security is that it eliminates need for dedicated hardware. cloud offers 24/7 proactive security.
  • Reliability - Cloud is very dependable. Users can safely access data and application without caring about the device they are using.                                                                                                                
Cloud security is grouped in two types, the security for cloud host companies and the other are the customers ie. those who use the cloud.



Security should be provided to all the three pillars of Cloud Computing which are

  • IAAS - Infrastructure As A Service - This involves automating the creation of virtual machines.
  • PAAS - Platform As A Service- It primarily supports developers, operations and DevOps team.
  • SAAS- Software As A Service-Consists of applications hosted by third party.


Various encryption techniques, penetration testing , scanning, audit , etc. is done in way to maintain and enhance the cloud seurity.Various laws and regulations are there on the use of data. In US there are various data protection laws such as Payment Card Industry Data Security Standard(PCIDSS). Cloud users may often need to be aware of all these laws.

Best Practices


  • Identity And Access Management(IAM)
  • Strategies and Policies
  • Password Control
  • Vulnerability Management
  • Encryption
  • Disaster Recovery
Stay Always Secure!

Fun Fact - A new cloud server is added for every 600 smartphones or 120 tablets in use!

Comments

Popular posts from this blog

T Bomb: SMS and Call Bomber! Hangs Your Smartphone!

Phishing: A sweet poison!

Stay Secure Always!