• Latest
  • Trending
#HowTo: Quickly Evaluate a SaaS Vendor’s Cloud Security

#HowTo: Quickly Evaluate a SaaS Vendor’s Cloud Security

February 28, 2022
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
Fibre optic interconnection linking Cameroon and Congo now operational

Fibre optic interconnection linking Cameroon and Congo now operational

July 15, 2022
Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

July 15, 2022
Airtel Africa Purchases $42M Worth of Additional Spectrum

Airtel Africa Purchases $42M Worth of Additional Spectrum

July 15, 2022
Huawei steps up drive for Kenyan talent

Huawei steps up drive for Kenyan talent

July 15, 2022
TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

July 15, 2022
Facebook to allow up to five profiles tied to one account

Facebook to allow up to five profiles tied to one account

July 15, 2022
Top 10 apps built and managed in Ghana

Top 10 apps built and managed in Ghana

July 15, 2022
MTN Group to Host the 2nd Edition of the MoMo API Hackathon

MTN Group to Host the 2nd Edition of the MoMo API Hackathon

July 15, 2022
KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

July 15, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Sunday, 5 February, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

#HowTo: Quickly Evaluate a SaaS Vendor’s Cloud Security

by ITECHNEWS
February 28, 2022
in Leading Stories, Opinion
0 0
0
#HowTo: Quickly Evaluate a SaaS Vendor’s Cloud Security

Life in the cloud means trusting other people with your data. Everyone says they are trustworthy and you have nothing to worry about, but there’s been an average of 33 data breaches a week in the US in 2021 (through Q3, per the ITRC). So, folks aren’t doing as well as they claim.

How then can you decide which vendors are trustworthy and those just telling you what you want to hear? Big companies can make their vendors jump through hoops and fill out questionnaires, but for the rest of us, we need a faster and more accessible method.

YOU MAY ALSO LIKE

Inaugural AfCFTA Conference on Women and Youth in Trade

Instagram fined €405m over children’s data privacy

Step 1) Find the Security Page

Find the page on your vendor’s website where they talk about how they secure your data. I often use google to accelerate the process with searches like: “site:example.com security” and “site:example.com trust center” and “site:example.com privacy.”

If you still can’t find anything about how they keep your data safe, you have to assume their security is sub-par. Or else they don’t think their customers care about such things. Either way, they get an “F” and it’s time to move on.

Step 2) Wade Through the Jargon

Companies say things like, “we’re the most trusted provider of blah” and “we take your security seriously” as a way to make you feel good without actually meaning anything. The goal is to find the nuggets that carry meaning and use them to assess the relative security of the company.

Basic security measures sometimes get dressed up in a lot of flowery language. No one should brag about brushing their teeth every day. Likewise, no one gets extra credit for doing the bare minimums for security.

For example, when companies talk about using “military-grade encryption” or “state-of-the-art encryption for all data,” or when they say “all plans include SSL encryption to keep your data safe,” they’ve just told you they use HTTPS on their website, which is table stakes.

Step 3) Filter the Fluff

Another one you might hear is that they encrypt your data “in transit and at rest.” That means that in addition to HTTPS, they also use transparent disk encryption. This is important, but it doesn’t really protect your data from hackers unless they are stealing hard drives out of servers. On a running machine, the data might as well not be encrypted at all.

Another example that sometimes gets hyped, but is table stakes, is data center security. When security pages tout ”armed guards,” ”video surveillance” and other measures, they’re really digging for something to talk about. All of the major cloud providers and most data center providers do this. It would be surprising and exceptional if they didn’t. No gold star.

Step 4) Score the Remaining Security Information

While the above are markers of basic, table stakes security, these items are markers of at least moderate security:

  1. Certifications and process audits, such as the SOC2 certification. It doesn’t mean they have good data protection practices, but it does mean that they are being more rigorous about their security in general and doing things like external penetration tests to test their security. Companies that are SOC2 Type 2 certified probably have at least reasonable security. Note: beware of PCI compliance claims as they only pertain to your credit card information and don’t pertain to any other data.
  2. Advanced authentication features like single sign-on, multi-factor authentication and notifications upon logins from new devices.
  3. A bug bounty or responsible disclosure program with rewards for white-hat hackers who find and report security issues.

But moderate security is grading on a curve that rewards the average. If you’re looking for vendors who strive to do better, then you should look for companies who do the above but who also offer advanced security options like:

  1. Data transparency: audit trails showing changes to and access of data, by whom and from where, including if your vendor’s employees access the data for any reason.
  2. Application-layer encryption: data is encrypted before it goes to the data store and it’s done with per-customer keys. Hallmarks of this include companies offering bring your own key, customer managed keys, customer held key offerings or end-to-end encryption options.

If you’d like to be a little more scientific in your scoring, there’s a freely available Google spreadsheet checklist that will help you map security page claims into overall maturity scores.

In most cases, it takes less than ten minutes to score a company’s security based on their public information. The more buyers use security maturity as a factor in a purchase decision, the more vendors will improve their own security. In the end, only the market can drive better security into our ecosystem.

Source: Patrick Walsh CEO, IronCore Labs
Tags: SaaS Vendor’s Cloud Security
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022

Recent News

  • Inaugural AfCFTA Conference on Women and Youth in Trade September 6, 2022
  • Instagram fined €405m over children’s data privacy September 6, 2022
  • 5.7bn data entries found exposed on Chinese VPN August 18, 2022
  • Fibre optic interconnection linking Cameroon and Congo now operational July 15, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version