Information Technology Reference
In-Depth Information
Accounts and Credentials Policy Making sure your organization implements a strong
accounts and credentials policy goes a long way. Typically, long alphanumeric passwords
that regularly expire and are consequently changed prove to be a strong remedy against
password hacking.
Browser Security Policy Not all browsers are safe. Most of the cloud services and tools
are web accessible. Thus, making sure there is strong security behind browsers is a big
plus. Browser vulnerabilities can be mitigated by visiting only trusted websites (with cer-
tificates) and regularly updating the browser software.
Data Encryption Organizations that use cloud storage services for sensitive data must
make sure that their servicing chain uses strong data encryption, particularly if public cloud
storage is used as the platform or infrastructure.
Service Provider Architecture Thorough understanding of the cloud service provider
architecture not only helps in choosing a provider, it also helps to see how it fits your
organizational needs.
Mobile Devices Mobile devices are fast becoming ubiquitous. The mobile device security
policy should adhere to the standard organizational security policy. Mobile applications can
be made secure and robust against attacks by ensuring security standards and releasing
regular updates and bug fixes
Cloud Quality Assurance (QA) Policy The QA involves management of test resources,
data storage habits, and network habits of the employees. Management should ensure
availability of proper and relevant test resources and techniques.
QA management should be responsible for making sure employees follow a standard
way of sharing important files and information (such as through a portal or a version
control system). To prevent improper data storage habits, QA managers may need to
mandate using a centralized or some sort of a coherent facility.
QA managers may also mandate a proxy server that allows access only to a few relevant
resources. This has two main advantages: it prevents network misuse and helps manage
network load.
Summary
Deployment and testing are the most important stages for migrating toward the cloud. In
this chapter we uncovered models and strategies to exercise deployment from an in-house
data center to the cloud. We discussed emerging cloud implementations as organizations
look into local, offsite, and public cloud offerings. Private, community, public, and hybrid—
all existing cloud models derive their types from methods of deployment. We also discussed
cloud management strategies for each of the popular cloud deployment models.
 
Search WWH ::




Custom Search