Emergency Incident ResponseReport a Confirmed or Potential Breach? Call   +1 770-870-6343
0 Results Found
              Back To Results

                Cloud Security

                What is Cloud Security?

                A definition of cloud security begins with defining cloud computing. An industry accepted resource used to define cloud computing derives from the U.S. Department of Commerce – National Institute of Standards and Technology (NIST). NIST defines cloud computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction” (NIST Special Publication 800-145).

                Cloud security is the ecosystem of policies, standards, processes, controls, and technologies that aim to secure cloud computing resources - the networks, data, applications, and services - as described in NIST SP-800-145. With so many stakeholders within this ecosystem, a consensus on best practices for cloud security will take more time to mature. Cloud security will mean something different to each organisation depending on their cloud strategy. Even if cloud service customers comply with every single standard around cloud security - and there are many - it does not eliminate all risk when interacting with cloud service providers.

                Building an Effective RFP to Select a Cloud MSSP
                Building an Effective RFP to Select a Cloud MSSP

                Whether you are issuing a less formal Request for Information (RFI) document or a fully-structured Request for Proposal (RFP) document, there are many considerations to ensure you select the right Managed Security Services Provider (MSSP) for Cloud Security. Clear expectations up front help ensure that objectives and criteria are fully addressed and documented by candidates. Secureworks provides a free and useful template from which to start the MSSP selection process.

                Securely Migrating to Cloud
                Securely Migrating to the Cloud

                Organisations migrating application workloads to the public cloud face multiple alternatives, ranging from simple application like-for-like migration to refactoring to complete replacement with a native cloud solution. Although optimal migration strategies vary according to organisational objectives and application criteria, effective cloud security is a constant requirement. Migration to cloud computing is an ideal opportunity to reassess your IT architecture and recalibrate your security framework. Security is a primary goal of migration success and must be factored in up front and not bolted on at the end.

                Cloud Security is a Shared Responsibility Model

                The Cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider (CSP) and the cloud service customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected – from the ground up.

                Secureworks provides clear recommendations for securing applications and data in the cloud and focuses on security in third-party cloud Infrastructure-as-a-Service (IaaS) environments, the different stages of organisations’ deployments, and how security is shared between the Cloud Service Provider (CSP) and you as the cloud service customer.

                Protecting Critical Data in the Cloud
                Protecting Critical Data in the Cloud

                Sharing responsibility for security in the cloud means there is now someone else in your threat analysis and response chain. As a result, you need to make sure that the cloud service providers you trust are accounted for in your security programme. Even though they may have great security for the infrastructure they provide, you still have responsibility for everything above the hypervisor, or above the operating system, depending on what you are buying from the provider. Watch this video to take away some insight on protecting your critical data in the cloud.

                HELPFUL INSIGHTS FROM OUR EXPERTS

                White Papers

                Top Five Evaluation Criteria for Selecting a Cloud MSSP Read More

                Videos

                Keys to Solving Cloud Security Read More

                Webcasts

                3 Key Principles for Managing Cloud Security Risk Read More

                Talk with our cybersecurity experts

                +44 0 131 260 3040