Author: Chris Crellin A recent of 300 IT decision makers, conducted by research firm Vanson Bourne on behalf of Barracuda Networks, found that 44 percent of the respondents’ IT infrastructure is now on a public cloud. This isn’t a big surprise; after all there are often big cost-savings to moving IT workloads to the public cloud. The trend also suggests that many companies don’t want to deal with the headaches that come with managing on-premises IT systems. What 68 percent of companies don’t realize (per the survey), however, is that public cloud providers only protect their platforms — not the data and applications that are housed inside. The fact is that the public cloud is built on a shared responsibility model, which means the cloud provider has some security responsibilities, but customers bare part of the burden as well. This misunderstanding is also leading to some big problems. For example, a recent study by found 7 percent of all Amazon S3 servers are exposed, a problem that is believed to be behind numerous data leaks over the past few months, such as information on 198 million American voters, 14 million Verizon customers, and several Viacom networks.
To ensure your customers don’t become the next victim, educate them about additional security measures they should be taking to protect their data in the public cloud. What’s safe – and what isn’t – in the public cloud? In the shared responsibility model used by vendors like AWS, Microsoft Azure, and Google Cloud Platform, cloud providers are responsible for protecting the physical infrastructure, network infrastructure, and virtualization layer that comprise the cloud platform. The user’s share of security responsibility includes: network security, identity and access control, operating systems, and data encryption. Must-haves for public cloud protection 1.
Password best practices. When it comes to identity and access control, inadequate passwords are a top concern in the public cloud — just like they are with on-premises computing. Several studies have come out in the past few years indicating that at least.
In addition to turning off password defaults (e.g., “admin”), it’s important to ensure passwords are at least eight characters long with a mix of both uppercase and lowercase letters, in addition to containing numbers and symbols. Apart from being strong and unique, passwords also need to change frequently. Two-factor authentication. Two-factor authentication is another step companies should consider taking to further reduce the chances of getting hacked. All festival of magic screenshots for mac.
This strategy takes identity and access control to a higher level by adding something only the authorized user would have on them, such as a secure code sent to their cell phone that they have to enter before gaining access to the cloud. Using a password management solution, such as Passportal, Certify Enterprise, Dashlane, Keeper for Groups, is highly recommended to ensure these processes are followed consistently. Public cloud firewall. Another resource every public cloud customer should be using is a public cloud firewall, which can protect traffic to, from, and within public cloud services with the same functionality as a physical or virtual next-generation firewall.
The firewall should encrypt data so that in the event a hacker steals the data transmission on the way to or from the cloud, it’s unreadable. Data protection. Backups are another important public cloud consideration, especially for companies operating in highly regulated industries with strict data retention requirements. Public cloud providers typically offer 30 days’ worth of data retention, which may be inadequate for some industries. SMBs are increasingly turning to the public cloud to meet their evolving IT needs. As an MSP and trusted business partner, you need educate your customers about the importance of keeping their workloads secure in the cloud. To provide comprehensive security, you need to understand which applications they’re accessing in the cloud, what kind of data they’re storing there, and what kind of access controls are in place.
Cloud Encryption Solutions
Your customers already know how much effort goes into protecting their on-premises data from ransomware, malware, and hackers. Just because some of their IT applications and infrastructure are moving to the public cloud doesn’t mean all these security concerns go away — they just move to another location. Chris Crellin is senior director of product management for. Read more Barracuda MSP blogs.
Today, we announce the general availability of Azure disk encryption for Windows and Linux IaaS VMs in Azure Government cloud regions With this announcement, Azure disk encryption for Windows and Linux IaaS Standard tier VMs (Std A, D, DS, G, GS etc series) is now generally available in all Azure Gov cloud regions to enable customers to protect the OS and data disk at rest using industry standard encryption technology. Azure Disk Encryption is a capability that lets you encrypt your Windows and Linux IaaS VM disks.
Azure Disk Encryption leverages the industry standard feature of Windows and the feature of Linux to provide OS and data disk encryption to help protect and safeguard your data. It also can help you meet organizational security and compliance commitments. The solution is integrated with to help you safeguard, control and manage the disk encryption keys and secrets in your key vault subscription, while ensuring that all data in the virtual machine disks are encrypted at rest in your Azure storage.