{"id":221281,"date":"2017-06-20T00:55:06","date_gmt":"2017-06-20T04:55:06","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/7-tips-for-securely-moving-data-to-the-cloud-government-technology-blog.php"},"modified":"2017-06-20T00:55:06","modified_gmt":"2017-06-20T04:55:06","slug":"7-tips-for-securely-moving-data-to-the-cloud-government-technology-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cloud-computing\/7-tips-for-securely-moving-data-to-the-cloud-government-technology-blog.php","title":{"rendered":"7 Tips for Securely Moving Data to the Cloud &#8211; Government Technology (blog)"},"content":{"rendered":"<p><p>    A few years back, an unmistakable trend emerged that     cloud computing was growing in both percentage of    organizations adopting cloud solutions as well as the amount    and type of data being placed in the cloud.  <\/p>\n<p>    Earlier this year, I highlighted research that made it clear    that     trust and risks are both growing in government clouds.    Since that time, many readers have asked for more specific    guidance about moving more data to the cloud in the public and    private sectors. I was asked: What are the right cloud    questions?  <\/p>\n<p>    Questions like: Where are we heading with our sensitive data?    Will cloud computing continue to dominate the global landscape?    These are key questions that surface on a regular basis.  <\/p>\n<p>    The forecast for the     computer industry is mostly cloudy. Here are some of the    recent numbers:  <\/p>\n<p>    Back at the end of last year, The Motley Fool reported        10 Cloud Computing States That Will Blow You Away, and the    last three listed are especially intriguing to me. Here they    are:  <\/p>\n<p>    IoT, Other Trends and the Cloud  <\/p>\n<p>    And while it is true that the Internet of Things (IoT) has    taken over the mantle as the hottest trend in technology, the    reality is that The Internet of Things and digital    transformation have driven the adoption of cloud computing    technology in business organizations,     according to a U.S.-based cloud infrastructure firm    Nutanix.  <\/p>\n<p>    This     article from CxO Today lays out the case that the cloud    remains the most disruptive force in the tech world today. Why?  <\/p>\n<p>    While premise-based IT software and tools have their own    advantages, the global trend is for cloud based applications    since they offer more connectivity and functionalities than    legacy systems. Moreover, enterprises are naturally gravitating    towards it as the technology is reasonably reliable,    affordable, and provides them access to other new and emergent    technologies as well as high end skills. The cloud boom is also    propelled by the fact that enterprises are trying to improve    performance and productivity over the long term. Looking at the    tremendous response for cloud services, several IT    companies are designing applications meant solely for pure    cloud play.  <\/p>\n<p>    Other experts say that several overlapping trends are colliding    as The    edge is eating the cloud. These trends include:  <\/p>\n<p>    Overcoming Fears in the Cloud  <\/p>\n<p>    And yet, there are plenty of enterprises that continue to have    significant concerns regarding cloud computing contracts.    Kleiner Perkins     Mary Meeker highlighted the fact that cloud buyers are    kicking the tires of multiple vendors while becoming more    concerned about vendor lock-in.  <\/p>\n<p>    Also, technology leaders often move to the cloud to save money,    but CFOs are now telling IT shops to cut costs in the cloud     fearing that     resources are being wasted. For example:  <\/p>\n<p>    Also, while overall trust in cloud infrastructure is higher,    new concerns are rising about application security delivered    through the cloud.  <\/p>\n<p>    My 7 Tips for Moving Data into the Cloud  <\/p>\n<p>    So what can technology and security leaders do to protect their    data that is moving to the cloud?  <\/p>\n<p>    Here are seven recommendations that can help you through the    journey. Note that the first four items are largely best    practices about your current data situation and options before    your data moves.  <\/p>\n<p>    1) Know your data. I mean, really know what is    happening now before you move the data. Think about the    analogy of a doing a house cleaning and organizing what you own    before putting things in storage to sell your house.  <\/p>\n<p>    If you dont want to catalog everything (which is a mistake),    at least know where the most important data is. Who is doing    what regarding the cloud already? What data is sensitive? This    is your as is data inventory situation with known protections    of current data. And dont forget shadow IT. There are plenty    of vendor organizations that can help you through this process.  <\/p>\n<p>    2) Have a defined and enforced data life cycle    policy. You need to know what data is being collected    by your business processes, where does it go, who is    accountable (now) and what policies are in force.  <\/p>\n<p>    Ask: Is there appropriate training happening now? Is it    working? What policies are in place to govern the movement of    your data? For example, my good friend and Delaware CSO Elayne    Starkey does a great job in this area of policies. You can    visit this Web portal for examples:     <a href=\"https:\/\/dti.delaware.gov\/information\/standards-policies.shtml\" rel=\"nofollow\">https:\/\/dti.delaware.gov\/information\/standards-policies.shtml<\/a>  <\/p>\n<p>    3) Know your cloud options: Private, public,    hybrid or community cloud? This simple step often gets    confusing, in my experience, because some staff mix these terms    up with the public sector and private sector    definitions wrongly thinking that a private cloud means    private-sector-owned cloud.  <\/p>\n<p>    Here are some basic cloud definitions to ponder with your    architecture team:  <\/p>\n<p>    Private Cloud: The organization chooses to    have its own cloud where the resource pooling is done by the    organization itself (Single Organization cloud). May be or may    not be on premises (in your own data centers.)  <\/p>\n<p>    Public Cloud: Different tenants are doing the    resource pooling among the same infrastructure.  <\/p>\n<p>      Pros: It can be easily consumable, and the    consumer can provision the resource.  <\/p>\n<p>      Cons: Consumer will not get the same level of    isolation as a Private cloud.  <\/p>\n<p>    Community Cloud: Sharing the cloud with    different organizations usually unified by the same community    sharing underlined infrastructure (halfway between private and    public) small organizations pooling resources among others. For    example, some state and local government organizations share    email hosting with other state and local governments in the    U.S. only.  <\/p>\n<p>    Hybrid: Mixture of both private and public    i.e., some organization might say we would like elasticity and    cost effectiveness of public cloud and we want to put certain    applications in private cloud.  <\/p>\n<p>    4) Understand and clearly articulate your Identity and    Access Management (IAM) roles responsibilities and demarcation    points for your data. Who owns the data? Who are the    custodians? Who has access? Who can add, delete or modify the    data? Really (not just on paper)? How will this change with    your cloud provider?  <\/p>\n<p>    Build a system administration list. Insist on rigorous    compliance certifications Incorporate    appropriate IAM:Incorporate    appropriate IAM from the outset, ideally based on roles,    especially for administration duties. When you move to the    cloud, the customers, not the provider, are responsible for    defining who can do what within their cloud environments. Your    compliance requirements will likely dictate what your future    architecture in the cloud will look like. Note that these staff    may need background checks, a process to update lists (for new    employees and staff that leave) and segregation of duties as    defined by your auditors.  <\/p>\n<p>    5) Apply encryption  thinking end to end  data at    rest and data in transit. We could do an entirely    separate blog on this encryption topic, since     a recent (and scary) report says there is no encryption on 82    percent of public cloud databases. Here are a few points to    consider.     Who controls and has     access to the encryption keys? What data is     truly being encrypted and when? Only sensitive data? All    data?  <\/p>\n<p>    6) Test your controls. Once you move the data,    your cloud solution vulnerability testing should be rigorous    and ongoing and include penetration    testing. Ask: How do you truly know your data is safe? What    tools do you have to see your data in the cloud environment?    How transparent is this ongoing process?  <\/p>\n<p>    The cloud service provider should employ industry-leading    vulnerability and incident response tools. For example,    solutions from these incidence response tools enable fully    automated security assessments that can test for system    weaknesses and dramatically shorten the time between critical    security audits from yearly or quarterly, to monthly, weekly,    or even daily.  <\/p>\n<p>    You can decide how often a vulnerability assessment is    required, varying from device to device and from network to    network. Scans can be scheduled or performed on demand.  <\/p>\n<p>    7) Back up all data in a distinct fault    domain.  <\/p>\n<p>        Gartner recommends: To spread    risk most effectively, back up all data in a fault domain    distinct from where it resides in production. Some cloud    providers offer backup capabilities as an extra cost option,    but it isnt a substitute for proper backups. Customers, not    cloud providers, are responsible for determining appropriate    replication strategies, as well as maintaining backups.  <\/p>\n<p>    Final Thoughts  <\/p>\n<p>    No doubt, managing your data in the cloud is a complex and    ongoing challenge that includes many     other pieces beyond these seven items. From     contract provisions to measuring costs incurred for the    services to overall administration functions, the essential    data duties listed are generally not for technology    professionals or contracts pros lacking real experience.  <\/p>\n<p>    Nevertheless, all organizations that move data into and out of    cloud providers data centers are constantly going through this    data analysis process. Just because you moved sensitive data in    the cloud five years ago for one business area does not mean    that new business areas can skip these steps.  <\/p>\n<p>    If you are in a large enterprise, you may want to consider    adding a cloud computing project management office (PMO) to    manage vendor engagement and ensure the implementation of best    practices across all business areas.  <\/p>\n<p>    And dont just fall for the typical line: I know xyz company    (Amazon or Microsoft or Google or fill-in-the-blank) is better    at overall security than we are  so just stop asking    questions. Yes  these companies are good at what they do, but    there are always trade-offs.  <\/p>\n<p>    You must trust but verify your cloud service because you    own the data. Remember, you can outsource the function, but not    the responsibility.  <\/p>\n<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/7-tips-for-securely-moving-data-to-the-cloud.html\" title=\"7 Tips for Securely Moving Data to the Cloud - Government Technology (blog)\">7 Tips for Securely Moving Data to the Cloud - Government Technology (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A few years back, an unmistakable trend emerged that cloud computing was growing in both percentage of organizations adopting cloud solutions as well as the amount and type of data being placed in the cloud.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cloud-computing\/7-tips-for-securely-moving-data-to-the-cloud-government-technology-blog.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[494695],"tags":[],"class_list":["post-221281","post","type-post","status-publish","format-standard","hentry","category-cloud-computing"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/221281"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=221281"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/221281\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=221281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=221281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=221281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}