Select Page

Access control is paramount for effective security of data in the Cloud – expert

Access control is paramount for effective security of data in the Cloud – expert

Companies are increasingly shifting IT services and applications to the Cloud to be readily available to employees, empowering their productivity from wherever they are and from any device.

Moving critical business information to the Cloud does come with security challenges, with unauthorised access topping the list. To protect data in the Cloud, companies need to have appropriate measures in place to manage and control who has access, based on their credentials. This is according to Charl Ueckermann, CEO at AVeS Cyber Security.

“Before the Cloud, everything was hosted on physical servers in your data centre at your premises. If someone wanted access to your data, they had to overcome several security obstacles along the way. A person needed physical access to your server room, bypass a Firewall or Intrusion Prevention Services installed on the servers, and outwit any other security controls blocking his/her way into the organisation’s databases,” he said.

“There is a misperception that if the Cloud is secure, measures to control access like this are not necessary, as the data is in a ‘safe place’, so it must be safe. This isn’t necessarily true. The same level of vigilance is required to control access to data in the Cloud than what is necessary with data hosted onsite. It is also essential to control and manage what different levels of employees can do with that data. Lack of access control, as well as the misuse of employee credentials, means data can be accessed by people who are not allowed to see it,” added Ueckermann.

He explained that companies operate in a highly-regulated environment and are obligated to protect their information. To comply with industry or governmental regulations, they should protect their data and carefully control who has access to it.

Companies cannot rely on usernames and passwords alone to effectively control access to the Cloud, as 80% of breaches in the Cloud are due to weak passwords.1 Multi-factor authentication to access cloud services should be non-negotiable. For example, when you use Microsoft’s Authenticator on your smartphone, there are four layers of security. These are: where you are, based on the geographic location from where you are logging in; what you know, being your username and password; what you have, namely your mobile device in your hand; and who you are, which would be your biometric code to access your phone, he said.

“Similarly, you ideally want at least three ways to authenticate your employees before they can access company resources in the Cloud. Besides, there should be clearly defined containers to segregate who has access to what information once they have been authenticated. Employees should be granted access only to the information they require to do their work. Authorisation measures should also be in place to ensure that information cannot be downloaded by or shared with people who don’t have permission,” he added.

According to him monitoring tools can also help to pick up on abnormal behaviours. For instance, Geolocation control would detect unusual behaviours such as a login by an employee in Pretoria and five minutes later, a login in Germany by someone using the same login details. Monitoring tools will also detect mass downloads, mass deletes and any other activities that are outside the norm.

He stressed that employee education should form part of any organisation’s cloud security strategy. “People tend to trust too easily and not verify enough when it comes to IT security threats. They open emails, click on links, share information, download information and share their passwords without understanding the potential consequences. For a cloud security strategy to succeed, it is vital that employees understand the risks, how their actions can make data vulnerable, and what they can do to keep data safe.”

Meanwhile Ueckermann concluded with the following tips: Implement appropriate governance processes and policies to formalise and govern how organisations manage their data security in the Cloud; Deploy effective technologies that are specific for the Cloud to enable identity management and control access to data and Relentlessly continue with user education and awareness to make your employees part of the solution rather than a vulnerability.


Caption: Reference: 1. Martins, A. (2019, 02 27). Poor Access Management Leads to Majority of IT Hacks, Study Finds. Retrieved from businessnewsdaily: https://www.businessnewsdaily.com/11310-cyberattacks-poor-access-management.html


 

About The Author

Guest Contributor

A Guest Contributor is any of a number of experts who contribute articles and columns under their own respective names. They are regarded as authorities in their disciplines, and their work is usually published with limited editing only. They may also contribute to other publications. - Ed.

Windhoek – Flat to let near central business district

One Bedroom flat for SINGLE tenant

Separate bedroom, separate bathroom, combined kitchen and lounge

Secure yard with one inside parking bay

Parking bay under shade netting

Walking distance from the CBD

One block away from Wernhil Shopping Mall

Quiet street – G4S security

Water included, electricity excluded

Monthly rent: N$5289.00 excluding electricity and N$160 for parking

Deposit: N$2500

Available immediately

To view please contact Mrs Don Camm

Tel: 061 221925