{"id":43227,"date":"2024-02-20T07:00:40","date_gmt":"2024-02-20T15:00:40","guid":{"rendered":"https:\/\/dhblog.dream.press\/blog\/?p=43227"},"modified":"2025-05-21T20:59:47","modified_gmt":"2025-05-22T03:59:47","slug":"cloud-security-tips","status":"publish","type":"post","link":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/","title":{"rendered":"12 Tips For Keeping Your Files And Data Secure In The Cloud"},"content":{"rendered":"\n<p>The term \u201ccloud computing\u201d gets thrown around a lot these days. But what does it really mean? Behind the buzzword lies real technologies, like <a href=\"https:\/\/www.dreamhost.com\/glossary\/hosting\/cloud-hosting\/\" target=\"_blank\" rel=\"noopener\">infrastructure-as-a-service (IaaS)<\/a>, that provide scalable on-demand computing, storage, and networking.<\/p>\n\n\n\n<p>However, migrating to the cloud is like moving your organization into an infinitely scalable yet invisible office tower. <a href=\"https:\/\/www.continuitycentral.com\/index.php\/news\/technology\/8663-39-percent-of-businesses-experienced-a-data-breach-in-their-cloud-environment-last-year#:~:text=This%20year&amp;apos;s%20study%20found%20that,55%20percent)%20of%20those%20surveyed.\" target=\"_blank\" rel=\"noopener\">75% of the businesses<\/a> state that over 40% of their data stored in the cloud is sensitive. Neglecting security here leaves a lot of company information vulnerable to threats, like unauthorized access, exploits, and non-compliance.<\/p>\n\n\n\n<p>The good news is that while \u201cthe cloud\u201d seems ephemeral, with the right foundations and best practices, you can effectively secure IaaS environments.<\/p>\n\n\n\n<p>In this guide, we&#8217;ll share 12 essential tips to lock down security on your unmanaged cloud servers, VMs, containers, storage, and services, benefiting from the fast growth that <a href=\"https:\/\/www.dreamhost.com\/blog\/cloud-development-environment\/\" target=\"_blank\" rel=\"noopener\">cloud environments<\/a> offer. Let\u2019s get started.<\/p>\n\n\n\n<h2 id=\"number-1\" class=\"wp-block-heading\">1. Disallow Root Password Logins<\/h2>\n\n\n\n<p>One of the most common methods that attackers use to gain unauthorized access to servers is by brute forcing <a href=\"https:\/\/www.dreamhost.com\/blog\/how-to-create-strong-passwords\/\" target=\"_blank\" rel=\"noopener\">weak passwords<\/a> for highly privileged accounts like root or administrator.<\/p>\n\n\n\n<p>To understand why, imagine yourself as a malicious hacker. If your goal is to get into a system and gain access to sensitive data, you would likely start by attempting to <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/brute-force-attack\" target=\"_blank\" rel=\"noopener\">brute-force the root password<\/a> (repeatedly trying different passwords until the correct one is found). If the attempt is successful, you gain access to the root account, which has the highest level of system permissions available, allowing complete control over the server.<\/p>\n\n\n\n<p>The thing with brute force attacks is this: weak passwords can be cracked easily with the right tools\u2014 and even strong passwords can be cracked by a patient, determined hacker.<\/p>\n\n\n\n<p><b>What if you completely disable password-based root login and instead rely on SSH key-based authentication as an alternative?<\/b><\/p>\n\n\n\n\n\n<div class=\"glossary-term\">\n\t<a\n\t\tclass=\"glossary-term__above-title\"\n\t\thref=\"\"\n\t\ttarget=\"_blank\"\n\t\trel=\"noopener noreferrer\"\n\t>\n\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 640 512\"><path d=\"M320 32c-8.1 0-16.1 1.4-23.7 4.1L15.8 137.4C6.3 140.9 0 149.9 0 160s6.3 19.1 15.8 22.6l57.9 20.9C57.3 229.3 48 259.8 48 291.9v28.1c0 28.4-10.8 57.7-22.3 80.8c-6.5 13-13.9 25.8-22.5 37.6C0 442.7-.9 448.3 .9 453.4s6 8.9 11.2 10.2l64 16c4.2 1.1 8.7 .3 12.4-2s6.3-6.1 7.1-10.4c8.6-42.8 4.3-81.2-2.1-108.7C90.3 344.3 86 329.8 80 316.5V291.9c0-30.2 10.2-58.7 27.9-81.5c12.9-15.5 29.6-28 49.2-35.7l157-61.7c8.2-3.2 17.5 .8 20.7 9s-.8 17.5-9 20.7l-157 61.7c-12.4 4.9-23.3 12.4-32.2 21.6l159.6 57.6c7.6 2.7 15.6 4.1 23.7 4.1s16.1-1.4 23.7-4.1L624.2 182.6c9.5-3.4 15.8-12.5 15.8-22.6s-6.3-19.1-15.8-22.6L343.7 36.1C336.1 33.4 328.1 32 320 32zM128 408c0 35.3 86 72 192 72s192-36.7 192-72L496.7 262.6 354.5 314c-11.1 4-22.8 6-34.5 6s-23.5-2-34.5-6L143.3 262.6 128 408z\"\/><\/svg>\n\t\t<span><\/span>\n\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 384 512\"><path d=\"M342.6 233.4c12.5 12.5 12.5 32.8 0 45.3l-192 192c-12.5 12.5-32.8 12.5-45.3 0s-12.5-32.8 0-45.3L274.7 256 105.4 86.6c-12.5-12.5-12.5-32.8 0-45.3s32.8-12.5 45.3 0l192 192z\"\/><\/svg>\n\t<\/a>\n    <h3>SSH<\/h3>\n    <p>Secure Shell Protocol (SSH) is a cryptographic network protocol for running services securely through an unsecured network.<\/p>\n            <a\n            href=\"https:\/\/www.dreamhost.com\/glossary\/hosting\/ssh\/\"\n                        class=\"btn btn--white-outline btn--sm btn--round\"\n                                    target=\"_blank\"\n            rel=\"noopener noreferrer\"\n            >\n                            Read More                    <\/a>\n\n<\/div>\n\n\n\n<p>This configuration can be found in the <b>\/etc\/ssh\/sshd_config <\/b>file on your Linux server.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1600\" height=\"920\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Pasword-Authentication.jpg\" alt=\"Screenshot of a PasswordAuthentication no script line on LInux\" class=\"wp-image-43231 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Pasword-Authentication.jpg.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Pasword-Authentication-300x173.jpg 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Pasword-Authentication-1024x589.jpg 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Pasword-Authentication-768x442.jpg 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Pasword-Authentication-1536x883.jpg 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Pasword-Authentication-600x345.jpg.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Pasword-Authentication-1200x690.jpg.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Pasword-Authentication-730x420.jpg.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Pasword-Authentication-1460x840.jpg.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Pasword-Authentication-784x451.jpg.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Pasword-Authentication-1568x902.jpg.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Pasword-Authentication-877x504.jpg.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/920;\" \/><\/figure>\n\n\n\n<p>This is an excellent step in the right direction. <a href=\"https:\/\/www.dreamhost.com\/blog\/learn-how-to-use-ssh\/\" target=\"_blank\" rel=\"noopener\">SSH keys<\/a> use asymmetric encryption, meaning a private and public key pair &#8211; rather than a password &#8211; is used to authenticate login attempts.<\/p>\n\n\n\n<p>You can go a step further and disable root login over SSH to prevent people from attempting brute-force on root. This can be done by changing the <b>PermitRootLogin<\/b> to no in the same file.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1600\" height=\"920\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Disallow-Root-Password-Logins.jpg\" alt=\"callout to the PermitRootLogin no line in the file \" class=\"wp-image-43232 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Disallow-Root-Password-Logins.jpg.