Keep in mind, security
is systemic to cloud
computing. It’s a part of
every step in the plan.
Step 5: Deploy, Test, Monitor.
Deploy the security solution with the understanding
that it is not a separate entity from the core system or
the data, but is bound to it. Many think they can decou-
ple security from the core processes and data, but that
is just not the case.
Make sure to test the security. Many firms provide
“white hat” penetration testing, and a few good weeks
of that type of testi ng will provide some good insur-
ance that the solution works, or perhaps it will point
out the need for some additional configuration. Finally,
understand that monitoring is required over time.
Easy steps? Yes. Needs some thinking? You bet. How-
ever, by following the steps above you’ll find that your
cloud-based system is invariably more secure than
anything currently in your data center. It’s tough for
even those who don’t like the use of public clouds to
push back on that fact.
FALL 2017 | THE DOPPLER | 63