User access control
1. Secure data transfer – Always make sure you data is encrypted this is very important. Always make sure your data is traveling over a secure encrypted and authenticated channel. Always make sure to use FTP, SSH or SSL when transferring files. 2. Secure software interfaces – Know how any cloud provider you’re considering integrates security throughout its service, from authentication and access control techniques to activity monitoring policies. Know how or if they notify you in the case of a compromised server. Make sure to read the terms of service. 3. Secure stored data – Your data should be securely encrypted when it’s on the provider’s servers and while it’s in use by the cloud service. Make sure you know there Data disposal procedures before you put your faith in there services. Where is the server your data is located on stored? Where are the backups stored? How do they get rid of the old backup media? Make sure the cloud provider assure protection for data. 4. User access control – Who has access to there data centers and servers? Make sure all your security permissions are setup properly before uploading sensitive data. Remember you have no control over the cloud providers employees touching your server or seeing your data. You will also have no way of monitoring if they do. 5. Data separation – Attacks have surfaced in recent years that target the shared technology inside Cloud Computing environments. Every cloud-based service shares resources, namely space on the provider’s servers and other parts of the provider’s infrastructure. Remember servers have many virtual containers on the same server and accidents can happen.