End users must protect their data in the cloud

Alexey Parfentiev, Head of Analytics and Business Strategy at SearchInform.
Alexey Parfentiev, Head of Analytics and Business Strategy at SearchInform.
by
3 years ago

Gartner expects that by 2022, 95% of cloud security breaches will be caused by users working with the cloud services. There are solutions which monitoring user activity with data in the cloud storage. Even though data is in the cloud and cannot be governed and limited by the rules of the corporate perimeter, the solution will keep an eye on access rights to confidential data configured by specialists within the settings.

SaaS vendor encryption offered to customers is not enough when it comes to data protection, as you have to rely on the vendor’s safety level, and when an attack affects the vendor, your data gets affected too. Taking your own encryption measures will let your business depend on your own established regulations.

By 2022, 95% of cloud security breaches will be caused by users working with cloud services

One of the major problems is that nowadays IT cannot be centralised on-site, it has to lose the grip of control and branch outside the perimeter allowing a company to purchase multiple SaaS solutions. It is complicated to manage all settings of every SaaS solution an average organisation deploys, as an average company uses over 100 SaaS applications.

What is easy to use – is not necessarily safe to use, the quicker we access and share data, the less obstacles there are for everyone else to do it.

Solutions delivered via the cloud are coded and re-coded, updated all the time, no one can be sure that every further update does not omit a newly formed breach in security.

Also, settings do not get changed simultaneously. You cannot keep up with external settings alterations and tweak your own in accordance with them every time a slight change is made.

What is easy to use, is not necessarily safe to use

But that is what is needed to be done, there must be correct access privileges for those who can make changes in the settings, so that unnecessary changes are not made manually by anyone.

Remember to make sure that no corporate data stored in the cloud can be downloaded by a third party without authorisation. Pay attention whom you grant the access to, and do not send a link until you are sure that the content can be viewed and used by public. Otherwise, deny public access and indicate the users who are allowed to read the content.

To make your processes as safe as it can be in the cloud, make sure you’re aware of what cloud solutions and applications your company really needs, what data can be stored and monitored there, so that you be sure that your data does not leave your company’s perimeter in excess.

Remember to make sure no corporate data stored in the cloud can be downloaded by a third party without authorisation

Proper privileged access management is essential when allowing access to SaaS applications. Segregation of Duties is an inevitable and helpful approach to secure information usage in SaaS applications. It is important not to mess up configurations.

The chosen cloud deployment models and the way of their usage should meet regulatory requirements, standards and frameworks.

Pay attention whom you grant the access to, and do not send a link until you are sure that the content can be viewed and used by public

SaaS applications are to be available only to assigned users and authorised devices. Services rendered via the Internet are developed on the basis of a number of infrastructures and platforms, the construction within them is heterogenous – and so their providers are, who are responsible for their own part of work there, who manage occurring issues within their purview. This makes SaaS information security half the provider’s responsibility and half the user’s.


Vendor encryption offered to customers is not enough and taking your own measures will let your business depend on your regulations.

Don't Miss

Green Circle Signed Strategic Cooperation Agreement with SearchInform at GITEX Global 2024

Green Circle has started providing managed security services powered by SearchInform to
Sergey Ozhegov, CEO at SearchInform

SearchInform on technology that will help businesses operate during lockdown

Sergey Ozhegov, CEO at SearchInform, a risk management solution provider represented in