AST Digital Magazine August 2017 Digital-Aug | Page 48
Volume 15
August 2017 Edition
This can cause problems either when an insider
within the CSP uses it maliciously or when a fed-
eral agency submits a blind subpoena to gain ac-
cess to the customer’s data within the CSPs data
centers.
Tokenization is another way to secure infor-
mation. •
It works by creating a random token value for
plain text, and stores the mapping in an on-
premises database. •
•
•
Tokenization ensures that sensitive information
remains within the organization, but if the data-
base containing the tokens is exposed then data
can be detokenized.
Typically, tokenization is used for structured data,
such as payment card data stored in structured
form. Encryption can be used for both structured
and unstructured data.
Tools for Cloud Security
While these best practices are the foundation of
better cloud security, the following tools can also
help in eliminating data security vulnerabilities:
• SIEMs: Security information and event man-
agement (SIEM) is a must-have security so-
lution for large enterprises.
• SIEMs analyze inbound events coming
•
ning a badge to get in a building), soft-
ware (employee logs into their work
computer), and now, cloud services.
• SIEMs correlate events from a myriad
of sources to generate security alerts,
that if analyzed on their own, wouldn’t
raise any flags.
Secure Web Gateways: SWGs are useful
for IP/URL filtering by blocking dangerous
Shadow IT cloud services if the service IP/
URL is known to the IT department.
Cloud firewall: Low-level attacks between
the cloud and network can be prevented
with a cloud firewall.
User Access Control: User access control,
or identity and access management so-
lutions (IDM) allow organizations to limit
employee access to only the services and
functionality they need for their jobs.
Cloud data encryption: Cloud encryption
makes compromised data useless to a
hacker, as it converts all of the information
into ciphertext.
CASB: Cloud Access Security Brokers act
as a control point between the cloud ser-
vice provider and its customers, providing
activity and security monitoring for cloud
services, and enabling policy enforcement
across all cloud services
Sekhar Sarukkai
Although cloud
computing has
made accessing
corporate data
easier and more
efficient, it comes
with its own array
of security con-
cerns.
By following the
proper cloud security practices, organizations
can use the cloud to its full potential without
the security concerns.
from physical hardware (employee scan-
Sekhar Sarukkai, Skyhigh Networks Co-founder and
Chief Scientist
48