Content Hub
Cloud Security
Published 14th February 2020
The questions you need to be asking your business and your provider.
On-Premise Private Cloud – questions to consider in your business
Physical security
-
-
- How do we vet staff, and 3rd part contractors e.g cleaners?
- How are windows and other access points secured?
- Is there CCTV in operation?
- Should we invest in digital access, to monitor and audit physical access?
- How resilient is our power source?
- If the power goes out, are the CCTV and alarms on generators?
- What is our offsite backup in the event of fire, and the security at that location?
-
Single PERSON of Failure?
-
-
-
- Are we heavily reliant on one person in the team? Do they hold all the admin keys?
-
-
Certification and accreditation
-
-
-
-
- Do our clients require formal accreditation such as ISO-27001?
- If yes, is that difficult to attain in our office environment?
-
-
-
Public Cloud – questions for your cloud provider
-
- When you delete a VM how long is the data retained on primary storage and secondary backup storage?
- How can you guarantee that data has been fully destroyed?
- How can you encrypt data over the network, in storage, on backups?
- Who holds responsibility for VM-level and application patching?
- Can you guarantee that the answers to these questions won’t change in the future?
Private Cloud -questions for your cloud provider and your business to consider
-
- Who has responsibility for infrastructure-level (virtualisation and storage platform) patching? How will you become aware of new vulnerabilities?
- What are the processes and policies for disposing of failed storage drives?
- Have you allowed adequate budget for offsite backup and disaster recovery services?
- With full control of the network stack do you have the expertise and processes in place to ensure network security is maintained and accidental access points aren’t left open?
- How is communication between the compute nodes and storage tier physically routed and secured?
- Does the provider have management access and how is that secured?
- Dedicated private infrastructure is great but is the automation/orchestration layer adequately secured or is this a simple attack vector?
- Who is responsible for capacity management and monitoring?
- Who is responsible for infrastructure and hardware availability monitoring?
- Will your private cloud hardware be under continuous upgrade to mitigate legacy security issues in firmware?