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Disallow-Root-Password-Logins-300x173.jpg 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Disallow-Root-Password-Logins-1024x589.jpg 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Disallow-Root-Password-Logins-768x442.jpg 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Disallow-Root-Password-Logins-1536x883.jpg 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Disallow-Root-Password-Logins-600x345.jpg.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Disallow-Root-Password-Logins-1200x690.jpg.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Disallow-Root-Password-Logins-730x420.jpg.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Disallow-Root-Password-Logins-1460x840.jpg.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Disallow-Root-Password-Logins-784x451.jpg.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Disallow-Root-Password-Logins-1568x902.jpg.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Disallow-Root-Password-Logins-877x504.jpg.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/920;\" \/><\/figure>\n\n\n\n<p>The private key, as the name implies, is kept privately by the authorized user and stored on their computer. The corresponding public key is then stored on the server associated with that user&#8217;s account.<\/p>\n\n\n\n<p>During the login process, the keys use cryptographic methods to validate the authorized connection without revealing the actual private key. This method effectively protects against brute force attacks since the login cannot be compromised through mere password guessing.<\/p>\n\n\n\n<div class=\"article-newsletter article-newsletter--gradient\">\n\n\n<h2>Get Content Delivered Straight to Your Inbox<\/h2><p>Subscribe now to receive all the latest updates, delivered directly to your inbox.<\/p><form class=\"nwsl-form\" id=\"newsletter_block_\" novalidate><div class=\"messages\"><\/div><div class=\"form-group\"><label for=\"input_newsletter_block_\"><input type=\"email\"name=\"email\"id=\"input_newsletter_block_\"placeholder=\"Enter your email address\"novalidatedisabled=\"disabled\"\/><\/label><button type=\"submit\"class=\"btn btn--brand\"disabled=\"disabled\"><span>Sign Me Up!<\/span><svg width=\"21\" height=\"14\" viewBox=\"0 0 21 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M13.8523 0.42524L12.9323 1.34521C12.7095 1.56801 12.7132 1.9304 12.9404 2.14865L16.7241 5.7823H0.5625C0.251859 5.7823 0 6.03416 0 6.3448V7.6573C0 7.96794 0.251859 8.2198 0.5625 8.2198H16.7241L12.9405 11.8535C12.7132 12.0717 12.7095 12.4341 12.9323 12.6569L13.8523 13.5769C14.072 13.7965 14.4281 13.7965 14.6478 13.5769L20.8259 7.39879C21.0456 7.17913 21.0456 6.82298 20.8259 6.60327L14.6477 0.42524C14.4281 0.205584 14.0719 0.205584 13.8523 0.42524Z\" fill=\"white\"\/>\n<\/svg>\n<\/button><\/div><\/form><\/div>\n\n\n<h2 id=\"number-2\" class=\"wp-block-heading\">2. Enable Automatic Security Upgrades<\/h2>\n\n\n\n<p>All software contains vulnerabilities: some known and some yet undiscovered.<\/p>\n\n\n\n<p>Attackers are constantly probing programs for new bugs that allow them to gain access and control. When vulnerabilities are found and fixed by the software vendors, they publish security updates.<\/p>\n\n\n\n<p>If you\u2019re manually upgrading systems, hackers may use the opportunity where your systems are still vulnerable and gain access. But with auto upgrades, you can leave that stress behind.<\/p>\n\n\n\n<p><i>For example, if a vulnerability is discovered in a programming library used by your cloud database software (e.g., <\/i><a href=\"https:\/\/sqldocs.org\/sqlite\" target=\"_blank\" rel=\"noopener\"><i>SQLite<\/i><\/a><i>), hackers could soon learn of it and launch attacks. But if your database servers are set up to automatically install security updates as they are published, it will download and apply the patch to fix the issue before any compromise occurs.<\/i><\/p>\n\n\n\n<p>Also, the process of auto-upgrades can be customized to apply security patches on a set schedule only after they have been adequately tested. For mission-critical systems, you may choose to stage and test updates before broad deployment. Automation removes the burden of manual intervention while still keeping your cloud access secure.<\/p>\n\n\n\n<h2 id=\"number-3\" class=\"wp-block-heading\">3. Install And Configure Fail2ban<\/h2>\n\n\n\n<p>Brute force attacks come in many forms, targeting various network services. Beyond abusing logins like SSH, we also need to consider web applications, email servers, databases, and more, which may be vulnerable to password-guessing attempts.<\/p>\n\n\n\n<p>This is where intrusion protection tools like Fail2ban come in very handy.<\/p>\n\n\n\n<p>Fail2ban works by continuously monitoring log files generated by network services and parsing them for signs of repeat failed access attempts that are indicative of automated brute forcing. When failed attempts exceed a configurable threshold, Fail2ban will automatically update system firewall rules to block the source IP address responsible, preventing further abuse of that service.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1600\" height=\"910\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Install-and-Configure-Fail2ban.jpg\" alt=\"root@localhost:~# fail2ban client status reporting 6 total filed under filter and 3 currently banned, 3 total banned under actions \" class=\"wp-image-43233 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Install-and-Configure-Fail2ban.jpg.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Install-and-Configure-Fail2ban-300x171.jpg 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Install-and-Configure-Fail2ban-1024x582.jpg 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Install-and-Configure-Fail2ban-768x437.jpg 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Install-and-Configure-Fail2ban-1536x874.jpg 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Install-and-Configure-Fail2ban-600x341.jpg.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Install-and-Configure-Fail2ban-1200x683.jpg.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Install-and-Configure-Fail2ban-730x415.jpg.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Install-and-Configure-Fail2ban-1460x830.jpg.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Install-and-Configure-Fail2ban-784x446.jpg.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Install-and-Configure-Fail2ban-1568x892.jpg.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Install-and-Configure-Fail2ban-877x499.jpg.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/910;\" \/><\/figure>\n\n\n\n<p><i>To put this in perspective consider this:<\/i><\/p>\n\n\n\n<p><i>Alice configures Fail2ban on her web server to monitor authentication failure logs. If an IP makes five failed login attempts to the admin console in under two minutes, indicating a potential attack, Fail2ban will automatically block that IP from accessing the web application for 10 minutes. This protects the availability of the app for legitimate users while deterring malicious actors.