Search over 27,600 MOOC courses
enter subject, university name or course name
Career Evolve is your partner in online learning and career development. Search our catalog of 28,000+ courses from over 21,000 top colleges and universities. Our partners have helped over 2 million students and continue to enroll over 30,000 students each month. Career Evolve provides you with access to free and affordable online training.

You can take courses in subjects varying from Philosophy to Computer Science or even Advanced Fiction Writing to Becoming a Physical Therapy Aide. Learn at your pace anytime and anywhere.
Career Evolve also integrates with LinkedIn to profile your achievements to potential employers.

Whether you are searching for micro learning from providers, such as Coursera, EdX or courses from leading Universities like MIT, Stanford and Peking University, Career Evolve is the answer for affordable learning and shrinking training budgets.

Invest in yourself with Career Evolve.

Discover your next learning opportunity from just one of our many Universities



Massachusetts Institute of Technology Georgetown University University of Queensland Boston University McGill University
Harvard University UC Berkeley Cornell University University of British Columbia Hong Kong University of Science and Technology

Tuesday, 16 August 2016

Cloud Security Benefit and Risks Checklist

Public Cloud Security Benefits and Risks

There can be no doubt that technologies such as SaaS, PaaS, IaaS and other cloud services can deliver a great ROI. The reduced cost of ownership of cloud services make them incredibly attractive. This is especially true of public cloud services that offer cloud access using a public facing internet connect hosted on shared architecture.

Think about that for a moment. Private company data being sent across the internet. And then being stored and processed on hardware that is shared by many cloud customers. It doesn’t take much of an imagination to realize that there could be serious public cloud security risks in working in this way.
Below is a basic public cloud security checklist. It can be used when evaluating cloud vendors.
  1. Ensure compliancy – any cloud vendor worth its salt will comply with legislative requirements within the market they sell in to. However, don’t just take their word for it. Some providers imply compliance, when in reality they are relying on the compliance of another vendor who provides them services to resell. Check and ensure the actual vendor takes compliance seriously.
  2. Perform an audit – a reputable cloud vendor will be entirely open to the idea of an audit. This audit should cover both the technology being offered, and also the business processes the vendors uses to manage and maintain those services. Make passing a regular audit part of the contractual terms.
  3. Define responsibilities and roles – once a suitable cloud vendor has been found, roles need to be defined. Clear boundaries need to be set, indicating exactly what the vendor is responsible for. In a similar fashion, the buyer will define their responsibilities. Ideally, these responsibilities shared between the buyer and the vendor will meet seamlessly.
  4. Deploy and enforce proper data protection standards – this is a fairly inward looking touchpoint. It involves making sure that employees and the technology they use are using proper security technology. This means SSL encrypted connection, robust password policy, and other best practices.
  5. Put public cloud security policies in place – so that the business and the vendor know exactly what the processes are that drive security. Not only in preventing security breaches, but also how they are dealt with should they occur.
  6. Monitor physical security – such as how premises are secured to prevent nefarious access to secure equipment. Also the setting up of device logging, for moveable devices such as tablets and laptops.
  7. Monitor the SLA closely – ensure that the cloud vendor continues to comply with all of the requirements that were stipulated in the contract terms. This is an inside out activity, that the business will be solely responsible for.
  8. Have an exit plan in place – should the chosen cloud vendor fail to maintain data security in an effective fashion. This means having plans to move company data to new infrastructure and maintain business continuity.
Source:  hosting.com

No comments:

Post a Comment

Find Enroll Learnbanner

Featured

Starting a Consulting 

Practice

Starting a Consulting Practice

Find out how you can earn income by sharing your training or knowledge with others.
PMP ® Certification Prep 1

PMP ® Certification Prep 1

Begin a well-paying career as a project manager by preparing to take--and pass--the PMP® certification exam.
How to Get Started in Game Development

How to Get Started in Game Development

Take steps toward a new career in game development by building a foundation to design games in a wide variety of genres for different audiences and platforms.
Accounting Fundamentals

Accounting Fundamentals

Gain a marketable new skill by learning the basics of double-entry bookkeeping, financial reporting, and more.
Conversational Japanese

Conversational Japanese

Whether you want to learn conversational Japanese for travel or just for fun, you'll find this course makes it easy and enjoyable for beginners to master the essentials of the Japanese language.
Introduction to QuickBooks 2015

Introduction to QuickBooks 2015

Learn how to quickly and efficiently gain control over the financial aspects of your business using this powerful software program.

Student Profiles