Is the door to your Cloud servers locked? Your cloud provider should have excellent security. But did your company leave the back door open?
Check the services your cloud provider offers. Are you taking advantage of the services related to security that your company cannot handle? Your cloud-based servers need updates applied as they’re released. Letting these lapse leaves you open for attack.
Do you check your server logs regularly? It’s a good practice to track event logs for account configuration, user creation, and authentication failures. Cloud providers may offer a tracking service, such as AWS CloudTrail.
Are your API and encryption keys and admin passwords stored in a safe place? Share these with only trusted developers and away from prying eyes. AWS offers Secrets Manager, and Azure suggests Key Vault as safe places.
Did you use FTP to access a cloud server? FTP has been used to attack a network and gain sensitive information. Best to close off the FTP.
Are your cloud servers being accessed remotely in different ways? If you’re not careful or vigilant, remote access offers a way into your servers. Secure your remote access.
Are your applications secure? Attacks on web applications have recently doubled. Applications access many servers and services to run efficiently. Don’t leave an open door for illicit access.
With attackers looking for any way in, don’t leave your back door open. Monitor all the access points and use the cloud services available to help keep unwanted eyes out.
Author: Kris Keppeler, a writer who finds technology fascinating and loves humor. She writes for Crossing Genres on Medium.com and Does This Happen to You? on Channillo. Award-winning podcast producer who enjoys telling stories. Follow her @KrisKKAria on Twitter or on LinkedIn.