<\/i><\/p>\n\n\n\n<p>The temporary IP bans can help slow down attackers actively trying to guess credentials or find exploits. Fail2ban is highly customizable as well \u2014 you can fine-tune the services monitored, thresholds before banning, duration of bans, logging parameters, and more. This flexibility allows it to be extensively leveraged to protect against brute-force risks across most cloud workloads.<\/p>\n\n\n\n<h2 id=\"number-4\" class=\"wp-block-heading\">4. Configure Cloud Security Groups As Firewalls<\/h2>\n\n\n\n<p>While tools like Fail2ban operate at the individual server level to protect against attacks, we must also consider safeguarding cloud resources at the network layer. Cloud platforms at <a href=\"https:\/\/www.dreamhost.com\/cloud\/computing\/\" target=\"_blank\" rel=\"noopener\">DreamHost are pre-configured to be secure<\/a>.<\/p>\n\n\n\n<p>Along with this, DreamHost provides you with a configurable virtual firewall so you can decide what traffic is accepted or rejected apart from the default settings.<\/p>\n\n\n\n<p><i>For example, web servers typically only need to accept inbound HTTP and HTTPS connections over ports 80 and 443. So, the security group assigned to these hosts would be configured to block all other protocols and port combinations via deny-by-default rules. Similarly, outbound traffic would be narrowed down to only what is absolutely essential for that function.<\/i><\/p>\n\n\n\n<p>Careful configuration of security groups acts as the first line of defense, allowing only authorized ingress and egress traffic to reach your cloud servers and services according to best practices of least privilege access.<\/p>\n\n\n\n<h2 id=\"number-5\" class=\"wp-block-heading\">5. Consider Implementing An Intrusion Detection System<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1600\" height=\"1002\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Intrusion-Detection-System.jpg\" alt=\"visual representation of a intrusion detection system represented by various network lines from internet to router to firewall to IDS to system that are blocked at a certain checkpoint\" class=\"wp-image-43234 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Intrusion-Detection-System.jpg.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Intrusion-Detection-System-300x188.jpg 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Intrusion-Detection-System-1024x641.jpg 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Intrusion-Detection-System-768x481.jpg 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Intrusion-Detection-System-1536x962.jpg 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Intrusion-Detection-System-600x376.jpg.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Intrusion-Detection-System-1200x752.jpg.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Intrusion-Detection-System-730x457.jpg.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Intrusion-Detection-System-1460x914.jpg.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Intrusion-Detection-System-784x491.jpg.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Intrusion-Detection-System-1568x982.jpg.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Intrusion-Detection-System-877x549.jpg.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/1002;\" \/><\/figure>\n\n\n\n<p>While we have discussed measures to proactively block unauthorized access attempts and prevent exploitation of known vulnerabilities, skilled attackers may still find ways to penetrate defenses through as-yet-unknown flaws.<\/p>\n\n\n\n<p>In these cases, detection as early as possible becomes critical.<\/p>\n\n\n\n<p>This is where an Intrusion Detection System (IDS) can provide immense value \u2014 continuously monitoring systems for suspicious activities indicative of a breach. IDS solutions come in two main forms:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Network IDS (NIDS)<\/b>: Analyzes network packets inspecting for malicious payloads like viruses or known attack patterns. Often used to detect <a href=\"https:\/\/www.dreamhost.com\/blog\/what-is-malware\/\" target=\"_blank\" rel=\"noopener\">malware<\/a> propagation and network-focused hacking attempts.<\/li>\n\n\n\n<li><b>Host IDS (HIDS)<\/b>: Monitors activities, configurations, and logs on an individual server. Checks for signs of tampering, unauthorized changes, or integrity violations.<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><i>\u201cTo prevent brute-force attacks, multi-factor authentication, secure session policies, rate limiting, automatic timeouts and a well-rounded intrusion detection system (IDS) should be implemented. Also include the use of secure and random session identifiers, storing session data in secure locations like HttpOnly and Secure cookies, and implementing mechanisms to detect and prevent unauthorized session access.\u201d<br><\/i><i>\u2014 <\/i><a href=\"https:\/\/www.linkedin.com\/advice\/0\/how-do-you-implement-strong-password?trk=cah1&amp;utm_source=share&amp;utm_campaign=copy_contribution_link&amp;utm_medium=member_desktop&amp;contributionUrn=urn%3Ali%3Acomment%3A%28articleSegment%3A%28urn%3Ali%3AlinkedInArticle%3A7039686535004258304%2C7039686537772494848%29%2C7041629832748695552%29&amp;articleSegmentUrn=urn%3Ali%3AarticleSegment%3A%28urn%3Ali%3AlinkedInArticle%3A7039686535004258304%2C7039686537772494848%29&amp;dashContributionUrn=urn%3Ali%3Afsd_comment%3A%287041629832748695552%2CarticleSegment%3A%28urn%3Ali%3AlinkedInArticle%3A7039686535004258304%2C7039686537772494848%29%29\" target=\"_blank\" rel=\"noopener\"><i>Jesse Befus, Managing Director, Enterprise Identity &amp; Access Management at ATB Financial<\/i><\/a><\/p>\n<\/blockquote>\n\n\n\n<p>A popular example used for Linux environments is Tripwire. It maintains an extensive baseline database of file attributes like permissions, hashes, metadata, registry entries, and more for the host. At periodic intervals, it compares the current state against this baseline to check for any unauthorized modifications that could indicate foul play.<\/p>\n\n\n\n<p>For example, an attacker exploits a vulnerability to get shell access on one of the web servers. He attempts to replace website files with a malicious version that steals customer payment data. As soon as this alteration is made, Tripwire detects the change during its next scheduled integrity check. It alerts the administrator about the unexpected webroot modification, allowing them to investigate the breach before major damage occurs.<\/p>\n\n\n\n<p>Without Tripwire, such an attack may have gone unnoticed allowing the attacker to stealthily collect customer records over an extended period. Intrusion rapidly detected is intrusion rapidly contained!<\/p>\n\n\n\n<p>As they say, &#8220;<b>prevention is ideal but detection is a must<\/b>,&#8221; and that&#8217;s where cloud IDS offerings deliver immense value to keep your data secure.<\/p>\n\n\n\n<h2 id=\"number-6\" class=\"wp-block-heading\">6. Leverage Data Encryption Extensively<\/h2>\n\n\n\n<p>Thus far we have discussed multiple layers of security controls with the goal of preventing unauthorized access to your cloud servers. However, a fundamental data security tenet is that prevention may fail, but encryption serves as a last line of defense.