Back to the Trustworthy Future for Cloud Security

It is an understatement that security is the hot topic in IT right now.  This is of course being driven by the push to the cloud and the need to help organizations understand that the cloud is secure.  This reminds me quite a bit of the early part of the last decade when Microsoft needed to introduce the trustworthy computing initiative as a response to the flaws being uncovered in their products.  It seems like while many things have become much better based on the evidence of constant hacking incidents making headlines that perhaps some discipline has been lost with smaller teams and higher demands.  

Cloud providers are very safe places with unmatched investments in security.  However they are big and complex and there are many ways that solutions can be deployed that are not secure.

It is time to get back behind what the primary tenant of trustworthy computing which was to ensure that systems were built to be secure from the start.  This means that organizations need to take the time to look at the provider an the solution being proposed early and make sure they understand how to secure all the components to meet their organizations security requirements.  Doing this up front will save significant time and cost on the back end of a deployment.

I would also suggest this is a great time to take a hard look at your security policies and work to update them for the world we live in today or the world you expect your business to operate in going forward.  I am continually having discussions related to data protection and relevant contexts to protect it.  For example when doing work is an email address PII or not as it relates to using cloud and cloud systems.  When migration to a SaaS based email solution the corporate email addresses are not a PII consideration for the suitability of that service.  We need to move beyond this types of conversations driven by out of date reasoning.

Ideally the goal is to not slow things down but to build in the practices up front for security that do not hinder agility.  

To view or add a comment, sign in

More articles by Greg M.

  • Recent Malware incursions

    Well based on the news over the past few days with "Wannacry" it feels like we are back to the days of the early 2000's…

    3 Comments
  • What's going on with home users...

    Helping out family with their home technology problems is a professional hazard of working in IT. I thought I would…

    5 Comments
  • Are there untapped enterprise savings in Voice?

    Enterprises today spend a great deal of money on providing voice communications to their employees. They provide…

    4 Comments
  • My 2017 Tech Predictions

    It has been some time since my last post and with 2017 off and running and me just back from out of the country over…

    2 Comments
  • Is Device Innovation Dead?

    After the latest device announcements from Microsoft (Surface Studio) and Apple (Mac) I have decided that I miss Steve…

    3 Comments
  • The cloud offers the opportunity to think different..

    As I talk to organizations about cloud transformation the consistent theme is how do I support the agility that the…

  • At Microsoft what old is new again..

    So Microsoft is hip again. This is great for me who has hung my hat on transforming the world via Microsoft technology.

  • Best practices for Office 365 Tenant consolidation

    With all the M&A activity that has been going on over the past few years I am starting to see quite a bit more demand…

    1 Comment
  • It is time for pervasive Multifactor authentication

    Passwords just do not work anymore to secure access to systems. I think we are finally at a point where easy, cheap…

  • Skills for the Cloud IT Professional

    I have been thinking lately how much of the work IT Pros needed to do as part of their job 5 years ago is rapidly going…

    3 Comments

Others also viewed

Explore content categories