Andrea Danti - Fotolia
Even with the most accommodating SLA, cloud data encryption should be a standard practice when data is stored in the public cloud. Encryption should start at local servers and continue across the LAN and WAN for data in-flight and data at-rest in remote cloud storage.
Both a cloud provider and user can supply encryption, so it's important to understand what the public cloud provider supplies and the gaps you'll need to fill for top-notch security. Provider-side encryption is convenient, but that means the provider has the keys to your sensitive data. Therefore, cloud providers can surrender your data to government agencies without your knowledge or consent. To avoid potential provider abuses, businesses should use user-side encryption and key management.
Be sure to find the best encryption services for your specific cloud environment. There are numerous encryption products designed for private, public and hybrid cloud users -- including Vormetric Cloud Encryption, Trend Micro SecureCloud and CipherCloud cloud data encryption gateway, among many others. Look for products that support strong standardized AES 256 block encryption. U.S. government agencies and contractors should also look for encryption products that meet FIPS 140-2 certification.
An increasing number of businesses that are considering a move to a public or hybrid cloud demand verifiable data separation. This obligates the cloud provider to ensure geographic limits on where data is actually stored and mitigate the effect of data breaches. It's a tall order, so be sure to approach cloud computing as an ongoing process, rather than a one-time endeavor.
Start small with nonessential workloads and gradually release more important content to the cloud, as experience allows. Strong encryption and careful key management are essential elements of any cloud strategy. To address changes to legal, regulatory and threat assessments, review your cloud strategy regularly. Make sure you have a fallback option if your public cloud project goes south. If the situation dictates, know how to bring sensitive data or workloads back in-house.
Stephen J. Bigelow is the senior technology editor of the Data Center and Virtualization Media Group. He can be reached at firstname.lastname@example.org.
Hackers hinder public cloud's reputation
Need for cloud encryption heightened by retail data breaches
Security enhanced in the latest cloud models
Dig Deeper on Data security in the cloud
Related Q&A from Stephen J. Bigelow
Though the Open19 initiative and Open Compute Project seem to have a similar goal, they do differ in type of support, hardware requirements and ... Continue Reading
A do-it-yourself approach with hyper-converged infrastructure can lead to trouble when software-defined features just won't work. See how the WSSD ... Continue Reading
With the right tools and resources, VM backup and recovery can be easier. Consider factors such as product compatibility and future business needs ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.