7 best practices for cloud security

Learn how to protect yourself in the cloud from the next vulnerability and/or wide scale attack.

cloud security best practices
Credit: Jim Larrison
Safety tips in the cloud

Using cloud technologies in your organization comes with plenty of benefits - as well as many risks.

Here are seven steps for securing data in the cloud from Alertlogic.

1 code
Credit: Teresa
Secure your code

Securing code is 100% your responsibility, and hackers are continually looking for ways to compromise your applications. Code that has not been thoroughly tested and secure makes it all the more easy for them to do harm. Make sure that security is part of your software development lifecycle: testing your libraries, scanning plugins etc.

2 access
Create an access management policy

Logins are the keys to your kingdom. Make sure you have a solid access management policy in place, especially concerning those who are granted access on a temporary basis. Integration of all applications and cloud environments into your corporate AD or LDAP centralized authentication model will help with this process as will two-factor authentication.

3 patch
Credit: Liz West
Adopt a patch management approach

Unpatched software and systems can lead to major issues; keep your environment secure by outlining a process where you update your systems on a regular basis. Consider developing a checking of important procedures, test all updates to confirm that they do not damage or create vulnerabilities before implementation into your
live environment.

4 log
Log management

Log reviews should be an essential component of your organizations security protocols. Logs are now useful for far more than compliance, they become a powerful security tool. You can use log data to monitor for malicious activity and forensic investigation.

5 toolkit
Build a security toolkit

No single piece of software is going to handle all of your security needs. You have to implement a defense-indepth strategy that covers all your responsibilities in the stack. Implement IP tables, web application firewalls, antivirus, intrusion detection, encryption and log management.

6 informed
Credit: PBS NewsHour
Stay informed

Stay informed of the latest vulnerabilities that may affect you, the internet is a wealth of information. Use it to your advantage, search for the breaches and exploits that are happening in your industry.

7 understand
Understand your cloud service provider security model

Finally, get to know your provider and understand where the lines are drawn, and plan accordingly. Cyber attacks are going to happen; vulnerabilities and exploits are going to be identified.