TECHNOLOGY

The Cloud As A Tool To Improve The Security And Reliability Of Information Systems

The cloud allows you to achieve positive results, mainly to increase security by applying measures. In addition, by using cloud technologies, the client receives the following advantages:

  • there is no need to build an expensive, difficult-to-maintain, and unevenly used computing infrastructure;
  • there is no need to ensure the conditions for the functioning of the computing infrastructure (power supply, climate control, firefighting, etc.);
  • ease of mobility and access from different user devices;
  • Reduction of Total Cost of Ownership (TCO);
  • no need to hire expensive specialists;
  • speed and ease of deployment of additional computing power without additional interaction with the provider;
  • The ability to easily and quickly reduce the cost of computing infrastructure while reducing performance requirements;
  • Ease of recovery in case of accidents and other dangerous and unforeseen events.

What To Look For When Choosing A Provider Offering Services “According To FZ-152.”

Choosing a provider takes work since it must be a proven, reliable and responsible company. A potential performer (let’s call it that) should honestly answer the question of what the maximum level of security he provides in the cloud, indicating the type of actual threats neutralized. And it is better to see the above – ask the supplier to confirm compliance with the declared level of protection.

For example, request a document confirming an external audit by an independent contractor. Ideally, this could be a certificate, although cloud attestation is quite tricky.

In addition, the provider should have a threat model for the protected segment of the cloud and, if necessary, familiarize the client with it, including a description of measures and ways to neutralize current threats. The contract with the provider must consider the points provided for in part 3 of Article 6 of the Law “On Personal Data,” including information about the type of current threats and levels of protection.

Beware – “Beacon Words”!

When searching for a cloud provider, consider “beacon words.” If there are terms on the company’s web page: PD security class, typical, special ISPDN, license to work with personal data, certification and certification of the cloud for compliance with the requirements of the FSB – you should be wary since such words are no longer used in the modern lexicon.

In addition, there is no attestation according to the requirements of the FSB, and it has yet to be.

Additionally, it is worth paying attention to how backup and recovery are provided in terms of disaster tolerance and territorial distribution. The provider must be prepared to provide a certified crypto gateway[6] as an additional or essential service in the work organization.

As a result of the established relationship with the provider, the client receives a contract in which the level of protection is prescribed and security measures are defined. This suggests that the operator’s obligations for the technical protection of PD have been fulfilled, which is enough to confirm the requirements of the legislation.

It is essential to understand that it is optional to conclude a contract with the provider immediately. Any adequate provider is always ready to offer the opportunity to test the cloud IaaS service to understand whether the service offered is suitable for solving the client’s problems.

Pure Tech info

Pure Tech Info is a Unique Platform that regularly keeps you updated about the latest technology trends, business awareness, product reviews. Also, information related to the latest Gadgets, App's, Cyber Security updates, latest Digital marketing tips, Marketing Ideas, Tech news, and many more categories. It's a website that provides the best and pure technical content to the readers.

Recent Posts

Exploring GU iCloud: A Fresh Perspective on Cloud Storage

Due to the abundance of options available in the field of cloud storage, it may…

7 days ago

Exploring YouTube Alternatives: My Personal Journey

Lately, I have been searching for YouTube alternatives. Even though I enjoy YouTube for its…

5 months ago

A Comprehensive Review Of BizGurukul

Internet marketing and entrepreneurship are dynamic fields, but BizGurukul assists fresh and experienced marketing personnel.…

6 months ago

The Game-Changing Homework Game: Homeworkify.net’s Intelligent Math And Solution

Introduction To Homeworkify.net In the ever-evolving realm of educational technology, Homeworkify.net has set new benchmarks…

7 months ago

Techfelts: A Comprehensive Overview Of The Photo Recovery Tool

In the fast-paced life of technology, people are looking for apps that satisfy all their…

7 months ago

Exploring Zyn Rewards: The Future Of Loyalty Programs

ZYN, a leader in tar-free and nicotine pouches, started the trend with its breakthrough reward…

8 months ago