<\/p>\n\n\n\n<p>Even if all other safeguards are bypassed and cloud servers get successfully breached, encryption ensures stored data like <a href=\"https:\/\/sqldocs.org\/\" target=\"_blank\" rel=\"noopener\">SQLite databases<\/a>, archives, and file shares remain protected and unusable to attackers. This applies to data-in-transit as well which should be encrypted during flows across networks.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1600\" height=\"1015\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/How-Data-Encryption-Works.jpg\" alt=\"how data encryption words: sender + plaintext to encryption key to cipher text + receiver to decryption key back into plaintext\" class=\"wp-image-43235 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/How-Data-Encryption-Works.jpg.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/How-Data-Encryption-Works-300x190.jpg 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/How-Data-Encryption-Works-1024x650.jpg 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/How-Data-Encryption-Works-768x487.jpg 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/How-Data-Encryption-Works-1536x974.jpg 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/How-Data-Encryption-Works-600x381.jpg.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/How-Data-Encryption-Works-1200x761.jpg.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/How-Data-Encryption-Works-730x463.jpg.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/How-Data-Encryption-Works-1460x926.jpg.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/How-Data-Encryption-Works-784x497.jpg.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/How-Data-Encryption-Works-1568x995.jpg.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/How-Data-Encryption-Works-877x556.jpg.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/1015;\" \/><\/figure>\n\n\n\n<p><b>Encryption broadly falls into two categories:<\/b><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Asymmetric<\/b>: Uses a public\/private key pair where anything encrypted with the public key can only be accessed via the matched private key and vice versa. Generally used for secure connections.<\/li>\n\n\n\n<li><b>Symmetric<\/b>: A shared secret key is used to encrypt and decrypt data. Used for efficient bulk encryption of data at rest as the same key encrypts\/decrypts.<\/li>\n<\/ul>\n\n\n\n<p>If all other defenses fail, encrypted data foils the attacker&#8217;s goals. What good is breaching a cloud database server if all records are gibberish without the decryption key?<\/p>\n\n\n\n<h2 id=\"number-7\" class=\"wp-block-heading\">7. Schedule Regular Security Audits<\/h2>\n\n\n\n<p>We have now covered various preventative and detective controls to secure cloud infrastructure and data at rest. However, an overlaying practice that connects the dots across all of them is routine security audits.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.netwrix.com\/download\/collaterals\/2022%20Netwrix%20Vulnerability%20Assessment%20Analytics.pdf\" target=\"_blank\" rel=\"noopener\">76% of the surveyed companies<\/a> follow a regular security audit protocol to be proactive about security issues.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1600\" height=\"1186\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Main-Reasons-Organizations-Why-Purchase-Vulnerability-Assessment-Solutions.jpg\" alt=\"main reasons organizations purchase vulnerability assessment solutions bar graph, top answer by far is &quot;proactive security measures&quot; \" class=\"wp-image-43236 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Main-Reasons-Organizations-Why-Purchase-Vulnerability-Assessment-Solutions.jpg.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Main-Reasons-Organizations-Why-Purchase-Vulnerability-Assessment-Solutions-300x222.jpg 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Main-Reasons-Organizations-Why-Purchase-Vulnerability-Assessment-Solutions-1024x759.jpg 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Main-Reasons-Organizations-Why-Purchase-Vulnerability-Assessment-Solutions-768x569.jpg 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Main-Reasons-Organizations-Why-Purchase-Vulnerability-Assessment-Solutions-1536x1139.jpg 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Main-Reasons-Organizations-Why-Purchase-Vulnerability-Assessment-Solutions-600x445.jpg.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Main-Reasons-Organizations-Why-Purchase-Vulnerability-Assessment-Solutions-1200x890.jpg.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Main-Reasons-Organizations-Why-Purchase-Vulnerability-Assessment-Solutions-730x541.jpg.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Main-Reasons-Organizations-Why-Purchase-Vulnerability-Assessment-Solutions-1460x1082.jpg.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Main-Reasons-Organizations-Why-Purchase-Vulnerability-Assessment-Solutions-784x581.jpg.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Main-Reasons-Organizations-Why-Purchase-Vulnerability-Assessment-Solutions-1568x1162.jpg.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Main-Reasons-Organizations-Why-Purchase-Vulnerability-Assessment-Solutions-877x650.jpg.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/1186;\" \/><\/figure>\n\n\n\n<p><b>Audits serve several invaluable purposes:<\/b><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Validate that controls are properly implemented as intended.<\/li>\n\n\n\n<li>Identify if any deficiencies or gaps need improvement.<\/li>\n\n\n\n<li>Quantify and prioritize residual risk exposures.<\/li>\n\n\n\n<li>Uncover unknown vulnerabilities not visible otherwise.<\/li>\n\n\n\n<li>Provide an updated snapshot of current security posture.<\/li>\n<\/ul>\n\n\n\n<p>Basically, audits tell if your documented cloud practices accurately reflect reality.<\/p>\n\n\n\n<p>You can implement informal self-serve audits as part of daily administration or schedule exhaustive formal assessments annually depending on program maturity.<\/p>\n\n\n\n<p>Think of these routine cloud security audits as necessary &#8220;health exams&#8221; that find risk areas and validate successful practices so corrective actions can be taken before something goes wrong.<\/p>\n\n\n\n<h2 id=\"number-8\" class=\"wp-block-heading\">8. Implement Identity And Access Management<\/h2>\n\n\n\n<p>Now that we have discussed safeguards deployed directly within the cloud infrastructure itself, the next logical layer we progress to is managing administrative access.<\/p>\n\n\n\n<p>Without identity and access management (IAM) acting as cloud gatekeepers, attackers would simply target user credentials next to bypass infrastructure defenses through legitimate access channels.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1600\" height=\"1233\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/When-Should-You-Switch-To-VPS.jpg\" alt=\"identify management in the middle surrounded by various bubbles: PIM, role management, recertification, SoD, reporting, authentication, access management, workflows + approvals, password management, connectin of source and target systems, authorization\" class=\"wp-image-43237 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/When-Should-You-Switch-To-VPS.jpg.