Security in the cloud is much like security in your on-premises data centers – only without the costs of maintaining facilities and hardware. In the cloud, you don’t have to manage physical servers or storage devices. Instead, you use software-based security tools to monitor and protect the flow of information into and of out of your cloud resources. Cloud security controls
Cloud security is effective only if the correct defensive implementations are in place. These controls are put in place to safeguard any weaknesses in the system and reduce the effect of an attack. While there are many types of controls behind a cloud security architecture, they can usually be found in one of the following categories
Deterrent controls are intended to reduce attacks on a cloud system. Much like a warning sign on a fence or a property, deterrent controls typically reduce the threat level by informing potential attackers that there will be adverse consequences for them if they proceed. (Some consider them a subset of preventive controls.)
Preventive controls strengthen the system against incidents, generally by reducing if not actually eliminating vulnerabilities. Strong authentication of cloud users, for instance, makes it less likely that unauthorized users can access cloud systems, and more likely that cloud users are positively identified.
Detective controls are intended to detect and react appropriately to any incidents that occur. In the event of an attack, a detective control will signal the preventative or corrective controls to address the issue. System and network security monitoring, including intrusion detection and prevention arrangements, are typically employed to detect attacks on cloud systems and the supporting communications infrastructure.
Corrective controls reduce the consequences of an incident, normally by limiting the damage. They come into effect during or after an incident. Restoring system backups in order to rebuild a compromised system is an example of a corrective control.
Cloud Device security software for Windows, Apple Macs, and Android devices. Enterprise-grade protection keeps your computers, laptops, and tablets safe from malware, intruders, and data loss. Security is managed and optimized in real-time, 24/7. Continuous protection from cyber risk with artificial intelligence and the latest threat updates from around the world- Are you able to measure the security level of your smarhttp://www.tuskerdatalab.com/wp-content/uploads/2018/10/IOTS-1.jpgt devices in their design or use?
AWS & Azure Cloud Security
With the emergence of cloud services such as AWS, the threat landscape has evolved, but with the right preparation any company can implement security practices in AWS that significantly reduce the potential impact of a cyber-attack.
Azure Cloud Security foundation
Tusker Data can help you take advantage of multi-layered security provided by Microsoft across physical datacenters, infrastructure, and operations in Azure and help build security controls integrated into the hardware and firmware components, and added protections against threats such as DDoS. cybersecurity experts that work together to help safeguard your business assets and data in Azure
Depending on the cloud service model, there is variable responsibility for who is responsible for managing the security of the application or service. There are capabilities available in the Azure Platform to assist you in meeting these responsibilities through built-in features, and through partner solutions that can be deployed into an Azure subscription.
The built-in capabilities are organized in six (6) functional areas: Operations, Applications, Storage, Networking, Compute, and Identity. Additional detail on the features and capabilities available in the Azure Platform in these six (6) areas are provided through summary information.