0 0 votes
Article Rating

Share to Facebook Share to Twitter Share to Linkedin Jon Stewart is the President of ZenSource, an open source platform combining CMS, enterprise level cloud hosting and support.

Getty Image

When it comes to cloud hosting and security, the abundance of vendor and service offerings is vast, given that infrastructure providers such as Amazon Web Service (AWS) and Microsoft Azure have enabled organizations to harness their depth of tools. The ability to expand around the globe and bring resources online, on-demand is more at our fingertips than ever.

However, not all providers are created equal, and configuration flexibility to secure an environment cannot be overlooked. Cloud hosting as a service does not mean automatic security. Here are five tips to help ensure your cloud can scale securely while avoiding hidden costs.

Principle Of Least Privilege

When setting up your environment, it’s imperative to grant users the minimum level of access required to perform their tasks. Start by defining the list of users and their roles to determine what access they will need to the environment. Restrict resources to only necessary connections and permissions and practice resource access limitation within their defined roles.

Network Access Control

Work on segmenting the network to isolate sensitive data and systems and ensure that only authorized services can communicate across segments. One approach is to have three subnets/segments: public, web and database. Public is the public-facing segment, so this is where the load balancer will live.

Protection Against Common Threats

Shield applications from common web exploits like SQL injection, cross-site scripting and cross-site request forgery. Integrate a web application firewall (WAF) to act as a barrier to prevent unauthorized access and data breaches.

Cloud Hosting Provider Competitive Assessment

When looking at cloud hosting providers, ensure they have a system, process and documentation in place for how they handle the above three best practices.

Cost Of Ownership

Lastly, explore the total cost of ownership and what that means for security and scale. Start by understanding what is included with the base install versus what future add-ons are. Another way to look at it: Can additional services be added, or are you pigeonholed to the vendor’s current setup?

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify? Follow me on LinkedIn. Check out my website. Jonathan Stewart Editorial Standards Print Reprints & Permissions

0 0 votes
Article Rating
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
You May Also Like

Nis projekti për shenjëzimin e rrugëve në Prizren, opozita skeptike

0 0 votes Article Rating We care about your privacy We and…

Osinbajo advocates increased IT deployment in education system

0 0 votes Article Rating From Fred Ezeh, Abuja Former Vice President…

Actress Rose McIver to direct first TV episode of ‘Ghosts’, alongside Sakina Jaffrey and Bernard White in holiday special

0 0 votes Article Rating TCF vendors Exponential Interactive, Inc d/b/a VDX.tvCookie…

Haradinaj: Mirënjohës përjetë Amerikës për secilën etapë të historisë sonë

0 0 votes Article Rating We care about your privacy We and…