fbpx
spk-logo-tm-2023
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Are You Asking The Right Cloud Security Questions?

windchill features best plm software
Written by Mike Solinap
Published on September 25, 2014

In my most recent blog articles, I discussed a few aspects an organization might want to consider when looking at a cloud-based solution. Security is one of the top issues on the list. Regardless of whether your application consists of highly sensitive patient data for example, or if it consists of already publicly available information, security is still a major concern.

Sensitive data can fall into the wrong hands, and public websites can be defaced or modified in such a way that it misrepresents the original target. So at best, your website’s main page shows that it was hacked by the Anonymous group. At worse, credit card and personal information of your customers ends up in the hands of criminals.

There are obvious questions you might want to ask yourself when considering a potential cloud provider. Are they ISO 27001 certified? Are they PCI DSS compliant? If you’re a government related entity, have they gone through DIACAP testing procedures? Additionally, you might ask what type of infrastructure hardware is being used, or who has access to the infrastructure.

However, there are less obvious questions that you may be overlooking:

Do you have the right tools to discover vulnerabilities?

For network based vulnerabilities, a product such as Nessus or Qualys is essential. For more in depth penetration testing, Metasploit is also a great tool to have in your back pocket. Metasploit for instance, can do higher level tests such as SQL injection whereas Nessus and Qualys cannot. A Metasploit “cheat sheet” is available here.

Are secure transports available?

Your application uses SSL to interact with its clients. But what about backend connections? Does your database support SSL as well? What about WAN connectivity back to corporate? Is an IPsec tunnel available?

What types of tenancy are available?

In certain situations, a customer may not be allowed to share physical hardware with other customers. Are dedicated servers available? If so, do they allow the flexibility that a typical cloud offering has? Or are you essentially forced to buy hardware configurations that don’t easily scale?

Do you need encrypted storage?

If the data being stored is extremely sensitive, it is possible to have an encrypted filesystem in the cloud. On linux, LUKS is a great tool that allows you to easily encrypt partitions. If the cloud provider has a physical breach, or if somehow someone is able to mount an image of your partition, it would be unusable.

Have you secured your own applications?

You can choose to partner with the most secure cloud provider in the world, but the solution will only be as secure as the weakest link. Focus independently upon your own application before introducing additional variables.

Next Steps:

Latest White Papers

Ultimate Guide to CI/CD

Ultimate Guide to CI/CD

CI/CD makes modern software development quicker and easier. Dive into this in-depth guide to explore what CI/CD can do for your organization.What You Will Learn Discover topics such as: CI/CD fundamentals  The benefits of CI/CD Differences between CI/CD and...

Related Resources

Cloud-Based PDM/PLM: What Engineering Leaders Should Know

Cloud-Based PDM/PLM: What Engineering Leaders Should Know

The shift to cloud-based PDM (Product Data Management) and PLM (Product Lifecycle Management) is a strategic necessity for modern engineering leaders. Traditional, on-premise systems often struggle to support the speed, scale, and distributed nature of today’s product...

How Managed Services Drive Sustainable AIOps Adoption

How Managed Services Drive Sustainable AIOps Adoption

Despite innovation and scaling attempts, many businesses still use outdated IT infrastructure that hampers agility, security, and performance. Artificial Intelligence for IT Operations (AIOps) is rapidly emerging as a solution to outdated infrastructure. Its automated...

Enhancing Security with GitLab’s Advanced Features

Enhancing Security with GitLab’s Advanced Features

In the rapidly evolving threat landscape, secure software development is essential. DevOps teams must embed security throughout the development lifecycle to reduce risks, meet compliance requirements, and deliver trustworthy applications. As a leading DevSecOps...