On Cloud Security
Dispelling the myth of on-premise security being superior to Cloud is understandably hard. There is very little risk of data loss, the placebo of having the option to add anti-virus software, “impregnable” firewalls to combat unauthorized access, etc., are all good enough reasons to be content and stay with an on-premise system.
However, the notion of Cloud security being inferior to an on-premise system is simply isn’t true. Almost every data breach have happened on traditional on-premise systems. The high profile ‘iCloud’ hack was a rarity and it had more than its fair share of the spotlight and it was mostly because the subject. Experts are in consensus that the perimeter security remains the same for both the systems but the Cloud, by design, makes it almost impossible to locate a particular file.
Everything from the transition time of the on-premise application to the Cloud, acts of God like earthquakes and other natural disasters, DoS from service providers, all weighs in on the decision to migrate.
Although the above scenarios might sound like good enough deterrents against moving to the Cloud, The fact is that companies that go Cloud rarely go back. The benefits are too good to ignore. The conservative strategy for an organization’s first Cloud move is to test it out with non-critical workloads and gradually move the rest.
Will Existing Workflows Work Readily On The Cloud
Migrating your existing workflows to the Cloud is not just a ‘lift and shift’ effort. Whether built with native tools or out-of-the-box applications, the migration requires some maneuvers to get it working right.
Factors like a government approved encryption methodology, data storage within a country’s shores are often overlooked when moving to Cloud. It is very important to consult with the Cloud provider about the above-mentioned considerations and among others. Usually, service providers will comply with these requests and arrangements can be made to accommodate various regulations.
Who controls it
As the Cloud provider usually possesses the data, the encryption key, access to workflows, it can be ambiguous to know under what circumstances your data is vulnerable to third party apps, government disclosure requests, etc. It is an imperative that organizations must deploy different types of control mechanism must be maintained and audited to ensure your data is protected in most cases.