Security of information in the cloud

Security of information in the cloud

Rodrigo Hernández – March 9, 2015

Nowadays it is very common to hear about the services in the cloud, the adoption of these new trends in your organization makes you think about the security of your information. The present article aims to inform you about the most relevant security aspects of cloud storage.


Physical security

Physical security is the first question you may ask yourself when choosing a cloud service, and at this point you should consider that most of the data centers are staffed with security personnel 24×7, with closed circuit TV equipment, last generation access controls such as biometric facial recognition and fingerprint readers that control bullet proof doors and access to the data center. Inside the data center, servers are covered by cages that prevent direct access to them, there is where your information is. There are security points within the data center which are separated by reinforced concrete walls and security doors.

Access to information

A second level of security that should be considered is the one that is used directly at your offices, which is the link to access the information in the cloud. At this point, it is important to highlight that possibly, this security level was already used to access your applications when they were local. With this, we refer to network security, passwords, computation equipment, browsers, Internet and anti-viruses, just to mention some elements needed to gain access to information in the cloud. If you analyze each element, you will notice that there is an acceptable risk for your information, however, this risk already existed or it is the same when your information was locally.

Transmission of data

A third element of security is the transmission of data over the Internet.  Today, there are security protocols to manage information on the Internet and that you should review in order to determine whether the cloud application you want to use is compatible with different security protocols. Interception of information over internet has existed since long ago, and security in this area has also made progress, from using information encryption protocols or secure URLs, in case of having access through browser, to VPN usage in order to ensure the a secure transmission of information.

Although risks still exist, it is necessary to analyze that most of them are the same when your information was not stored in the cloud: physical security, access to information and transmission of data over the network; and the benefits are much more.