Even with the most accommodating SLA, cloud data encryption should be a standard practice when data is stored in...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
the public cloud. Encryption should start at local servers and continue across the LAN and WAN for data in-flight and data at-rest in remote cloud storage.
Both a cloud provider and user can supply encryption, so it's important to understand what the public cloud provider supplies and the gaps you'll need to fill for top-notch security. Provider-side encryption is convenient, but that means the provider has the keys to your sensitive data. Therefore, cloud providers can surrender your data to government agencies without your knowledge or consent. To avoid potential provider abuses, businesses should use user-side encryption and key management.
Be sure to find the best encryption services for your specific cloud environment. There are numerous encryption products designed for private, public and hybrid cloud users -- including Vormetric Cloud Encryption, Trend Micro SecureCloud and CipherCloud cloud data encryption gateway, among many others. Look for products that support strong standardized AES 256 block encryption. U.S. government agencies and contractors should also look for encryption products that meet FIPS 140-2 certification.
An increasing number of businesses that are considering a move to a public or hybrid cloud demand verifiable data separation. This obligates the cloud provider to ensure geographic limits on where data is actually stored and mitigate the effect of data breaches. It's a tall order, so be sure to approach cloud computing as an ongoing process, rather than a one-time endeavor.
Start small with nonessential workloads and gradually release more important content to the cloud, as experience allows. Strong encryption and careful key management are essential elements of any cloud strategy. To address changes to legal, regulatory and threat assessments, review your cloud strategy regularly. Make sure you have a fallback option if your public cloud project goes south. If the situation dictates, know how to bring sensitive data or workloads back in-house.
Stephen J. Bigelow is the senior technology editor of the Data Center and Virtualization Media Group. He can be reached at firstname.lastname@example.org.
Hackers hinder public cloud's reputation
Need for cloud encryption heightened by retail data breaches
Security enhanced in the latest cloud models
Dig Deeper on Data security in the cloud
Related Q&A from Stephen J. Bigelow
VMware AppDefense secures an application by monitoring deviations from its normal behavior. Its core functions establish a baseline, measure behavior...continue reading
Whether it's C, Java or Adobe, it's important to understand the differences among runtime environments. Expert Stephen J. Bigelow outlines the ...continue reading
Improve the integrity of vRealize Automation backups by minimizing active transactions, backing up appliances and databases simultaneously and ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.