Information Security

Cloud Security Assessment

For this post, I would like to share a checklist of Cloud Security Assessment that will cover multiple areas of environment and business from cloud security best practice.

Each assessment will have a step that needs to be accessed especially those that related to System and Infrastructure. Those step can listed as follows:

  • Step 1 Policies and Procedures
  • Step 2 Access Management
  • Step 3 Networking
  • Step 4 Backup and Data Recovery
  • Step 5 Security Patches and Update
  • Step 6 Logging and Monitoring
  • Step 7 Data Encryption

Step for Cloud Security Assessment

Step 1: Policies and Procedures

This step would help the users in terms of securing with a system falls from on both the cloud provider and the client point of view.

Gartner have predicted in a statistic such as follows:

through 2020, at least 95% of cloud security failures will be the customer’s fault

The above quote can be eliminated after the organization and provider have comprehensive policies and procedures been implemented in place.

It will be more secure if the following risk model been implemented in a public’s cloud.

  • Agility will support any unanticipated any future needs.
  • Availability will need to have service disruptions and data loss control
  • Security will cover confidentiality and data control
  • The supplier will take care of any changes that happen within the cloud provider business model
  • Compliance will focus on regulatory and other legal requirements

STEP 2: ACCESS MANAGEMENT

Securing the cloud environment by managing identity and access management can be consider as an important first step which it will covers on how to identify and authenticate users.

Forrester have also estimated in 2016 that

80% of security breaches involved privileged credentials

For this step, the user will need to determine whether using multi-factor authentication is a must for the organization. Normally, the cloud provider and organization will use a minimum of two forms of authentication before they can grant any access to those are needed.

STEP 3: NETWORKING

Cloud-based environment that used will put much burden for the network security on the cloud provider which lead to the question below:

  • Are there gateway security measures against malware injections?
  • Are there security measures in place against network-based attacks?
  • Is all sensitive material encrypted over less-trusted networks?

STEP 4: BACKUP AND DATA RECOVERY

Natural disaster, hardware failure and malicious action can be a factor to the data can be lost during the backup activity. As a result, a recovery plan will emerge to ensure and protect the data from been devastating data loss.

A good backup and data recovery will provide such as

  • Physical Storage locations
  • Physical Access to server facilities
  • Plan for Natural Disaster.

STEP 5: SECURITY PATCHES AND UPDATES

Security patches and update can be considered as an important phrase and step where the system owner need to keep their system updated with the latest security patches in order to maintain a secure environment.

STEP 6: LOGGING AND MONITORING

When a security breach occurs, it will take a very organization around six(6) months to identified and recovery from the incident. Due to that, it considers as important for any organization to ensure they keep the logging in each server and application including database for future analysis of the incident.

STEP 7: DATA ENCRYPTION

Data encryption will make harder to the hacker even thought they succeed with the data breach where it contain sensitive information that encryption been implemented.

Leave a Reply

Your email address will not be published. Required fields are marked *