Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa | Cloud Security istockphoto.com/LeoWolfert
  • Industry News
  • Cloud and Mobile Security

How can I make it safe for our employees to use cloud services?

The cloud is now indispensable for most companies. Cost savings, flexibility and scalability are decisive advantages for companies. But the effects on IT security are ambivalent.

Numerous companies use cloud offerings such as Microsoft's Office365 or install their own systems on cloud computing platforms such as AWS. Administrators are faced with the task of securing their use in the company.

  • Access to the cloud should only be possible via virtual private networks (VPN)
  • Different cloud services require different security concepts
Companies are increasingly turning to cloud services. Even in the last few years before the Corona pandemic, studies showed continuous growth. In the meantime, very few companies can manage without cloud. According to this year's Cloud Monitor by Bitkom and KPMG, only three percent of companies intend to do without the cloud in the future.

The survey also revealed that security issues are the most important criterion for almost all cloud customers. But in practice IT security often lags behind, because not everyone realizes that the company also bears part of the responsibility for it. Our experts explain what is important here.

 

Different cloud applications need different security concepts

Michael Weirich, IT security project manager at eco, the Internet industry association, advises accessing cloud services only via a virtual private network (VPN):

The first organizational measure is to protect access to the cloud services separately. Access to the company cloud should only be possible via trusted connections. A VPN ensures an encrypted connection between the employees' devices and the company network that provides the cloud services. 

Companies must take appropriate measures to secure cloud access on employees' user devices. Two-factor authentication should be used here in addition to a strong password. A rights system should be used to controll the sharing of data and services.

When selecting cloud services, attention should be paid to certifications as well as locations of the provider. One example is the EuroCloud SaaS certification: The benchmarks of this certification are the German and European laws on data protection and IT security as well as international standards. The Trusted Cloud website lists cloud providers with their security certifications.

Robert Couronné heads the Cybersecurity thematic platform at the Bavarian Society for Innovation and Knowledge Transfer, Bayern Innovativ. He points to the need for different security models for the various cloud models:

First of all, it is important to distinguish which cloud services are involved. Native cloud applications such as Office365 can offer significant security advantages, especially for SMEs. Since the protection of cloud services is in the cloud provider's own interest, it will use professional protection measures. This applies to the security of the application servers, the communication links and the associated user data.

If you only book "virtual computers" in the cloud and equip them with your own software, you are responsible for securing them yourself, similar to servers in your own data center. The advantage is then limited to the additional location.

If cloud services are used for data backup, they must be protected behind a firewall. To prevent ransomware attacks, they must not be part of your own domain and must not be accessible with Active Directory access rights. In this way, they also offer the advantage of a second location.

 

Cloud security requires special knowledge

While certain cloud services can bring significant security benefits, especially for smaller companies, in most cases it remains the responsibility of the company to take security precautions and secure cloud usage within the company accordingly. This includes secure access via VPN as well as multi-factor authentication (MFA). Also, a dedicated rights system is helpful so that access rights can be customized in each case and are limited to what is necessary. However, the security specialists in the company need appropriate expertise, because cloud configurations are often faulty and thus form a gateway for attackers.

Author: Uwe Sievers

 
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.