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/When-Should-You-Switch-To-VPS-300x231.jpg 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/When-Should-You-Switch-To-VPS-1024x789.jpg 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/When-Should-You-Switch-To-VPS-768x592.jpg 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/When-Should-You-Switch-To-VPS-1536x1184.jpg 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/When-Should-You-Switch-To-VPS-600x462.jpg.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/When-Should-You-Switch-To-VPS-1200x925.jpg.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/When-Should-You-Switch-To-VPS-730x563.jpg.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/When-Should-You-Switch-To-VPS-1460x1125.jpg.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/When-Should-You-Switch-To-VPS-784x604.jpg.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/When-Should-You-Switch-To-VPS-1568x1208.jpg.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/When-Should-You-Switch-To-VPS-877x676.jpg.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/1233;\" \/><\/figure>\n\n\n\n<p>That&#8217;s why a robust IAM program becomes the foundation for who can access cloud environments and data within prescribed permissions \u2014 granting only essential privileges.<\/p>\n\n\n\n<p>Some of the most important components of an IAM include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Central directory services<\/b>: Maintain user accounts and roles in a central directory like Active Directory with single-sign vs. locally on individual servers. Enforces access revocation, password policies, and consolidation.<\/li>\n\n\n\n<li><b>Principle of least privilege<\/b>: Users are matched to roles and groups that map to the smallest subset of systems and permissions needed for function vs. blanket access. Minimizes exposure blast radius if accounts are compromised.<\/li>\n\n\n\n<li><b>Strong authentication<\/b>: Passwords augmented with multi-factor authentication to access cloud admin consoles and infrastructure. Reduces brute force susceptibility by necessitating additional factors like tokens or biometrics when authenticating sessions.<\/li>\n\n\n\n<li><b>Entitlement management<\/b>: Access assignments and elevations tracked, providing visibility into permissions. Automated access reviews combined with routine entitlement reporting to prune unnecessary assignments over time.<\/li>\n\n\n\n<li><b>Audit logs<\/b>: Activity logging with tools like CloudTrail that records admin actions across the cloud estate. Critical for incident investigation, compliance, and exposure of risky insider actions.<\/li>\n\n\n\n<li><b>API\/tokens<\/b>: Code-based cloud access via API and tools rely on short-lived generated tokens. Adds protections compared to just user-based interactive logins.<\/li>\n<\/ul>\n\n\n\n<p>Robust IAM is critical to cloud system security because it dictates who can penetrate cloud environments regardless of infrastructure security defenses. Get IAM wrong and all your security measures may become vulnerable. But if you implement privilege access, backups, and encryption, the rest become exponentially more effective since IAM cuts off unauthorized entry at the roots.<\/p>\n\n\n\n<h2 id=\"number-9\" class=\"wp-block-heading\">9. Require Multi-factor Authentication (MFA)<\/h2>\n\n\n\n<p>Expanding further on access controls, one incredibly useful mechanism to incorporate is multi-factor authentication (MFA) enforcing multiple methods of verifying identity.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1600\" height=\"1038\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/What-Is-MFA_.jpg\" alt=\"what is MFA? user authenticates 2 or more factors like password and auth code or auth code and fingerprint or password and auth code and fingerprint\" class=\"wp-image-43238 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/What-Is-MFA_.jpg.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/What-Is-MFA_-300x195.jpg 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/What-Is-MFA_-1024x664.jpg 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/What-Is-MFA_-768x498.jpg 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/What-Is-MFA_-1536x996.jpg 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/What-Is-MFA_-600x389.jpg.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/What-Is-MFA_-1200x779.jpg.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/What-Is-MFA_-730x474.jpg.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/What-Is-MFA_-1460x947.jpg.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/What-Is-MFA_-784x509.jpg.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/What-Is-MFA_-1568x1017.jpg.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/What-Is-MFA_-877x569.jpg.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/1038;\" \/><\/figure>\n\n\n\n<p>Where single-factor authentication relies on just one credential, like passwords, MFA capitalizes on users having multiple validation methods in their possession by requiring any two or more to fully authenticate sessions. This minimizes impersonation risks substantially, even if one factor is compromised.<\/p>\n\n\n\n<p><b>Common examples include:<\/b><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Requiring a one-time verification code sent via SMS\/email along with username\/password entry.<\/li>\n\n\n\n<li>Using a hardware token or authenticator app to generate rotating codes.<\/li>\n\n\n\n<li>Leveraging biometrics like fingerprint scans or facial recognition on mobile.<\/li>\n\n\n\n<li>Answering security questions preset by the user.<\/li>\n<\/ul>\n\n\n\n<p>So even if a cloud console password is guessed correctly via brute force, without intercepting the user&#8217;s phone for SMS tokens, the session cannot progress. This is why DreamHost accounts can be <a href=\"https:\/\/help.dreamhost.com\/hc\/en-us\/articles\/216013897-Multifactor-Authentication-overview\" target=\"_blank\" rel=\"noopener\">secured with MFA<\/a>\u2014 This added barrier can deter automated attacks, leaving them looking for an easier target.<\/p>\n\n\n\n<h2 id=\"number-10\" class=\"wp-block-heading\">10. Secure Endpoints That Access The Cloud<\/h2>\n\n\n\n<p>Thus far our data protection techniques have centered on securing the cloud infrastructure itself as well as access channels into it. However, we need to consider threats that originate from compromised endpoints, which then connect to cloud environments.<\/p>\n\n\n\n<p>If laptops and workstations lack anti-virus protections for example, malware could pivot from them into otherwise well-hardened cloud servers. That is why endpoint security safeguards integrate tightly with cloud access policies as another critical layer of defense-in-depth.<\/p>\n\n\n\n<p><b>Common endpoint hardening techniques involve:<\/b><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Installing reputable anti-virus\/anti-malware tools.<\/li>\n\n\n\n<li>Deploying endpoint detection &amp; response (EDR) for additional monitoring.<\/li>\n\n\n\n<li>Enabling <a href=\"https:\/\/www.dreamhost.com\/glossary\/hosting\/firewall\/\" target=\"_blank\" rel=\"noopener\">host-based firewalls<\/a> and intrusion detection systems.<\/li>\n\n\n\n<li>Maintaining patching and security updates promptly.<\/li>\n\n\n\n<li>Tracking asset inventories with agent software.<\/li>\n\n\n\n<li>Prohibiting admin privileges on end user devices.