Q
Manage Learn to apply best practices and optimize your operations.

How can I ensure the best cloud storage security?

Security is a major concern for every enterprise storing data in the cloud. What are the best methods to keep our data safe and secure in the cloud?

Security is a major concern with many IT services, including cloud storage. Enterprise-class cloud storage providers...

offer several tools to protect business data and control access. What cloud storage security concerns are real and what types of questions should enterprises ask when selecting a cloud storage provider?

Encryption is an essential piece of cloud storage. Enterprises must select a cloud storage provider that supports encryption in flight and at rest. Amazon Web Services (AWS) can move data to or from Simple Storage Service (S3) across an SSL connection and protect that data using AES-256 encryption.

AWS offers several key management methods and can manage encryption keys for its customers or encrypt data using keys the enterprise provides. By comparison, Google uses default AES-128 encryption and key management for data at rest.

Still, some companies are uneasy with the idea of cloud storage providers holding the keys to business data. To address encryption key management concerns, cloud storage users can encrypt data and manage keys on the user side with a tool such as Amazon S3 Encryption Client. And to secure data before it moves across the Internet to the cloud provider, enterprises can choose available third-party encryption tools such as Viivo, Sookasa or Cloudfogger.

Most large cloud storage platforms are very secure, but enterprise IT still must do its share in protecting data. AWS' shared responsibility clause, for example, points to IT's obligation to secure their operating systems, data and applications within the system.

Additionally, enterprise-class cloud storage users can look for authentication or access control mechanisms like access control lists, multifactor authentication, multifactor delete protection and requirements for strong logon credentials. Event notifications can alert IT teams when someone attempts to access the data, adds data to the store, or takes other actions. This administrative control can provide oversight that meets some regulatory or governmental requirements.

Stephen J. Bigelow is the senior technology editor of the Data Center and Virtualization Media Group. He can be reached at sbigelow@techtarget.com.

Next Steps

Best cloud security advice from 2014

Recent retail breaches highlight need for cloud encryption

Cloud data security is necessary, but costly

This was last published in December 2014

Dig Deeper on Data security in the cloud

PRO+

Content

Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Knowledge. Smart use. Secure pathways to your account and data. Trusted providers. That's it in a nutshell. And backups...always backups!
Cancel

-ADS BY GOOGLE

SearchServerVirtualization

SearchVMware

SearchVirtualDesktop

SearchAWS

SearchDataCenter

SearchWindowsServer

SearchCRM

Close