Seite 70 - Cloud Services and Big Data

Implementation of Cloud Services in a Business Environment
61
Each possible physical threat should be considered and monitored
Training of the employees is required to enable them to respond to threat
situations in a timely manner
Automated or manual backup systems to help contain physical damages (f.i.
pumps)
Secure access to the hosting facility
Schulz (2011, pp. 79-80) extends this system and adds additional items to this
system including:
Physical card and proof of identity (f.i. biometric access to the facility)
Security cameras
Asset tracking including portable devices and personal or third-party devices
Regulations about photo or camera usage inside and outside of the facility
Abandonment of large sign advertising
7.4.1
Logical Security
Logical security can be regarded as an addition to physical security. A strong focus
is laid here on applications and data access (Vormwald, 2013). Logical security also
includes authorization, authentication, and digital rights management, as well as
data encryption and multi-tenancy (Chapter 6.4.4 – Multi-Tenant Model).
Furthermore several areas of logical security regarding cloud computing can be
highlighted (Schulz, 2011, p. 80) & (Vormwald, 2013):
Regular changes of passwords
Authentication of user credentials and authorization of assigned individual
access rights
Secure servers, file systems, network devices and monitor tools
Encryption of data