Andrea Danti - Fotolia
Even with the most accommodating SLA, cloud data encryption should be a standard practice when data is stored in the public cloud. Encryption should start at local servers and continue across the LAN and WAN for data in-flight and data at-rest in remote cloud storage.
Both a cloud provider and user can supply encryption, so it's important to understand what the public cloud provider supplies and the gaps you'll need to fill for top-notch security. Provider-side encryption is convenient, but that means the provider has the keys to your sensitive data. Therefore, cloud providers can surrender your data to government agencies without your knowledge or consent. To avoid potential provider abuses, businesses should use user-side encryption and key management.
Be sure to find the best encryption services for your specific cloud environment. There are numerous encryption products designed for private, public and hybrid cloud users -- including Vormetric Cloud Encryption, Trend Micro SecureCloud and CipherCloud cloud data encryption gateway, among many others. Look for products that support strong standardized AES 256 block encryption. U.S. government agencies and contractors should also look for encryption products that meet FIPS 140-2 certification.
An increasing number of businesses that are considering a move to a public or hybrid cloud demand verifiable data separation. This obligates the cloud provider to ensure geographic limits on where data is actually stored and mitigate the effect of data breaches. It's a tall order, so be sure to approach cloud computing as an ongoing process, rather than a one-time endeavor.
Start small with nonessential workloads and gradually release more important content to the cloud, as experience allows. Strong encryption and careful key management are essential elements of any cloud strategy. To address changes to legal, regulatory and threat assessments, review your cloud strategy regularly. Make sure you have a fallback option if your public cloud project goes south. If the situation dictates, know how to bring sensitive data or workloads back in-house.
Stephen J. Bigelow is the senior technology editor of the Data Center and Virtualization Media Group. He can be reached at firstname.lastname@example.org.
Hackers hinder public cloud's reputation
Need for cloud encryption heightened by retail data breaches
Security enhanced in the latest cloud models
Dig Deeper on Cloud computing security
Related Q&A from Stephen J. Bigelow
Microsoft Hyper-V on Windows comes with advanced protection schemes, including several virtualization-based security features the company introduced ... Continue Reading
The BitLocker encryption technology continues to evolve from its roots as a Windows Vista feature to protect resources both in the local data center ... Continue Reading
Some enterprises avoid the public cloud due to its multi-tenant nature and data security concerns. Learn what data separation is and how it can keep ... Continue Reading