<\/li>\n\n\n\n<li>Enforcing drive encryption via Bitlocker.<\/li>\n\n\n\n<li>Blocking unauthorized peripheral devices like USB storage.<\/li>\n\n\n\n<li>Securely configured web proxies and DNS filtering.<\/li>\n<\/ul>\n\n\n\n<h2 id=\"number-11\" class=\"wp-block-heading\">11. Prioritize Security Awareness And Training<\/h2>\n\n\n\n<p>After discussing the various technical and procedural safeguards to secure cloud data, we now touch upon what is often the biggest vulnerability: the human element.<\/p>\n\n\n\n<p>As much as we architect layered defenses like firewalls, IAM, encryption, and hardening to protect cloud infrastructure, none of those matter if users themselves engage in risky practices whether intentionally or accidentally.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1600\" height=\"677\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/tweet-Prioritize-Security-Awareness-and-Training.jpg\" alt=\"Twitter post from @Support &quot;We detected what we believe to be coordinated social engineering attack by people who successfully targeted some of our employees with access to internal systems and tools.&quot; \" class=\"wp-image-43239 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/tweet-Prioritize-Security-Awareness-and-Training.jpg.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/tweet-Prioritize-Security-Awareness-and-Training-300x127.jpg 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/tweet-Prioritize-Security-Awareness-and-Training-1024x433.jpg 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/tweet-Prioritize-Security-Awareness-and-Training-768x325.jpg 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/tweet-Prioritize-Security-Awareness-and-Training-1536x650.jpg 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/tweet-Prioritize-Security-Awareness-and-Training-600x254.jpg.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/tweet-Prioritize-Security-Awareness-and-Training-1200x508.jpg.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/tweet-Prioritize-Security-Awareness-and-Training-730x309.jpg.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/tweet-Prioritize-Security-Awareness-and-Training-1460x618.jpg.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/tweet-Prioritize-Security-Awareness-and-Training-784x332.jpg.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/tweet-Prioritize-Security-Awareness-and-Training-1568x663.jpg.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/tweet-Prioritize-Security-Awareness-and-Training-877x371.jpg.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/677;\" \/><\/figure>\n\n\n\n<p>Some common examples include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reusing passwords across personal and work accounts.<\/li>\n\n\n\n<li>Opening phishing emails and malicious attachments.<\/li>\n\n\n\n<li>Not vetting links before clicking them.<\/li>\n\n\n\n<li>Storing passwords in insecure files or notes.<\/li>\n\n\n\n<li>Discussing confidential data over insecure channels.<\/li>\n\n\n\n<li>Failing to logout of cloud service accounts after usage.<\/li>\n\n\n\n<li>Saving files containing sensitive data in public cloud storage buckets.<\/li>\n<\/ul>\n\n\n\n<p>The list goes on. No technical controls can fully compensate for lack of security awareness among teams operating cloud platforms day-to-day. That makes ongoing education the strongest shield by cultivating a self-reinforcing culture of security.<\/p>\n\n\n\n<p>Implement formal security awareness training programs should focus on:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Simulated phishing<\/b>: Trains staff to identify and avoid real world phishing lures targeting cloud credentials and data. Improves threat literacy.<\/li>\n\n\n\n<li><b>Secure practices<\/b>: Provides guidance on password hygiene, social engineering red flags, handling sensitive data, proper cloud usage and more. Sets usage Expectations.<\/li>\n\n\n\n<li><b>Cloud risks<\/b>: Highlights common cloud-specific vulnerabilities like misconfigurations, access creep and data leaks so staff better comprehend implications of their responsibilities.<\/li>\n\n\n\n<li><b>Compliance requirements:<\/b> Outlines policies for access management, third parties handling data and utilization regulations. Maintains compliance.<\/li>\n\n\n\n<li><b>Incident reporting<\/b>: Encourages confidential reporting of suspected violations or breaches spotted. Enhances visibility.<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><i>\u201cNo password, passkey, password manager, or two-factor authentication *alone* can protect you from social engineering. Social engineers target us as humans first and the technology we use second. We must understand that technical solutions alone are not going to provide perfect protection.\u201d<br><\/i>\u2014 <a href=\"https:\/\/www.linkedin.com\/advice\/3\/how-can-you-make-your-passwords-strong-enough?trk=cah1&amp;utm_source=share&amp;utm_campaign=copy_contribution_link&amp;utm_medium=member_desktop&amp;contributionUrn=urn%3Ali%3Acomment%3A%28articleSegment%3A%28urn%3Ali%3AlinkedInArticle%3A7099452656699482114%2C7099452658700148736%29%2C7152598156529004545%29&amp;articleSegmentUrn=urn%3Ali%3AarticleSegment%3A%28urn%3Ali%3AlinkedInArticle%3A7099452656699482114%2C7099452658700148736%29&amp;dashContributionUrn=urn%3Ali%3Afsd_comment%3A%287152598156529004545%2CarticleSegment%3A%28urn%3Ali%3AlinkedInArticle%3A7099452656699482114%2C7099452658700148736%29%29\" target=\"_blank\" rel=\"noopener\">Dr. Martin Kraemer, Security Awareness Advocate, KnowBe4<\/a><\/p>\n<\/blockquote>\n\n\n\n<p>Annual or bi-annual refresher training combined with continuous coaching nurtures a security-focused organizational culture where cloud users better appreciate safe data handling.<\/p>\n\n\n\n<h2 id=\"number-12\" class=\"wp-block-heading\">12. Monitor Service Provider Security Posture<\/h2>\n\n\n\n<p>Last but certainly not least, a dimension of cloud security that often gets overlooked is management of security provided by the cloud service provider itself.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><i>\u201cMonitoring is important as tools do not work 100% by itself. Have a third-party or a team to analyze alerts and respond to incidents. This is the best [way] to improve your security and safeguard your information assets.\u201d<br><\/i>\u2014 <a href=\"https:\/\/www.linkedin.com\/advice\/1\/how-do-you-build-secure-network-skills-security-awareness?trk=cah1&amp;utm_source=share&amp;utm_campaign=copy_contribution_link&amp;utm_medium=member_desktop&amp;contributionUrn=urn%3Ali%3Acomment%3A%28articleSegment%3A%28urn%3Ali%3AlinkedInArticle%3A7099813901529219072%2C7099813903366328320%29%2C7150133882116263937%29&amp;articleSegmentUrn=urn%3Ali%3AarticleSegment%3A%28urn%3Ali%3AlinkedInArticle%3A7099813901529219072%2C7099813903366328320%29&amp;dashContributionUrn=urn%3Ali%3Afsd_comment%3A%287150133882116263937%2CarticleSegment%3A%28urn%3Ali%3AlinkedInArticle%3A7099813901529219072%2C7099813903366328320%29%29\" target=\"_blank\" rel=\"noopener\">Felipe Mafra, CISO North America at Thales GTS<\/a><\/p>\n<\/blockquote>\n\n\n\n<p>While discussions around encryption, access management and the like focus on controls directly managed by us, the cloud provider also implements foundational protections for the data centers, networks and hardware infrastructure underpinning our computer environments.