Discover Performance

HP Software's community for IT leaders // September 2012
Subscribe

4 factors for stronger cloud security

With cloud security practices still evolving, CIOs and CISOs should proactively assess and govern security risks.
 
The opportunities presented by cloud solutions continue to grow, as does adoption. Businesses are angling to better control costs and/or enable innovation. Yet at the same time, security remains a concern for many enterprises. How cloud vendors, and cloud customers, approach security is still developing, and best practices and policies are just emerging.
 
Security consistently ranks among the top three concerns that business leaders express when asked why they are reluctant to move critical data to the cloud. So as you lead IT toward the advantages of cloud apps and infrastructure, how should your team approach security when evaluating cloud alternatives?

1. Measure your vendors’ security compliance against standards and best practices.

It would be great to perform a direct audit of your IT vendors, examining every aspect of cloud security compliance against an industry standard. But direct auditing is rarely, if ever, allowed, and industry standards are still being drawn up. The next best thing is to rely on verified compliance, but against what standards? We have ISO 27001, the Cloud Security Alliance (CSA), and a range of best-practice-level guidelines such as SAS 70—but that’s about it for now.
 
Your best approach? Start by looking for a vendor who has proven compliance with ISO—that’s the big one. Drill down to discuss CSA recommendations, SAS 70 and other guidance that suits your specific use cases.

And most importantly, you or your chief security officer need to understand what is most important to you and your business when it comes to security and discuss it with the vendor’s CISO.

2. Weigh the criticality of your data versus potential security risks.

Certain types of sensitive data—HR files, healthcare records, payroll info, sensitive product plans—are at great risk if shared via solutions that are not sufficiently secure. The key is to risk-rank your data from highly critical to public, then think about where it should reside, how long it needs to be protected, and what protection schemes are appropriate. Consider the business value versus risk.

3. Create an internal team that’s responsible for continuous risk assessment.

Many businesses find that the best way to avoid “point in time” risk assessment is to create an internal team specifically tasked with this responsibility. Companies that already have external and internal audit functions to meet regulatory requirements may incorporate cloud risk assessment into those processes.
 
This doesn’t have to be a new layer of bureaucracy—it’s just a matter of making sure someone has the responsibility and expertise to keep an eye on the issue. This internal IT security layer can provide proactive risk assessment and recommendations across the organization. Aim to automate these practices where possible, eliminating manual steps and/or repetitive tasks to enhance efficiency and accuracy.

4. Educate your employees about how the cloud changes the role of IT security.

Security is everyone’s concern—and everyone’s responsibility. This has always been the case, but the cloud only emphasizes this fact. Companies of every size need to build an understanding of the potential business risks associated with unsecured applications and data. The challenge is to make sure every employee understands the implications of allowing critical business data to be inadequately secured in a cloud context. You can help by shifting the mindset from “controlling security” to “governing security and risk.” This means being proactive instead of reactive—putting governance processes in place to avoid problems before they ever arise.
 
We all know that in today’s typical enterprise, procuring cloud-based services is easy and pervasive. Workers need to think before they procure cloud services and store or share data in the cloud. By clearly defining the role of the CISO/security team in the cloud environment, and establishing risk-avoidance best practices, you take a big step in getting employee support.

The CISO’s role

The rise of cloud solutions is one of the factors reshaping the role of IT security teams. While security has often been approached as something bolted on at the end of the process, a “baked-in” approach is increasingly taking shape. The above steps all incorporate security leaders early in the process—initial assessment of cloud options, internal education, and continuous assessment of risk-management and compliance needs.
 
This more thorough integration of the CISO’s team into enterprise security underscores a collateral advantage of cloud: It drives the organization to take a more comprehensive, more effective approach to risk governance.

To find out more about how to evaluate security solutions for the cloud, go to hp.com/go/cloud, and look specifically at software as a service at hp.com/go/saas.


x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Subscribe

Popular tags

Events

HP Engage 2014

At this HP Autonomy event, business and IT leaders will discuss changes in technologies and in how we interact with customers. Phoenix, Sept. 21–23.


Ramón Baez: The changing role of the CIO

HP’s CIO discusses the transformational shifts under way, from how business is done and the role of technology to the IT solutions themselves.


Meg Whitman: Big Data changes everything

HP’s CEO discusses how Big Data is changing the future of business and leading to innovative ways to create business value. (On demand)


Mastering full-funnel optimization

To understand, engage, and convert your best customers, you need to leverage and integrate all the data at hand from search, social, and mobile.


Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episode.


Enterprise 20/20

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Security 20/20

Preparing today for tomorrow’s threats.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more

HP Software related

Most read articles

Discover Performance

Archive

Tweets @ HPITperformance