Is cloud computing secure?
In the latest of our cloud computing exploration features, we look at the issue of security.
That does take some of the load off your IT team, though, as you're handing over both infrastructure and OS security to your cloud service provider.
SaaS is both the simplest and the hardest to deal with. It's simple, in that all your security needs are taken care of by the service provider. It's also the hardest, because that means you need to trust your SaaS vendor or at least ensure that you have a legally binding agreement which includes security provisions. You'll need to be sure that you're complying with the appropriate regulations, and that you've got a secure connection to your provider's applications using more than just simple passwords!
Getting that trust right is important to Salesforce.com, according to Tim Barker, the company's vice president of marketing in Europe, the Middle East and Africa (EMEA).
He describes it as a "consistent focus," adding "We started building with security in mind, to be a service that users trust".
But it's not good enough to be trusted for what you say, and that trust needs to be verified. "We work to ISO 27001 standards, with third party accreditation, and we're also evaluated by prospective customers who send in their own security people. So we're probably more regularly reviewed than any other vendor, right down to code reviews," Barker added.
Mike Lingo , chief technology officer at Astadia, echoes the need for an audit of cloud services as part of ensuring compliance. "Customers need to assert that their vendors are compliant with best practices for processing in their environment by reviewing things like SAS 70 compliance, which is obviously the standard vendors will work towards," he said.
"Further, you'll want to know for mission-critical or system-critical apps that a Type II audit was performed."
That actually adds up to a security advantage for cloud services, as Lingo points out that "a well-established vendor's cloud solution has probably had much much more money spent on its infrastructure, security and competencies than an internal IT shop can often afford".
In This Article
BIOS security: The next frontier for endpoint protection
Today’s threats upend traditional security measuresDownload now
The role of modern storage in a multi-cloud future
Research exploring the impact of modern storage in defining cloud successDownload now
Enterprise data protection: A four-step plan
An interactive buyers’ guide and checklistDownload now
The total economic impact of Adobe Sign
Cost savings and business benefits enabled by Adobe SignDownload now