Skip to main content
SolarWinds MSP
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
SolarWinds MSP
  • Products
    • Monitoring & Management
    • N-central Automate. Tackle complex networks. Get remote monitoring and management built for efficiency and scale.
    • RMM Start fast. Grow at your own pace. Try this powerful but easy remote monitoring and management solution.
    • Backup
    • Backup Get data protection for servers, workstations, applications, documents, and Microsoft 365 from one dashboard.
    • Security
    • EDR Defend against ransomware, zero-day attacks, and evolving threats with endpoint detection and response.
    • Mail Assure Leverage mail protection and archiving to keep your users safe from email threats and downtime.
    • Passportal Adopt and enforce best practices for password and documentation management with ease.
    • Tools & Services
    • MSP Manager Increase helpdesk efficiency with a robust PSA, ticketing, reporting, and billing management solution.
    • Take Control Help support customers and their devices with remote support tools designed to be fast and powerful.
    • View All
  • Solutions

    Solutions

    • Security Protect your customers and expand your business by offering layered security services without the complexity.
    • Monitoring Choose the right remote monitoring and management solution to meet you where you are and grow with you.
    • Operational Efficiency Boost profits by improving efficiency via automation, resources and training, and time-saving products.
    • IT Departments Keep your organization productive by easily managing IT from a single, easy-to-use, web-based dashboard.
    • Remote Monitoring Solutions Comparison Compare SolarWinds RMM and N-central side by side. Sign up to talk to a specialist to find the right fit.
    • View All
  • Resources
    • Download
    • Resource Library
    • Product Information
    • Free Tools
    • Learn
    • MSP Institute Webinar Series
    • Daily Live Demos
    • MSP Advice Project
    • Ask the N-central Experts
    • Upcoming Webcasts
    • Connect
    • Blog
    • Security Resource Center
    • Events
    • RMM Foundations Training
  • About
    • Company
    • About Us
    • Leadership
    • Careers
    • News & Press
    • Awards & Recognition
    • Support & Policies
    • Customer Success
    • Customer Support
    • Legal
    • Security
    • Get in Touch
    • Contact
    • Get a Quote
    • Worldwide Sales & Support
  • IT Departments
  • Contact Sales
    • Contact Sales
    • General Inquiry
    • Get a Quote
    • Worldwide Sales & Support
    • Talk to Specialist
    • Security Solutions
    • Monitoring Solutions
    • Operational Efficiency
  • Try Now
    • Monitoring & Management
    • N-central
    • RMM
    • Backup
    • Security
    • EDR
    • Mail Assure
    • Passportal
    • Tools & Services
    • MSP Manager
    • Take Control
  • Request a Quote
  • Try Now
    • SolarWinds RMM
    • SolarWinds N-central
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Mail Assure
    • SolarWinds Passportal
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
Request quote
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Cloud Computing Moving to the cloud: Help ensure your cloud-based web security
Cloud Computing

Moving to the cloud: Help ensure your cloud-based web security

By Danny Bradbury
15 June, 2017

So, you’ve decided to move to the cloud. It’s an exciting time for IT departments and businesses who stand to gain many advantages from a cloud solution. However, you don’t want to stumble blindly into it without understanding some of the cloud web security risks, and preparing for them with the appropriate technologies and techniques.

Companies can take various routes to cloud computing. They can use infrastructure as a service (IaaS), which gives them command line access to virtual machines in the cloud that they can then configure themselves. Many companies will use IaaS on their own premises, combining virtualization with workload management technology to produce in effect a private cloud. Some jump straight to a third-party, hosted IaaS provider.

Others will want to avoid the IT administration and simply use a cloud-based software-as-a-service (SaaS) model, which delivers applications in a users’ browser. The model you use will affect the kind of security measures you take, and who is responsible for them. 

The most common threats in the cloud

purpleone.jpgWhat security threats are most prominent in the cloud? The Cloud Security Alliance, a non-profit industry group, published a report on the top threats in February 2016. At the very top of its list was data breaches.

Losing data to online thieves is a big worry for companies shifting their applications to a public cloud service. What can they do to help avoid it?

Encryption is one answer. By encrypting data in the cloud, companies can render it useless to any intruder organized enough to steal it from a third-party cloud service provider.