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1600\" height=\"790\" data-src=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Security-Services.jpg\" alt=\"security services available direct from our security team: malware remover, let's encrypt, HTTP\/2, free domain privacy\" class=\"wp-image-43240 lazyload\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Security-Services.jpg.webp 1600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Security-Services-300x148.jpg 300w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Security-Services-1024x506.jpg 1024w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Security-Services-768x379.jpg 768w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/Security-Services-1536x758.jpg 1536w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Security-Services-600x296.jpg.webp 600w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Security-Services-1200x593.jpg.webp 1200w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Security-Services-730x360.jpg.webp 730w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Security-Services-1460x721.jpg.webp 1460w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Security-Services-784x387.jpg.webp 784w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Security-Services-1568x774.jpg.webp 1568w, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/smush-webp\/2024\/02\/Security-Services-877x433.jpg.webp 877w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/790;\" \/><\/figure>\n\n\n\n<p><b>Examples of security measures implemented by providers include:<\/b><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Physical data center protections like fences, video surveillance and guards.<\/li>\n\n\n\n<li>Biometric authentication for data center access.<\/li>\n\n\n\n<li>Redundant power and backups to secure infrastructure.<\/li>\n\n\n\n<li>Hardened hypervisors separating customer instances.<\/li>\n\n\n\n<li>DDoS mitigation for networks.<\/li>\n\n\n\n<li>Regular third party audits.<\/li>\n<\/ul>\n\n\n\n<p>So while we govern security of the cloud workloads deployed, we must also periodically review security posture maintained by the service provider particularly relating to any shared responsibility areas.<\/p>\n\n\n\n<p><b>You can start by:<\/b><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reviewing provider audit certifications.<\/li>\n\n\n\n<li>Monitoring advisory notices for emerging threats impacting services.<\/li>\n\n\n\n<li>Examining provider employee screening and data handling policies.<\/li>\n<\/ul>\n\n\n\n<h2 id=\"summary\" class=\"wp-block-heading\">Move To The Cloud Fearlessly, With DreamHost<\/h2>\n\n\n\n<p>Your data is your business. It&#8217;s the work that you&#8217;ve spent years building. That&#8217;s why it&#8217;s so important to keep your data secure, especially when it&#8217;s stored in the cloud. The ideas we covered in this article are an excellent starting point for your cloud-based data security.<\/p>\n\n\n\n<p><i>But here&#8217;s the thing:<\/i> keeping your data secure isn&#8217;t just about following a list of rules. It&#8217;s about being vigilant, about being aware of the risks, and about taking steps to protect yourself.<\/p>\n\n\n\n<p>The truth is that data is as valuable as oil, and hackers want to steal as much as they can. And they&#8217;re only getting better at what they do. That\u2019s why you also need a service provider that helps implement security best practices while you do what you do best \u2014 grow your business.<\/p>\n\n\n\n<p><i>DreamHost focuses on <\/i><a href=\"https:\/\/www.dreamhost.com\/security\/\" target=\"_blank\" rel=\"noopener\"><i>security<\/i><\/a><i> and backups, so you can rest assured that your valuable work isn\u2019t in vain if a security incident does occur. If you\u2019re considering a cloud service provider for your project, <\/i><a href=\"https:\/\/www.dreamhost.com\/cloud\/computing\/\" target=\"_blank\" rel=\"noopener\"><i>try DreamHost today<\/i><\/a><i>.&nbsp;<\/i><\/p>\n\n\n\n\n\n<div\n\tclass=\"article-cta-shared article-cta-small\"\n>\n    <div class=\"tr-img-wrap-outer jsLoading\"><img decoding=\"async\" class=\"js-img-lazy \" src=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/themes\/blog2018\/assets\/img\/lazy-loading-transparent.webp\" data-srcset=\"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/themes\/blog2018\/assets\/img\/article-small-ad-cta-placeholder.webp 1x, https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/themes\/blog2018\/assets\/img\/article-small-ad-cta-placeholder-x2.webp 2x\"  alt=\"Ad background image\" \/><\/div>\n\n\n\n\n  <div class=\"content-btm\">\n    <h2\n      class=\"h2--md\"\n    >\n      Secure Cloud Storage Hosting\n    <\/h2>\n    <p\n      class=\"p--md\"\n    >\n      DreamObjects is an inexpensive object storage service great for hosting files, storing backups, and web app development.\n    <\/p>\n\n            <a\n            href=\"https:\/\/www.dreamhost.com\/cloud\/\"\n                        class=\"btn btn--white-outline btn--sm btn--round\"\n                                    target=\"_blank\"\n            rel=\"noopener noreferrer\"\n            >\n                            Try It Free for 30 Days                    <\/a>\n\n  <\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The term \u201ccloud computing\u201d gets thrown around a lot these days. But what does it really mean? Behind the buzzword lies real technologies, like infrastructure-as-a-service (IaaS), that provide scalable on-demand computing, storage, and networking. However, migrating to the cloud is like moving your organization into an infinitely scalable yet invisible office tower. 75% of the [&hellip;]<\/p>\n","protected":false},"author":1006,"featured_media":43228,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_metadesc":"Secure your cloud data with our 12 essential tips. Learn key strategies for robust cloud security and data protection.","toc_headlines":"[[\"number-1\",\"1. Disallow Root Password Logins\"],[\"number-2\",\"2. Enable Automatic Security Upgrades\"],[\"number-3\",\"3. Install And Configure Fail2ban\"],[\"number-4\",\"4. Configure Cloud Security Groups As Firewalls\"],[\"number-5\",\"5. Consider Implementing An Intrusion Detection System\"],[\"number-6\",\"6. Leverage Data Encryption Extensively\"],[\"number-7\",\"7. Schedule Regular Security Audits\"],[\"number-8\",\"8. Implement Identity And Access Management\"],[\"number-9\",\"9. Require Multi-factor Authentication (MFA)\"],[\"number-10\",\"10. Secure Endpoints That Access The Cloud\"],[\"number-11\",\"11. Prioritize Security Awareness And Training\"],[\"number-12\",\"12. Monitor Service Provider Security Posture\"],[\"summary\",\"Move To The Cloud Fearlessly, With DreamHost\"]]","hide_toc":false,"footnotes":""},"categories":[770],"tags":[],"class_list":["post-43227","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>12 Tips For Keeping Your Files And Data Secure In The Cloud - DreamHost<\/title>\n<meta name=\"description\" content=\"Secure your cloud data with our 12 essential tips. Learn key strategies for robust cloud security and data protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Maximizing Cloud Security: 12 Essential Tips\" \/>\n<meta property=\"og:description\" content=\"Explore 12 vital tips for cloud security. Master essential strategies to safeguard your cloud-stored data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/\" \/>\n<meta property=\"og:site_name\" content=\"DreamHost Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DreamHost\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-20T15:00:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-22T03:59:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/12-Tips-for-Keeping-Your-Files-and-Data-Secure-in-the-Cloud-OGIMAGE.