Top 10 Best Practices Cloud Security Defined

Top 10 Best Practices Cloud Security Defined

Top 10 Best Practices Cloud Security
Top 10 Best Practices Cloud Security

Top 10 Best Practices Cloud Security Defined – The need to lower cost, increase efficiency and conserve cash has increased the motivation of companies to turn to Cloud Computing and increased the appeal of alternative delivery models. The disruptive shifts in new demand and supply patterns drives changes for how IT services are bought and from whom. Cloud computing requirements need to be well defined. CIOs need to consider implementing these best practices.

  1. Utilize a SDM (System Development Methodology)
  2. Implement a disaster recovery and business continuity plan
  3. Implement metrics and cloud application monitoring
  4. Utilize a secure access and change management system
  5. Utilize a patch management approach to install revisions
  6. Implement a log management system
  7. Implement firm security policies (see https://www.e-janco.com/Security.htm and https://www.e-janco.com/cloud.htm)
  8. Review latest published cloud vulnerabilities
  9. Use  independent  3rd parties to find security vulnerabilities
  10. Conduct a security compliance audit
Top 10 Best Practices Cloud SecurityTop 10 Best Practices Cloud Security

The Cloud Guide and the Businesses and IT Impact Questionnaire are over 120 packed pages and include everything needed to plan for, negotiate, and manage an outsourcing process within an enterprise.  The top 10 best practices cloud security were the base for the creation of this.  The electronic document includes:

  • Cloud Outsourcing Management Standard Overview
  • Cloud Outsourcing Policy Standard Policy
  • Cloud Outsourcing Approval Standard Process
  • Sample Service Level Agreement 
  • Service Level Agreement Metrics Definition
  • Outline for Contract Negotiation 
  • Base Case Development Detail
  • Mutual Non-Disclosure Template
  • Job Description for Manager Cloud Applications
  • Job Description for Cloud Computing Architect
  • Business & IT Impact Questionnaire
  • ISO 27001 & 27002 Security Process Audit Checklist

Author: Victor Janulaitis

M. Victor Janulaitis is the CEO of Janco Associates. He has taught at the USC Graduate School of Business, been a guest lecturer at the UCLA's Anderson School of Business, a Graduate School at Harvard University, and several other universities in various programs.