The Doppler Quarterly Fall 2017 - Page 65

Keep in mind, security is systemic to cloud computing. It’s a part of every step in the plan. Step 5: Deploy, Test, Monitor. Deploy the security solution with the understanding that it is not a separate entity from the core system or the data, but is bound to it. Many think they can decou- ple security from the core processes and data, but that is just not the case. Make sure to test the security. Many firms provide “white hat” penetration testing, and a few good weeks of that type of testi ng will provide some good insur- ance that the solution works, or perhaps it will point out the need for some additional configuration. Finally, understand that monitoring is required over time. Easy steps? Yes. Needs some thinking? You bet. How- ever, by following the steps above you’ll find that your cloud-based system is invariably more secure than anything currently in your data center. It’s tough for even those who don’t like the use of public clouds to push back on that fact. FALL 2017 | THE DOPPLER | 63