Skip to content

The cloud can be considered secure if it meets some baseline criteria. The initial tier of Cloud Security rests with the entity that had employed a cloud based solution. Some requirements at this level will include secured login devices, unique access credentials and multi factor authentication.

Once a user has legitimately passed authentication protocols, the next aspect that makes the cloud secure is encryption of data in transit. This means that all data that will flow between the data center of a CSP and user’s login device will be encrypted while it’s in transit.

Encryption will ensure that even if data is lost or stolen in transit, any unintended recipient of that data will not be able to access its contents in an intelligible form. Once data is safely parked in the data center of a CSP, the responsibility of its safety is more on the CSP now.

CSPs ensure cloud security by deploying strong firewalls around the whole cloud network. Consider a firewall as a castle’s walls that keep its inhabitants safe from external threats. CSPs make the data further secure by keeping it fully encrypted when not being used by the cloud tenant.

Data encryption at rest ensures that even if the cyber security of a CSP is breached and an attacker gains access to the data, it will not be in an intelligible form. The last aspect of data security pertains to its backup. This is done in the event that an attacker gains unauthorized access to critical data and wipes it clean.

We can conclude that the cloud is secure if it meets some of the above major criteria and dinCloud’s main focus is on security. If a cloud solution is vulnerable in any of the above aspects, the security of such a cloud is doubtful.