Creating an interactive data experience Free Webinar 09/21/2021 Creating an interactive data experience Sign up now
Close banner
Go back to Blog's hub Blog   |   tags:  

Yes, Cloud Security is Within Reach

Written by GoodData Author  | 

Share
Yes, Cloud Security is Within Reach

This holiday season, the volume of retail and ecommerce data breach news almost rivals the tales of Black Friday shopper stampedes and impossibly long lines. Every time a major breach is written, tweeted, or talked about, it spurs a discussion about the safety of data in the cloud. And these discussions ultimately end in a question: can we ever fully secure data in the cloud?

As the end-to-end analytics solution in the cloud, we at GoodData have a deep investment in keeping our cloud platform and customers’ data secure. The days of “data only behind a firewall” are long gone, since cloud adoption has skyrocketed (as evidenced by its placement in Gartner’s tech predictions for the last six years). Yet we can’t expect organizations to trust us with their data unless they know what cloud vendors like us will do with it.

I feel that security is essentially about two things: complete transparency and diligent execution. Vendors in the cloud need to ensure a transparency into their processes and operations that allows a customer to feel like they are a part of the organization. Customers must also be able to “trust but verify” with cloud solutions, allowing them to clearly see if the expectations of the relationship have been met.

When it comes to execution, it is crucial that vendors adhere to the old adage: “Say what you do. Do what you say. Then prove it.” When a relationship with a new customer is built, expectations must be outlined in clear, concise language. Then we have to deliver on all our promises, and show customers that we have executed simply and flawlessly. If a cloud vendor builds a specific solution, they can tailor their security programs to work for that solution. Diligent execution of a tailored strategy, from contract-signing throughout the relationship, is key to aiding IT managers in their negotiation of infrastructure from multiple vendors. Tailoring must be self-evident in the operational processes we follow, stated in the contractual obligations given to the customer, and attested to in the cyclical audit program. This way, we can keep the cloud safe.

As Samuel Johnson famously said, “What we hope ever to do with ease, we must learn first to do with diligence.” If we remain vigilant, transparent, and customer-oriented, cloud security is in our grasp. We just have to work for it.

Image: Creative Commons

Written by GoodData Author  | 

Share
Go back to Blog's hub Blog   |   tags:  

Subscribe to our newsletter

Get your dose of interesting facts on analytics in your inbox every month.

Subscribe