Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • IT Management
    • Storage

    Identity and Access Management Control

    By
    Fahmida Y. Rashid
    -
    September 30, 2011
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1Identity and Access Management Control

      1

      You need to know who is accessing your data, at what levels they can access it and whether they can alter it. This requires a clear, concise and auditable identity and access management control system that includes vendors, sub-contractors and your employees.

      2ROI

      2

      Cloud computing can yield a high security ROI because you dont have to hire a whole security team. Evaluate the security costs of your current data center operations and build appropriate security controls into your Service Level Agreement (SLA) to generate a high ROI.

      3Business Continuity

      3

      Your business must operate at all times. Thats why you need business continuity based on the level of down time your business can withstand. Negotiate your tolerance levels and determine if you need to take out an insurance liability policy against your cloud provider.

      4Security Configuration

      4

      Remember to keep your crown jewels separate from your costume jewelry. Take inventory of your data, strategically manage security levels based on information prioritization and configure security based on the privacy levels of corporate data. In the long run, it will save you money.

      5Reporting and Notification

      5

      How will you be notified of malware incidents or attacks on your data? Develop a plan that determines what types of incidents need to be reported and to whom. Know at what point during the notification process you should call in local law enforcement.

      6Determine Risk

      6

      The cloud helps increase business efficiency and productivity, but also increases risk of data loss. Acknowledge this tradeoff and ensure that you have compensating security controls in place to protect data, such as email encryption.

      7Private Data

      7

      If youre putting private data such as personnel records in the cloud, determine in advance the reporting requirements necessary to satisfy privacy breach notification laws.

      8Evaluate the Environment

      8

      Consistent auditing and evaluation allows you to update any missing links within your security solution for improved compliance and effectiveness. It also supplies the verification component to the trust-but-verify model.

      9How to Investigate

      9

      You need to be prepared in case you become the subject of an internal- or law-enforcement investigation. Make certain your cloud provider will support your efforts.

      10Exit Strategy

      10

      Be 100 percent clear on what leaving your cloud provider means. How will they give you back your data, sanitize it from their systems and backup tapes, and ensure you have no further liability?

      PrevNext

      MOST POPULAR ARTICLES

      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×