Concerned about cloud security? It's your on-premise apps you should be worried about. Credit: Thinkstock I was sitting at LAX last weekend waiting to board my plane, and took a few minutes to read up on the latest news about the Office of Personnel Management’s (OPM) data breach. Over 21 million individuals’ Personally Identifiable Information (PII) stolen by hackers — reportedly the work of a foreign government. And how did OPM discover the breach? They stumbled upon it while investigating a previous breach that had resulted in the theft of another 4 million individuals’ PII. Not too long before the OPM’s disclosure, the Internal Revenue Service announced that 100,000 tax accounts had been hacked. And before that, Home Depot, Sony, Target — all victims of sophisticated, successful and massive attacks. Troubling events, and part of an unmistakable trend that makes it clear much of the data we entrust to governments, companies and other organizations may not be as secure as hoped. If you’re a business or technology leader, these events also make it clear that if you’re not already focused on data security, it’s time to quickly and resolutely make it a priority. From what I can tell, though, none of the aforementioned breeches were the result of exploiting cloud vulnerabilities. Instead, they were the result of social engineering attacks or software exploits that could have happened regardless of the hosting model (i.e., on-premise or in the cloud). The vulnerabilities associated with Internet-connected systems hosted on-premise, and those hosted in the cloud, are generally the same. (And while I might make the case that cloud providers are likely to have better physical security, data center facilities aren’t typically a target for most hackers.) Fortunately, the techniques needed to secure systems in either model are also the same. If you’ve developed your on-premise systems using secure coding practices, placed your systems behind a well-designed firewall infrastructure, implemented vulnerability management best practices, and leveraged intrusion detection capabilities, then you’ve developed the skills and instituted the practices that will help you proceed securely in the cloud. If you haven’t, drop what you’re doing, and get started immediately! Security is a practice every IT department should be developing as a core competency, as unprotected systems hosted on-premise are equally as hackable as unprotected systems hosted in the cloud. Don’t have the resources needed? Done carefully, moving to the cloud can actually free resources to focus on security: less racking and stacking, more firewalling and detecting. Interestingly (and not surprisingly), cloud providers and third-party security firms are beginning to make very credible progress towards helping customers leverage the cloud more securely. Before long, it may actually be easier to secure systems in the cloud than on-premise. I’ll dive a little deeper into this topic in a future blog. Related content opinion How the cloud makes data integrations easier Integrating data between applications has always been hard, but the cloud can make it a little easier By Rich Murr Sep 01, 2015 4 mins Enterprise Architecture Cloud Computing Enterprise Applications opinion How the cloud will get you better IT uptime Sometimes a catastrophic IT outage can be the catalyst for moving to the cloud. By Rich Murr Aug 05, 2015 3 mins IT Strategy Risk Management Cloud Computing opinion Have you hugged your cloud today? If you haven't yet embraced the cloud, you should at least give it a little hug. By Rich Murr Jun 23, 2015 4 mins Cloud Computing opinion Say goodbye to traditional IT Move up to the cloud. You won't miss what you've left behind, and neither will your business customers. By Rich Murr Jun 03, 2015 4 mins IT Strategy Cloud Computing Data Center Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe