Cloud Security

Information Security for Cloud Computing Solutions

What is Cloud Security?

Cloud Security is the comprehensive set of policies, technologies and controls used to protect information, data, applications, and the connected organizational infrastructure of cloud computing. Organizations are rapidly turning to the Cloud to reduce costs, provide greater flexibility and quickly ramp up support of business needs. But as more data, applications and infrastructure move to the Cloud, security remains a top concern. In fact, according to the Cloud Security Alliance, information security is cited as the number one barrier to adoption of Cloud services among organizations. 

Cloud Security Risk Consulting Services & Cloud Computing Security Solutions 

Dell SecureWorks Cloud Security Services

  • Cloud Security Strategic Consulting
    Establish a strategic direction for gaining the benefits of the Cloud while minimizing risk and improving security. Understand the ramifications of Cloud adoption on your information security program and policies. Integrate Cloud controls into your overall security program.
  • Cloud Risk Assessment
    Understand the security and compliance risks of a current Cloud deployment and how to manage them. Create a consistent process and cadence around how you manage your risk.
  • Assurance Testing of Cloud Deployments
    Evaluate the security model of a Cloud deployment. Test the effectiveness of security controls in the Cloud. Determine if the controls are properly implemented and function as designed. Understand how difficult (or easy) it would be for an attacker to penetrate the defenses and assess the potential impact.
  • Incident Response in Cloud Environments
    Understand the impact of Cloud architectures and data flows on your current Incident Response program. Determine the role of your Cloud partner in this process.  Mitigate incidents involving Cloud environments and capture evidence.   
  • Cloud Security Architecture and Design
    Develop architecture for securing data and IT assets in the Cloud. Understand the delta between a Cloud environment and your network security architecture. Establish standard architecture for securing Cloud deployments.

The above services can also be provided as part of general security consulting engagements where Cloud services or resources are in scope. If Cloud is a key part of your IT strategy, then including your cloud deployments in broader assessments, testing and compliance auditing is highly recommended.

Service & Deployment Models for Cloud Computing

Organizations use the Cloud in a variety of different service models which include:

  • Software as a Service (SaaS):
    Also referred to as "on-demand software", users are given access to the Cloud application through a software licensing subscription. The application is hosted by a provider and can typically be accessed through a web browser. The Cloud can be used when needed by the user without having to manage the infrastructure or platform where the application runs.
  • Platform as a Service (PaaS):
    The user typically rents the tools (hardware, operating systems, storage and networking) to run existing applications or in the development and testing of new ones.
  • Infrastructure as a Service (IaaS):
    The user is given access to virtualized components (servers, storage, and networking) in order to build their own IT platforms, operating systems, and applications.

Cloud deployment models include:

  • Private Cloud: Operated solely for a single organization
  • Public Cloud: A network that is open for public use
  • Hybrid Cloud: Can be a combination of various deployment models and can also use different providers

Regardless of how your organization leverages the Cloud, Dell SecureWorks Cloud computing security solutions can help your organization manage security, risk and compliance concerns.

Cloud Computing Security Services for Providers

As a leading provider of information security services, Dell SecureWorks can help organizations deliver Cloud-based services securely and satisfy the compliance requirements of their customers. Cloud service providers are able to leverage scarce resources, such as trained information security professionals, which provides economic benefits that can be passed on to buyers. Unless you are in Intelligence or have a large enough company to manage your own security infrastructure, information security personnel are increasingly difficult to hire and retain. Whether you are building a Cloud environment from the ground up or simply building on top of existing Cloud services, Dell SecureWorks can provide you with expert guidance and critical security controls to protect your infrastructure, applications and data.

10 Tips for Security in the Cloud


1.) Encrypt your data

2.) Ensure that all users are properly authenticated

3.) Set proper levels of authorization

4.) Monitor and track all user activity

5.) Ensure compliance to laws, regulations and guidelines as required by your particular business, industry and geography

6.) Verify that when you delete data in the cloud, it’s actually deleted

7.) Confirm that you own the data that resides in the cloud

8.) Establish service level agreements (SLAs) that specify data and system availability

9.) Make sure your cloud vendor has a viable disaster recovery plan in place

10.) Have an exit strategy

Protect Your Organization's Cloud Today

Contact an Information Security Consultant at Dell SecureWorks to further discuss how we can help secure your organization in the Cloud.

Additional Resources

Press Release: Dell SecureWorks Launches New Security Vulnerability Management Services for the Cloud and Virtual Environments
Press Release: Dell SecureWorks Launches Server Protection Services for Physical, Virtual and Cloud-Based IT Servers
Blog: PCI Council Releases New Guidelines on Cloud for Merchants, Payment Service






Online Tools

  • Print this Page
  • Share This Resource

By completing this form you'll be opting in to receiving future communications about products and services from Dell SecureWorks.