Cloud Security Overview

How many of us have taken the time to consider all of the ramifications of putting our I.T., that is our data, into the cloud in some form or other?

  • Facilities where the cloud vendor’s equipment resides
    • Controlled Access
    • 24x7x365 On-Site Security
    • Uptime Institute Certified Tier I, II, III, IV, or V
    • True A/B or A/B/C Power Grids with isolated generators per power channel
    • Filtered Air
    • Hot and Cold aisle that isolate and better improve cooling efficiency
  • How are tenant environments backed up
  • How the tenant environments are isolated from each other if at all
    • Does the Cloud Vendor have tenants protected from an encryption event
    • Are the tenant environments running side-by-side with the cloud vendor’s production network
    • Tenants and Cloud Vendors share Resources leading to encryption event risk across the board
  • Is there a backup ability that allows us to pull our data out
  • Secure access of the tenant environment
    • Is Two-Factor Authentication Available
    • Are Vendor provided usernames and passwords easy to crack

Please keep an eye on this page. It is a living document with more information and guidance to be had soon!