Cloud Security Methods

Category: Cloud   |   Presented By: Sify Technologies

Human factor
The trust of the customer starts at the people who handles day in day out SIFY’s cloud
infrastructure. The internal team who connects with cloud starting from business team, physical
datacenter access team, logical network and system access team and incident response team.
SIFY has structured recruitment policy guided by ISO standards. Its screening policy validates the
following aspects – which is applicable for regular full-time and contract employees
 Availability of satisfactory character references.
 A check (for completeness and accuracy) of the applicant's profile.
 Confirmation of claimed academic and professional qualifications.
Every employee in the organization is agreed to follow the standard Code of Conduct defined by
SIFY – which enforces to maintain CIA at the highest level for SIFY’s assets, technology and their
customers. All the employees in the organization agreed to standard INFOSEC policy. Disciplinary
measures may be taken against any person found breaking the Acceptable Use policy.
Information Security Awareness training is the mandatory for everyone in SIFY – which gears
everyone, is responsible for securing SIFY and its customer’s systems and data.
Operations team who handles SIFY’s cloud infrastructure including Network, Systems and Storage
follows strong Authentication mechanisms
Controlled systems – Only controlled user subnet is allowed access to Cloud management
Network. The machines in this user subnet are authenticated by 802.1x and default denied from
Internet access and the Management network access is logged.
Approved access – Employees accessing cloud management network is always having valid
reason, which is tracked by CRM and other provisioning systems.
AAA – SIFY’s Network and system access are controlled by centralized AAA system; which
enforces SIFY’s Password and Account management policy. In a nutshell this policy briefs about
password strength, expiration details and unique userid, userid expiration, lockout and removal
details.
NOC and SOC – Dedicated team who monitors the overall health of Cloud 24 x 7 x 365
Shared Responsibility – Though SIFY provides physical infrastructure for customer’s system and
data, the responsibility of managing those instances are primarily lies with customer. In case of fully
managed service, SIFY can ensure, those operating environment and applications are having
adequate patches, anti-virus tools, encryption at file-system and host firewalls, IDS – if any.
In an un-managed environment, end customer is advised to have necessary host based security
measures to safe guard their valuable information at rest and transmission

tags Cloud