Événement de lancement : Smart AI Security. Contrôle total des données. Réservez votre place

fermer
fermer
Le réseau de demain
Le réseau de demain
Planifiez votre chemin vers un réseau plus rapide, plus sûr et plus résilient, conçu pour les applications et les utilisateurs que vous prenez en charge.
Essayez Netskope
Mettez la main à la pâte avec la plateforme Netskope
C'est l'occasion de découvrir la plateforme Netskope One single-cloud de première main. Inscrivez-vous à des laboratoires pratiques à votre rythme, rejoignez-nous pour des démonstrations mensuelles de produits en direct, faites un essai gratuit de Netskope Private Access ou participez à des ateliers dirigés par un instructeur.
Un leader sur SSE. Désormais leader en matière de SASE à fournisseur unique.
Netskope est reconnu comme le leader le plus avancé dans sa vision pour les plateformes SSE et SASE.
2X est un leader dans le Magic Quadrant de Gartner® pour les plateformes SASE
Une plateforme unifiée conçue pour votre parcours
Sécuriser l’IA générative pour les nuls
Sécuriser l’IA générative pour les nuls
Découvrez comment votre organisation peut concilier le potentiel d'innovation de l'IA générative avec des pratiques robustes en matière de sécurité des données.
Prévention des pertes de données (DLP) pour les Nuls eBook
La prévention moderne des pertes de données (DLP) pour les Nuls
Obtenez des conseils et des astuces pour passer à un système de prévention des pertes de données (DLP) dans le nuage.
Réseau SD-WAN moderne avec SASE pour les nuls
SD-WAN moderne pour les nuls en SASE
Cessez de rattraper votre retard en matière d'architecture de réseau
Identification des risques
Advanced Analytics transforme la façon dont les équipes chargées des opérations de sécurité utilisent les données pour mettre en œuvre de meilleures politiques. Avec Advanced Analytics, vous pouvez identifier les tendances, cibler les domaines préoccupants et utiliser les données pour prendre des mesures.
Support technique de Netskope
Support technique de Netskope
Nos ingénieurs d'assistance qualifiés sont répartis dans le monde entier et possèdent des expériences diverses dans les domaines de la sécurité du cloud, des réseaux, de la virtualisation, de la diffusion de contenu et du développement de logiciels, afin de garantir une assistance technique rapide et de qualité
Vidéo Netskope
Formation Netskope
Grâce à Netskope, devenez un expert de la sécurité du cloud. Nous sommes là pour vous aider à achever votre transformation digitale en toute sécurité, pour que vous puissiez profiter pleinement de vos applications cloud, Web et privées.

Information Security Policy for the Cloud: Dos and Don’ts

Mar 24 2015
Tags
Cloud Access Security Broker
Cloud Best Practices
Cloud Data Breach
Cloud Data Protection
Cloud Management
Cloud Security
Cloud Security Service
Cloud Visibility
Compliance
Data Loss Prevention Software
Information Security Policy

Chances are your company has several common sense security policies, like not giving out sensitive information over the phone to random callers, locking the door if you’re the last one to leave, and making sure nobody steals someone else’s lunch from the refrigerator.

You’ll want to apply that same type of commonplace wisdom when it comes to storing important data and documents in the cloud, but of course things can get a bit more complicated. Companies are now major targets for data hacks, so establishing a strict information security policy is a necessity. Here are some quick do’s and don’ts when getting started on building a cloud security policy for your company:

  • Don’t Rush Into Anything. Preferably, you’ll want to create an information security polocy before you begin hosting sensitive data with any cloud app or service. An important first is just getting organized. You’ll want to figure out which data to store in the cloud, how you want to classify it, and how to segment it. For instance, you won’t want your uber-confidential customer details stored in the same place as , say your public press releases.
  • Do Pick the Right Team. Make sure you chose the right IT staff to act as administrators and guardians of your information security policy. These should be reliable folks who you can trust with sensitive information and access. They’ll be the ones doing things like helping negotiate SLAs (service level agreements), designating access, transferring data, and monitoring storage usage.
  • Do Research on Cloud Providers. Research cloud apps and providers to find the best ones that suit the unique needs of your business, as it applies to an information security policy. Explore the cloud app ecosystem to get an idea for different providers and the sanctioned and unsanctioned apps they work with. Before agreeing to any terms, determine questions like where your data will physically be located, what they provider’s application security policy is like for sensitive data, what their level of administrative privileges will be like, and what the strategy would be for removing important data when needed.
  • Don’t Automatically Block. IT departments that knee-jerk with “no” when building an information security policy are going the way of the dinosaur. Sure, you have to draw a line somewhere when it comes to app redundancy and the most egregious of security violators (such as poorly-rated apps), but beyond that, you should adopt an application security policy that allows the apps, but blocks the activity you should be concerned about, such as certain kinds of data pulling. In the end, this will make for a much more user-friendly experience, while providing smarter overall security.
  • Do Ensure 360° Data Protection. There’s likely a whole lot of additional apps, both sanctioned and unsanctioned, for whatever cloud provider you eventually settle on. For instance, if your team has chosen Salesforce, they might also be interested in using DocuSign, Evernote, or Zendesk in combination. We recommend finding out what apps your organization is using in conjunction with your cloud service provider and understanding the workflows of those apps and which data they pull in, for instance. Then, secure data access to those apps, monitor them, and enforce policies in the major apps, which will then extend to others. Here’s some more information.
  • Don’t Leave Users in the Dark About Cloud Usage Policy. Your users are often your most valuable asset, so you want to make sure you are transparent when it comes to cloud usage policies. In addition to communication policy details beforehand, you also want to build coaching into a real-time workflow and automatically notify users when they are out of compliance. Make users a part of the solution and not simply a part of the problem.

If you’d like some assistance with all this, Netskope can help monitor your cloud apps and assess them for risks. In fact, we’ll even estimate your cloud app risk for free. Questions? Get in touch by emailing or tweeting at us.

author image
Bob Gilbert
As Vice President of Strategy and Chief Evangelist at Netskope, Bob is dedicated to helping clients transform their security and networking infrastructure.
As Vice President of Strategy and Chief Evangelist at Netskope, Bob is dedicated to helping clients transform their security and networking infrastructure.
Connectez-vous avec Netskope

Subscribe to the Netskope Blog

Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.