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brian Andrus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Maximizing Cloud Security: 12 Essential Tips\" \/>\n<meta name=\"twitter:description\" content=\"Explore 12 vital tips for cloud security. Master essential strategies to safeguard your cloud-stored data.\" \/>\n<meta name=\"twitter:creator\" content=\"@dreamhost\" \/>\n<meta name=\"twitter:site\" content=\"@dreamhost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Andrus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"12 Tips For Keeping Your Files And Data Secure In The Cloud - DreamHost","description":"Secure your cloud data with our 12 essential tips. Learn key strategies for robust cloud security and data protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/","og_locale":"en_US","og_type":"article","og_title":"Maximizing Cloud Security: 12 Essential Tips","og_description":"Explore 12 vital tips for cloud security. Master essential strategies to safeguard your cloud-stored data.","og_url":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/","og_site_name":"DreamHost Blog","article_publisher":"https:\/\/www.facebook.com\/DreamHost\/","article_published_time":"2024-02-20T15:00:40+00:00","article_modified_time":"2025-05-22T03:59:47+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/12-Tips-for-Keeping-Your-Files-and-Data-Secure-in-the-Cloud-OGIMAGE.jpg","type":"image\/jpeg"}],"author":"Brian Andrus","twitter_card":"summary_large_image","twitter_title":"Maximizing Cloud Security: 12 Essential Tips","twitter_description":"Explore 12 vital tips for cloud security. Master essential strategies to safeguard your cloud-stored data.","twitter_creator":"@dreamhost","twitter_site":"@dreamhost","twitter_misc":{"Written by":"Brian Andrus","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/#article","isPartOf":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/"},"author":{"name":"Brian Andrus","@id":"https:\/\/www-dev.dreamhost.com\/blog\/#\/schema\/person\/a3f8817a11ac0b464bfbcb6c505cb82b"},"headline":"12 Tips For Keeping Your Files And Data Secure In The Cloud","datePublished":"2024-02-20T15:00:40+00:00","dateModified":"2025-05-22T03:59:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/"},"wordCount":3078,"publisher":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/#organization"},"image":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/#primaryimage"},"thumbnailUrl":"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/12-Tips-for-Keeping-Your-Files-and-Data-Secure-in-the-Cloud-HERO.jpg","articleSection":["Cloud"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/","url":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/","name":"12 Tips For Keeping Your Files And Data Secure In The Cloud - DreamHost","isPartOf":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/#primaryimage"},"image":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/#primaryimage"},"thumbnailUrl":"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/12-Tips-for-Keeping-Your-Files-and-Data-Secure-in-the-Cloud-HERO.jpg","datePublished":"2024-02-20T15:00:40+00:00","dateModified":"2025-05-22T03:59:47+00:00","description":"Secure your cloud data with our 12 essential tips. Learn key strategies for robust cloud security and data protection.","breadcrumb":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/#primaryimage","url":"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/12-Tips-for-Keeping-Your-Files-and-Data-Secure-in-the-Cloud-HERO.jpg","contentUrl":"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2024\/02\/12-Tips-for-Keeping-Your-Files-and-Data-Secure-in-the-Cloud-HERO.jpg","width":1460,"height":1095,"caption":"12 Tips for Keeping Your Files and Data Secure in the Cloud"},{"@type":"BreadcrumbList","@id":"https:\/\/www-dev.dreamhost.com\/blog\/cloud-security-tips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dhblog.dream.press\/blog\/"},{"@type":"ListItem","position":2,"name":"12 Tips For Keeping Your Files And Data Secure In The Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www-dev.dreamhost.com\/blog\/#website","url":"https:\/\/www-dev.dreamhost.com\/blog\/","name":"DreamHost Blog","description":"","publisher":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www-dev.dreamhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www-dev.dreamhost.com\/blog\/#organization","name":"DreamHost","url":"https:\/\/www-dev.dreamhost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www-dev.dreamhost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/dhblog.dream.press\/blog\/wp-content\/uploads\/2019\/01\/dh_logo-blue-2.png","contentUrl":"https:\/\/dhblog.dream.press\/blog\/wp-content\/uploads\/2019\/01\/dh_logo-blue-2.png","width":1200,"height":168,"caption":"DreamHost"},"image":{"@id":"https:\/\/www-dev.dreamhost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DreamHost\/","https:\/\/x.com\/dreamhost","https:\/\/www.instagram.com\/dreamhost\/","https:\/\/www.linkedin.com\/company\/dreamhost\/","https:\/\/www.youtube.com\/user\/dreamhostusa"]},{"@type":"Person","@id":"https:\/\/www-dev.dreamhost.com\/blog\/#\/schema\/person\/a3f8817a11ac0b464bfbcb6c505cb82b","name":"Brian Andrus","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2023\/10\/brian-andrus-150x150.jpg","url":"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2023\/10\/brian-andrus-150x150.jpg","contentUrl":"https:\/\/www-dev.dreamhost.com\/blog\/wp-content\/uploads\/2023\/10\/brian-andrus-150x150.jpg","caption":"Brian Andrus"},"description":"Brian is a Cloud Engineer at DreamHost, primarily responsible for cloudy things. In his free time he enjoys navigating fatherhood, cutting firewood, and self-hosting whatever he can.","url":"https:\/\/www-dev.dreamhost.com\/blog\/author\/brianandrus\/"}]}},"lang":"en","translations":{"en":43227,"es":43244,"de":50669,"ru":50864,"pt":56717,"pl":56720,"uk":56733,"it":68525,"fr":70686,"nl":70711},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/posts\/43227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/users\/1006"}],"replies":[{"embeddable":true,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/comments?post=43227"}],"version-history":[{"count":10,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/posts\/43227\/revisions"}],"predecessor-version":[{"id":61417,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/posts\/43227\/revisions\/61417"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/media\/43228"}],"wp:attachment":[{"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/media?parent=43227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/categories?post=43227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www-dev.dreamhost.com\/blog\/wp-json\/wp\/v2\/tags?post=43227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}