Some SaaS applications tailored specifically for businesses come with encryption capabilities, but there are caveats. The encryption keys may be held by the same cloud service provider holding the data. This can, in some cases, render it vulnerable to rogue employees, highly motivated intruders, or perhaps even government agencies.

A cloud access security broker (CASB) can help solve the encryption problem. This service sits between the cloud user and service provider, enforcing security policies on any data passing between them. These policies can include not only encryption, but also user authentication and device profiling. 

The CASB will encrypt data en route to the cloud application where it is stored, and then decrypt the information on the way back to the user’s machine when it is accessed.

Companies dealing with sensitive data may feel uncomfortable trusting it to a SaaS application at all, even in encrypted form, or may be forbidden to by regulators. Tokenization may be the answer here. The tokenization system stores a digital token representing the information in the cloud that serves as a pointer to the real data, which is stored on the user’s own on-premises systems. When the SaaS application displays a token, a software agent on a local computer uses it to reference data stored locally. This requires the user to maintain their own infrastructure though.

Protecting user accounts in the cloud

protectingaccounts.jpgThe second gravest danger facing enterprise cloud users is weak credential and access management. This, combined with another threat, account hijacking, can turn a convenient cloud computing service into an attack vector and render a company vulnerable.

A good example of this was Code Spaces, a company that provided digital storage and project management services for developers. An attacker gained access to its Amazon Web Services™ dashboard and almost all its data—which was then deleted, effectively leaving the company without an operating business, and causing it to shut down.

Code Spaces died for two reasons. Firstly, someone managed to access the master account for the company on its Amazon® cloud service. 

Protecting accounts on a cloud service is key. Passwords are simply not adequate today, and companies should complement them with a second layer of protection. 

Two factor authentication (2FA) can help protect your employees’ cloud accounts. It is based on using something you have (typically your smart phone, but also sometimes a hardware token), in addition to the password that you know.

Smartphones using an app such as Google® Authenticator are sent a code that must be typed in to the cloud-based service. That way, even if an attacker steals an employee’s password, they still won’t be able to access the service. Some cloud services send a code in a text message.

Secondly, Code Spaces hadn’t made any backups. Companies putting sensitive data in the cloud should always maintain a backup of that data. Business-grade SaaS accounts may offer this. Any company using IaaS in the cloud can manage this on their own by using the appropriate tools.

Evaluating your cloud provider

cloudprovider.jpgUnderstanding whether your cloud service provider backs up data properly is just one part of a far broader evaluation process. When moving your data to a third-party provider, companies should quiz that provider on these key issues:

Storage location

Data jurisdiction is a legal minefield at present thanks to shifting laws on both sides of the Atlantic. It is important to understand where your data will be stored, and to get a guarantee that it won’t be moved to a region that will make you vulnerable to privacy protection laws.

Tenancy

Will your application and data be stored on a single-tenant or a multi-tenant solution? A multi-tenant account means that a single instance of a SaaS application serves multiple customers. Conversely, a single-tenant option provides a single instance of the software and its supporting infrastructure for your company alone.

Single-tenant systems can be easier to backup and restore, and are often more reliable. They can be more secure, because your data is truly segmented from others rather than simply being tagged as yours and stored on the same system as everyone else.

DDoS protection

If someone decides to hit another of your cloud service provider’s customers with a distributed denial of service (DDoS) attack, it could bring down not only their service but yours too. Ask your cloud service provider what it is doing to help prepare for these increasingly common attacks. There are services that can be paid for at the hosting level. You may also have to invest in your own DDoS protection service for extra resilience.

Managing insider threats

insiderthreats.jpgLet’s not assume that all threats will come from outside your organization. Insider threats are plaguing more companies, as employees, contractors, or business partners damage the company either maliciously or by accident.

Some insiders compromise the company by mistake—either uploading sensitive data to unauthorized cloud services or inadvertently giving up account information, typically thanks to a phishing email or malware. Others deliberately use their cloud services accounts to steal data or otherwise damage the company. You can help stop the use of unauthorized cloud services (typically known as ‘shadow IT’), by employing a combination of end-user training and security systems that limit access to certain URLs based on usage policies.

