BradEgeland.com
  • Welcome
  • Blog
  • Expertise
  • Resume
  • Software / Service Reviews
  • Contact
  • Videos
  • Books / White Papers
  • Mentoring Contact Form
  • Awards/Recognition
  • Templates & Downloads
  • Clients
  • Professional Services
  • Past Survey Results

Traditional vs Cloud Security

4/3/2019

0 Comments

 
Picture
Today, businesses are increasingly relying on data for their day to day operations. Therefore, it is crucial for organizations to have systems built on infrastructure that is not only secure but also cost-effective and scalable. 

The storage and retrieval of data from traditional servers can be archaic and insecure. To address the increasingly complex requirements for data transmission, storage, and analysis, organizations should consider cloud infrastructure.

Traditional IT Systems vs. Cloud Data Systems

What are Traditional IT Systems?

The IT infrastructure of the typical organization comprises of hardware devices that are connected to on-premise servers. The entity’s data is stored on the servers. One of the benefits of storing data on a traditional server is that you have greater security control. This means that you can easily secure your cyber data since you have primary access to the server. As your data storage capacity needs increase, you will have to upgrade the IT infrastructure with additional physical on-site hardware. These infrastructures can be quite expensive.

What are Cloud IT Systems?

Cloud IT systems refer to a set of infrastructures connected to each other over the internet for the purposes of holding data. The infrastructure is hosted and maintained by a cloud services provider, who is also in charge of security controls.

There are three main categories of cloud IT systems:

Public Cloud

Most organizations use public cloud in their daily operations. Examples of public cloud services include Microsoft Azure, Amazon Web Services (AWS), and Google Cloud platforms. Public cloud services are usually designed as Infrastructure-as-a-Service (IaaS) to allow scalability.

However, since public cloud environments are used to store huge amounts of data, they are often the target of malicious parties. A 2018 report by McAfee shows that about 25 percent of companies that use public cloud have suffered data breaches.

Private Cloud

Private cloud environments are largely safe from the security issues that affect the public cloud. With a private cloud, a company has full access and control of its data centers and security compliance. However, this also means massive costs associated with running and maintaining the private cloud environment.

According to an article by SearchCIO, the costs of running and maintaining a private cloud can easily reach over $1 million, which is way out of the financial capability of many organizations.

Hybrid Cloud

Hybrid cloud arrangements provide the best value for organizations looking to secure their data and manage scalability costs.

With hybrid cloud computing, organizations use both public and on-premise private servers to store their data. A private server could be used to store the most crucial data while the other public servers could be used for other data. For example, payment information could be stored on the on-premise server while other non-personal identifiable data could be stored on the PaaS environment.

Difference Between Cloud and Traditional Security?


With traditional servers, data is stored on on-premise hardware and can be directly accessed by the relevant parties.


On the other hand, with cloud servers, the data is stored on the cloud provider’s servers. To access the data, you must configure your applications to communicate with the servers through the providers’ APIs (application programming interfaces).

When your system connects to the servers through the API, you can get various important security information such as the number of connections made, where the connections are originating from, etc. However, since the API is provided by the company, your applications’ connection to the server will only be as secure as the API has been configured.

Tips for Preventing Hybrid Cloud Security Threats

If you wish to store your data in a hybrid cloud environment, you must think more broadly about security. You can control the information that you share with the cloud services. However, it is not always possible to control who can access the information.

Here are some steps you should take to mitigate cybersecurity threats to your data in a hybrid cloud environment.

Review the data stored in the cloud

While you may not have total control of everything within the cloud environment, you should carry out a regular review of the data you store there. As data is transferred and stored every day in the cloud, it is easy for outdated information to get forgotten in the servers.
You should regularly audit the data stored in the cloud to ensure its integrity. Outdated data should be removed to keep server costs down.

Work with security-focused vendors

Before signing up with a cloud service provider, check their security protocols for protecting your data. The company should have robust and updated infrastructure that will always ensure the availability of your data.


If you are using any APIs from the service providers, work out proper controls and service level agreements to ensure data integrity.'

Monitor threats continuously

Stay abreast of cloud security threats and make sure your provider has the latest patches and mitigation measures to counter intrusions. Choose a cloud provider that regularly assesses 
its security measures to mitigate the evolving threats targeting cloud environments.

Meet your compliance obligations

If you must adhere to the General Data Protection Regulation (GDPR), you’ll need to store your customer’s data in a local data center.  Some regulatory compliance laws require companies to report data breaches. Make sure the service provider will keep you informed of breaches to avoid noncompliance.

The above is an overview of the differences between traditional and cloud security systems. 
 
Author Bio

Ken Lynch is an enterprise software startup veteran, who has always been fascinated about what drives workers to work and how to make work more engaging. Ken founded Reciprocity to pursue just that. He has propelled Reciprocity's success with this mission-based goal of engaging employees with the governance, risk, and compliance goals of their company in order to create more socially minded corporate citizens. Ken earned his BS in Computer Science and Electrical Engineering from MIT.  Learn more at ReciprocityLabs.com.

0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Author:

    Picture

    Brad Egeland


    Named the "#1 Provider of Project Management Content in the World," Brad Egeland has over 25 years of professional IT experience as a developer, manager, project manager, cybersecurity enthusiast, consultant and author.  He has written more than 8,000 expert online articles, eBooks, white papers and video articles for clients worldwide.  If you want Brad to write for your site, contact him. Want your content on this blog and promoted? Contact him. Looking for advice/menoring? Contact him.

    Picture
    Picture
    Picture
    Picture
    Picture
    Picture

    RSS Feed

    Archives

    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    July 2013
    June 2013
    May 2013
    April 2013
    March 2013
    February 2013
    January 2013
    December 2012
    November 2012
    October 2012
    September 2012
    August 2012
    July 2012
    June 2012
    May 2012
    April 2012
    March 2012
    February 2012
    January 2012
    December 2011
    November 2011
    October 2011
    September 2011
    August 2011
    July 2011
    June 2011
    May 2011
    March 2011
    January 2011
    December 2010
    November 2010
    October 2010
    September 2010
    August 2010
    June 2010
    May 2010
    April 2010
    March 2010
    November 2009

    RSS Feed

Powered by Create your own unique website with customizable templates.