Wrapping up our security peril series, we’ve identified infrastructure set-up / decisions as our fifth peril of forcing applications onto the cloud that weren’t specifically designed for it.
Internally, the application had secure access to authentication databases and content databases, such as product data management systems and ERP systems. As these systems typically contain confidential content, careful decisions have to be made about these data—which parts should be moved to the cloud and in what form, or can the whole database live on the cloud without risk? Often times, new and securely implemented login/access procedures are needed.
Follow the discussion on Twitter @hyperguard.