The Doppler Quarterly Special Edition 2019 | Page 83
Step 5: Deploy, test, monitor.
Deploy the security solution with the understanding that it is
not a separate entity from the core system or the data but is
bound to it. Many think they can decouple security from the
core processes and data, but that is just not the case.
Make sure to test the security. Many firms provide “white hat”
penetration testing, and a few good weeks of that type of
testing will provide some good insurance that the solution
works, or perhaps it will point out the need for some addi-
tional configuration. Finally, understand that monitoring is
required over time.
Easy steps? Yes. Needs some thinking? You bet. However, by
following the steps above you’ll find that your cloud-based
system is invariably more secure than anything currently in
your data center. It’s tough for even those who don’t like the
use of public clouds to push back on that fact.
Written by David Linthicum
SPECIAL EDITION 2019 | THE DOPPLER | 81