Sign in to view more content

Create your free account or sign in to continue your search

Welcome back

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

New to LinkedIn? Join now

or

New to LinkedIn? Join now

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Articles
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Jan 7, 2025
  1. All
  2. Engineering
  3. Cloud Computing

You're onboarding new cloud service providers. How do you ensure security concerns are addressed effectively?

Onboarding new cloud services requires a keen focus on security to safeguard your business. To ensure your security concerns are addressed effectively:

- Conduct thorough due diligence. Assess the provider's security policies, compliance certifications, and reputation.

- Establish clear security protocols. Define who has access to what data and under which conditions.

- Regularly review and audit. Set up ongoing monitoring and periodic audits to ensure policies are followed and effective.

What strategies have you found useful in maintaining security when onboarding new providers?

Cloud Computing Cloud Computing

Cloud Computing

+ Follow
Last updated on Jan 7, 2025
  1. All
  2. Engineering
  3. Cloud Computing

You're onboarding new cloud service providers. How do you ensure security concerns are addressed effectively?

Onboarding new cloud services requires a keen focus on security to safeguard your business. To ensure your security concerns are addressed effectively:

- Conduct thorough due diligence. Assess the provider's security policies, compliance certifications, and reputation.

- Establish clear security protocols. Define who has access to what data and under which conditions.

- Regularly review and audit. Set up ongoing monitoring and periodic audits to ensure policies are followed and effective.

What strategies have you found useful in maintaining security when onboarding new providers?

Add your perspective
Help others by sharing more (125 characters min.)
10 answers
  • Contributor profile photo
    Contributor profile photo
    Franck Ngami

    ☁️ Product Owner for Cloud Solutions @ Bosch

    • Report contribution

    Onboarding new cloud providers requires a structured approach to mitigate security risks. Gartner predicts 99% of cloud security failures by 2025 will stem from customer misconfigurations, highlighting the need for proactive measures. Key actions include ensuring compliance with standards like ISO 27001 and GDPR, robust encryption (AES-256, TLS 1.2+), and Identity and Access Management (e.g., Azure Active Directory), which cuts unauthorized access by 50%. Regular testing and monitoring with tools like Microsoft Defender reduce breach detection time from 280 to under 30 days. Clear responsibility models and adherence to data residency laws further enhance security. These measures ensure secure, cost-effective cloud adoption.

    Like
    4
  • Contributor profile photo
    Contributor profile photo
    Mahmoud Rabie

    ☁️ Multi-Cloud/🦾 AI/🛡️ Security Solutions Architect and Consultant | M.Sc in Computer Engineering | 🥇𝙁𝙞𝙧𝙨𝙩 𝙋𝙡𝙖𝙘𝙚🥇 at Next GenAI Hackathon | GCP | OCI | Azure | ♠️ Oracle ACE Pro | AWS Community Builder

    • Report contribution

    "Trust but verify" is my guiding principle when onboarding new cloud services. Here’s how I ensure security stays paramount: 🔍 Thorough Vetting: I dive deep into the provider’s certifications (like ISO 27001) and track record for handling data breaches or compliance violations. 🔒 Granular Access Control: I implement role-based access protocols to ensure only the right people can access sensitive information. 📈 Ongoing Vigilance: Continuous monitoring and scheduled audits help me verify that the provider maintains promised security standards. #cloudcomputing #cloud #datasecurity #cybersecurity #favikon

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Ricardo Chang

    Strategic Business Manager│Business Development │Sales & Commercial │ B2B & B2C │ Disruptive Innovator

    • Report contribution

    Para garantizar que los problemas de seguridad se aborden de manera efectiva al incorporar nuevos proveedores de servicios en la nube, puedes aplicar estrategias clave como: ✅ Evaluación de riesgos → Analizar vulnerabilidades y establecer medidas preventivas. ✅ Cumplimiento de estándares → Verificar certificaciones como ISO 27001 y SOC 2. ✅ Modelo de responsabilidad compartida → Definir claramente qué aspectos de seguridad corresponden al proveedor y cuáles a tu organización. ✅ Monitoreo continuo → Implementar herramientas de detección de amenazas y auditorías periódicas.

    Translated
    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Akil Saji

    Entrepreneur | Playing around with AI models | AWS Cloud

    • Report contribution

    Bringing in a new cloud service provider can be an exciting but at the same time if not properly done can turn into your worst nightmare. I am gonna try to keep it simple, before onboarding, keep these things in mind, and rest will be alright: Strong vendor risk assessment, before you hand over your data, do your homework, like before hiring someone for a job. Ask for their security certifications like SOC 2, ISO 27001 etc. SLAs that hold them accountable, ensure that security standards, uptime commitment, breach response times are clearly defined in the contract. Data encryption, make sure your cloud provider offer best encryption in the market. For more browse the web, because Linkedin has a character constraint while contributing.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Guilherme Vidal

    System Administrator | VMware Certified Professional | AWS Certified Cloud | LPI Linux | AZ-900 | SC-900 | MS-900 | ITIL v4 | Google IT Support |

    • Report contribution

    Ao integrar novos provedores de nuvem, eu sempre começo com uma análise detalhada de riscos e certifico-me de que as políticas de segurança estejam alinhadas com os requisitos do negócio. Monitoramento contínuo e controles como criptografia e acesso baseado em identidade ajudam a garantir que a segurança esteja sempre em primeiro lugar.

    Translated
    Like
    1
View more answers
Cloud Computing Cloud Computing

Cloud Computing

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Cloud Computing

No more previous content
  • How can you effectively communicate the benefits of scalability to non-technical stakeholders?

    58 contributions

  • You're facing resistance from stakeholders on cloud scalability. How can you convince them of its importance?

    35 contributions

  • Your cloud usage is skyrocketing overnight. Are you prepared to handle the sudden growth?

    35 contributions

  • You're struggling to cut cloud costs while maintaining performance. What strategies can help you succeed?

    42 contributions

  • Your manager is skeptical about cloud migration benefits. How do you change their mind?

    39 contributions

  • You're upgrading your cloud services. How do you secure the best pricing through vendor negotiations?

  • You're enhancing performance in your cloud-based app. How can you safeguard data security during the process?

  • You're managing multiple cloud platforms with rising security threats. How do you stay ahead?

    72 contributions

No more next content
See all

Explore Other Skills

  • Programming
  • Web Development
  • Agile Methodologies
  • Machine Learning
  • Software Development
  • Computer Science
  • Data Engineering
  • Data Analytics
  • Data Science
  • Artificial Intelligence (AI)

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Your California Privacy Choices
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
1
10 Contributions