Our Blog

where we write about the things we love



Security in the cloud

Digital transformation is changing the way business is done. Employees expect to access and connect from anywhere at any time to be productive. This raises a common concern around device and data security.

Cloud Readiness: security in the cloud

How do we enable productivity without compromising security? Simple: you decide the rules on how your corporate data can be accessed, from where it can be accessed and what device it can be accessed from.

Microsoft has infused security throughout all of its cloud services and also gives you control of how much access you want to enable.

Security isn’t a one size fit all approach. It relies on a  shared responsibility model, where Microsoft ensures the security of data stored in its datacentres, based on your access control and security policies.

Let's look at some of the key considerations to help determine the security you and your company may require.

Protect your people using Identity driven security

In the cloud, data isn’t in your company’s boundary and can be accessed from anywhere as long as the user has the right identity (credentials) to access it. Protecting identity is critical.

Microsoft ensures the security for its identity service, but you need to have the following in mind when planning your security policies and securing your user’s identities:

  • From what location and IP address is the user accessing the data?
  • What level of Multi-Factor Authentication (MFA) should be applied when the user is outside the office boundaries?
  • Is the user’s device healthy (patched, antivirus) and managed by the company’s IT team before it accesses the company data or application?
  • What reporting is available to monitor who is trying to access resources, from where and how often?

Protect your data anywhere

Accidental data sharing is a common mistake. How do we ensure that all of the important data is secured whether it is in the cloud or on a user device - or even a USB stick?

The following should be considered when planning data protection policies:

  • What data is being accessed and what is its classification? Is it allowed off premises?
  • How do I protect corporate data on mobile devices?
  • How do I protect the data I am sharing externally with my customers? Can we set it to expire after a certain period?
  • How do I protect sensitive data on-premises and in the cloud?

Detect and remediate attacks

Cyberattacks and security breaches are a common problem in today's world. How do you know whether you are secured and not breached yet?

Security experts believe in an Assume Breach strategy and recommend to have tools to detect and remediate any suspicious and malicious activities within your network.

The following considerations are important to ensure that you are always protected against any attacks:

  • How do I detect the compromised credentials of my users?
  • How do I detect attackers moving laterally in my environment and connecting externally?
  • How can I remediate in real-time and automatically?

The key takeaway is that an existing security posture must change to accommodate the mobility of your users and your data.

Microsoft 365 licensing can help you meet all of these security considerations, and Intergen has a team of specialist who can work with your IT team to help you achieve the security you and your company requires.

Need help? Talk to us 

What’s stopping you taking the first step on the ladder to find out how it looks up there? You don’t need to climb the entire ladder to get a different view. Taking the first step in the cloud is the investment for your future. To find out more, talk to us.

This is part of the Cloud Readiness series, discussing how cloud computing is transforming the way that organisations deliver business solutions to their workforce

Posted by: Deepak Maheshwari, Principal Consultant | 03 September 2018

Tags: Cloud, Security, Cloud Readiness, Identity

Blog archive

Stay up to date with all insights from the Intergen blog