Cloud Computing Security

6 Common Wrong Practices in Cloud Computing Security

Here are six wrong practices in cloud computing security that you should avoid.

Wrong Practices in Cloud Computing Security

Attacks on misconfigured cloud servers and the exposed data that thieves get from them are frequently reported in the news. We are all humans, thus mistakes do happen.

For example, we might put up a cloud server with sloppy (or non-existent) credentials and then neglect to tighten them once it’s in production. Alternatively, when exploits happen, we fail to keep software up to date, or we fail to involve IT in auditing the finished production app to ensure that it is as secure as possible.

So below are the most common wrong practices that you should avoid in cloud computing security.

1. Poor Security Configuration

Poor security configuration is the most common problem with cloud computing security. Here, we fail to configure the server properly, and we do not keep it updated with patches and security updates. Poor security configuration can be used as an entry point for hackers. A good security configuration should include ensuring that you use strong passwords and change default passwords

2. Using Two Factor Authentication

Using strong encryption settings on boot drives and data drives, such as BitLocker on Windows or FileVault on Mac OSX. This ensures that if a thief steals the server, they will not be able to read your data.

Ensuring that you have a firewall in place that blocks all traffic from the public Internet, except for those ports that need to be open. This can be done by setting up a virtual private network (VPN) between the cloud server and your corporate network. In addition, you should also have a VPN connection from your corporate network to your office, so that if someone attempts to attack from the outside, it will not reach your internal network.

3. Leaving Credentials Unprotected

Leaving credentials unprotected is another common mistake in cloud computing security. If we do not handle our cloud servers with care, we may leave credentials such as login details and passwords open for all to see. This is an easy way for hackers to gain access to your data and steal it for their use. 

To avoid this, you should keep your login details and passwords secure at all times, and never write them down or share them with anyone else.

4. Storing Sensitive Data on Servers Outside Your Control

This is a common problem with large businesses where you may not be able to control what is stored on the cloud servers of your vendors and partners, so it’s always good practice to fully vet any potential partners before handing over sensitive data or using their services in any way. 

It’s prudent to ensure that you have a written agreement in place with your partners or vendors that stipulates what they can store or share on their servers, how long they keep it for, and who they are allowed to share it with if any at all.

5. Not Monitoring Servers for Unauthorized Access Attempts

Another wrong practice is not monitoring servers for unauthorized access attempts. Usually, large businesses face this where hackers gain access through vulnerabilities in software or by brute-forcing their way into the servers via trial-and-error methods until the combination of letters/numbers works outright

6. Not Using Encryption When Storing Data on Cloud Servers

Not using encryption when storing data on cloud servers is another common problem in cloud computing security. This is where the sending of sensitive data happens. That is, without any protection whatsoever. Perhaps via email or instant messaging apps such as Skype or WhatsApp, which are very vulnerable means of communication.

Click to rate this post
[Total: 0 Average: 0]
Scroll to Top