How many of us have taken the time to consider all of the ramifications of putting our I.T., that is our data, into the cloud in some form or other?
- Facilities where the cloud vendor’s equipment resides
- Controlled Access
- 24x7x365 On-Site Security
- Uptime Institute Certified Tier I, II, III, IV, or V
- True A/B or A/B/C Power Grids with isolated generators per power channel
- Filtered Air
- Hot and Cold aisle that isolate and better improve cooling efficiency
- How are tenant environments backed up
- How the tenant environments are isolated from each other if at all
- Does the Cloud Vendor have tenants protected from an encryption event
- Are the tenant environments running side-by-side with the cloud vendor’s production network
- Tenants and Cloud Vendors share Resources leading to encryption event risk across the board
- Is there a backup ability that allows us to pull our data out
- Secure access of the tenant environment
- Is Two-Factor Authentication Available
- Are Vendor provided usernames and passwords easy to crack
Please keep an eye on this page. It is a living document with more information and guidance to be had soon!