Cloud-based email protection is also an important part of a multi-layered defense strategy. We discuss antivirus protection elsewhere, but let’s not forget anti-spam and anti-phishing protection in the cloud. By filtering out emails that try to dupe employees into giving away their information, companies can reduce the risk of compromise.

Setting roles and responsibilities

Dealing with malicious insiders is a more complex problem. Companies need to watch for anomalous behavior (such as someone logging in at strange times from home and downloading large amounts of data), which requires some logging and auditing capability in the cloud-based service. Identity and Access Management is an important tool here, and this implementation will depend on a company’s existing directory systems.

Cloud-based web security is a two-way street

twoway.jpgResponsibility for cloud-based web security rests with both the service provider and the customer. At the very least, the customer must conduct due diligence when choosing the service provider, and understand which data is appropriate to store in the cloud. The closer that the customer gets to the raw infrastructure via IaaS, the more options and responsibilities they have in managing security for themselves.

While the security considerations associated with a cloud migration might seem daunting, they are also necessary from a data protection and governance perspective. Skipping them could result in headaches further down the line.

The potential benefits of a cloud-based solution in terms of cost savings and system flexibility often make the upfront planning overhead well worth it. Will it be worth it for you? Understanding your goals for a cloud migration and setting some quantifiable targets will help you find out, as will a pilot project to assess the benefits.

 

Danny Bradbury has been a technology journalist since 1989. He writes for titles including the Guardian newspaper, and Canada’s National Post. Danny specialises in areas including cybersecurity, and also cryptocurrency. He authors the About Bitcoin website, and also writes a regular blog on technology for children called Kids Tech News. You can follow Danny on Twitter® at @DannyBradbury 

 

To find out more about how MSP Web Protection, which uses 2FA, can help your business, click here.

 

© 2017 SolarWinds MSP UK Ltd. All rights reserved.

 

 

You might also like...
Cloud Computing

Moving to the Cloud - Cloud-Based Antivirus

Cybersecurity

5 Ways to Stop Phishing Attacks

Cybersecurity

MSP Data Breach 101: 4 things you need to know about data security

Best Practices

Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity

MSP Business

Operation Cloud Hopper-A wake-up call for MSPs and IT service providers

MSP Business

Are companies spending their IT Security Budget on the wrong things?

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • Three things I learned working for an MSP
  • Earning word-of-mouth referrals for your IT business
  • Backup automation part 1: Deploying backup devices
  • Ultimate Guide: MySQL Backup
  • Most common automation requests and how to solve them: Ep 2
Categories:
  • Security (240)
  • Tips & Advice (130)
  • Best Practices (97)
  • Backup & Disaster Recovery (96)
  • Managed Services (89)
  • The Head Nerds (82)
  • Business Growth (79)
  • IT Support (43)
  • Business (41)
  • Automation (40)
  • Operations (38)
  • Cybersecurity (37)
  • Mail (33)
  • Remote Management (30)
  • ITSM (26)
  • Networking (22)
  • Cloud Computing (21)
  • Data (21)
  • Marketing (15)
  • PSA (13)
  • Product (11)
  • Service Desk (6)
  • Services & Support (5)
  • Mobile (4)
  • Risk Intelligence (4)
  • GDPR (3)
  • Internet of Things (3)
  • Customer Service (3)
  • Research & Trends (2)
  • Training (2)
  • Business Risk (1)
  • LOGICcards (1)
  • Cybersecurity Awareness Month (1)
Show moreless
SolarWinds MSP

Products
  • SolarWinds RMM
  • SolarWinds N-central
  • SolarWinds Backup
  • SolarWinds EDR
  • SolarWinds MSP Manager
  • SolarWinds Mail Assure
  • SolarWinds Risk Intelligence
  • SolarWinds Take Control
  • SolarWinds Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • SolarWinds
  • SolarWinds Trust Center
  • COVID-19 Response
Support
  • SolarWinds RMM
  • Solarwinds N-central
  • SolarWinds Backup
  • SolarWinds Mail Assure
  • SolarWinds Take Control
  • SolarWinds MSP Manager
  • Solarwinds Risk Intelligence
  • Solarwinds Threat Monitor
  • SolarWinds Passportal
  • SolarWinds Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd.
All Rights Reserved.