Cloud security: The top tips from the experts

Stuart Sumner
clock • 23 min read

Computing asked the experts for their top tips to help businesses use the cloud securely. Here's what they said

How to find the right cloud provider (3)

Ian Trump, global security lead at LOGICnow
"Make sure the cloud vendor supports two factor authentication (2FA) or can supply a reliable add-on for 2FA. If you are using cloud services and not using 2FA, you are at high risk of being hacked.

"Ensure the cloud vendor has an audit log for user activity and compliance purposes. Without that it will be impossible to re-construct an insider or outsider breach.

"Ensure the cloud vendor has password expiry capability and a stale user report, unused accounts should be disabled and only removed after the data for that user has been archived in some manner.

"Ensure the cloud vendor has robust encryption for data in transit and any sensitive data such as user IDs and passwords are stored in an encrypted manner.

"Ensure the cloud vendor has both a mechanism and requirement in the T&Cs to alert you if a security breach of your account has taken place.

"Ensure the cloud vendor has procedures in place to verify a password reset request using an out of band mechanism, such as a phone call and account verification, to defeat social engineering attacks or malicious insider activity.

"Ensure the cloud vendor's storage and processing facilities are located in a country with the same or more robust privacy and data protection requirements as your own country.

"Ensure the cloud vendor requires your written authorisation to use your meta-data or data for any third party purpose."

 

Martyn Williams, managing director of COPA-DATA UK
"Slowly but surely, industry is starting to outline and implement cyber security standards to make industrial networks, devices, software, processes and data more secure. For example, the NIST Cyber Security Framework published in the US compiles leading practices from several standard bodies. There is no such thing as a foolproof formula, but NIST is a good place to start."

 

David Meyer, VP of product at OneLogin
"Businesses need to ensure that the vendor they choose supports industry standards. Such standards have their security aspects vetted publicly, unlike proprietary approaches some vendors use. Also, it's vital to ensure the vendor is up to date on certifications and third party reviews."

 

Jamal Elmellas, technical director at Auriga
"Be wary of thinking 'we're safe because the CSP is PCI, SOX, ISO certified'. That's untrue. They will have a specific instance such as an application, basic platform or application that may well be, but the chances are that you will be procuring a blend of services. Make sure you know what is and isn't part of that scope. For example, if you procure a tightly scoped card/payment processing application via SaaS, PCI may cover it. If you shift your entire ICT infrastructure into a CSP that claims they are ISO27001, it is highly unlikely their scope will cover your business and processes. You will need to adjust your own ISO27001 scope."

 

Sam Mager, commercial director at Krome Technologies
"Be cynical, not all cloud providers are made equal. Do your due diligence and understand the fundamentals of physical security - where is your data, who has access to the servers and how are they protected? Also, where else could they be? If your cloud provider has multiple data centres and replicates data for redundancy and protection, where is your data at any given time?"

You may also like
UK business falling short on cybersecurity warns government report

Threats and Risks

A staggering 78% of businesses lack a formal incident response plan

clock 10 April 2024 • 3 min read
Multiple China-linked groups attacking Ivanti vulnerabilities

Threats and Risks

Patches have been made available by Ivanti

clock 08 April 2024 • 2 min read
Lazarus uploading malware to open-source PyPl software repository

Threats and Risks

Supply chain attack leaves developers in Asia at particular risk

clock 12 March 2024 • 3 min read

More on Cloud and Infrastructure

Cloud adoption in 2024: Navigating AI, edge computing and the road beyond

Cloud adoption in 2024: Navigating AI, edge computing and the road beyond

CIOs are pursuing best-fit cloud solutions that avoid vendor lock-in

Eric Helmer
clock 09 April 2024 • 3 min read
WebAssembly heralds 'third wave of cloud computing'

WebAssembly heralds 'third wave of cloud computing'

Wasm: 'Speed and agility is the name of the game'

John Leonard
clock 26 March 2024 • 3 min read
Microsoft the latest to waive cloud egress fees

Microsoft the latest to waive cloud egress fees

TS&CS apply

John Leonard
clock 14 March 2024 • 2 min read