Andrea Danti - Fotolia
Even with the most accommodating SLA, cloud data encryption should be a standard practice when data is stored in the public cloud. Encryption should start at local servers and continue across the LAN and WAN for data in-flight and data at-rest in remote cloud storage.
Both a cloud provider and user can supply encryption, so it's important to understand what the public cloud provider supplies and the gaps you'll need to fill for top-notch security. Provider-side encryption is convenient, but that means the provider has the keys to your sensitive data. Therefore, cloud providers can surrender your data to government agencies without your knowledge or consent. To avoid potential provider abuses, businesses should use user-side encryption and key management.
Be sure to find the best encryption services for your specific cloud environment. There are numerous encryption products designed for private, public and hybrid cloud users -- including Vormetric Cloud Encryption, Trend Micro SecureCloud and CipherCloud cloud data encryption gateway, among many others. Look for products that support strong standardized AES 256 block encryption. U.S. government agencies and contractors should also look for encryption products that meet FIPS 140-2 certification.
An increasing number of businesses that are considering a move to a public or hybrid cloud demand verifiable data separation. This obligates the cloud provider to ensure geographic limits on where data is actually stored and mitigate the effect of data breaches. It's a tall order, so be sure to approach cloud computing as an ongoing process, rather than a one-time endeavor.
Start small with nonessential workloads and gradually release more important content to the cloud, as experience allows. Strong encryption and careful key management are essential elements of any cloud strategy. To address changes to legal, regulatory and threat assessments, review your cloud strategy regularly. Make sure you have a fallback option if your public cloud project goes south. If the situation dictates, know how to bring sensitive data or workloads back in-house.
Stephen J. Bigelow is the senior technology editor of the Data Center and Virtualization Media Group. He can be reached at email@example.com.
Hackers hinder public cloud's reputation
Need for cloud encryption heightened by retail data breaches
Security enhanced in the latest cloud models
Dig Deeper on Cloud computing security
Related Q&A from Stephen J. Bigelow
While the Windows Admin Center is one way to manage the Azure Stack HCI platform, you can also use traditional, battle-tested tools. Continue Reading
There are many tools available on the AWS Marketplace for QA testing, making it difficult to determine where to begin. What should an enterprise look... Continue Reading
Hyper-converged infrastructure that runs on Windows Server is not a new concept, but Microsoft's Azure Stack HCI program has one big difference from ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.