The Doppler Quarterly Special Edition 2019 | Page 83

Step 5: Deploy, test, monitor. Deploy the security solution with the understanding that it is not a separate entity from the core system or the data but is bound to it. Many think they can decouple security from the core processes and data, but that is just not the case. Make sure to test the security. Many firms provide “white hat” penetration testing, and a few good weeks of that type of testing will provide some good insurance that the solution works, or perhaps it will point out the need for some addi- tional configuration. Finally, understand that monitoring is required over time. Easy steps? Yes. Needs some thinking? You bet. However, by following the steps above you’ll find that your cloud-based system is invariably more secure than anything currently in your data center. It’s tough for even those who don’t like the use of public clouds to push back on that fact. Written by David Linthicum SPECIAL EDITION 2019 | THE DOPPLER | 81