IT BEST PRACTICES

Subscribe to
IT Best Practices.

STAY CONNECTED

    Can You Trust Your Old Data with Hyperscale Providers?

    Data Destruction is a hard topic when it comes to the cloud, with typically vague answers from the mega cloud providers.

    So much of the conversation around data is often concerning backup and storage in a way that the emphasis is towards data multiplication. It makes sense, as you don’t want to lose critical data that you need access to. However, what is not discussed as regularly is data destruction, especially when it comes to data destruction in the cloud.

    Deleting Data

    For on-premises hardware, the idea of data destruction is simple. You delete the data from the disk and the data is removed. Additional steps can be taken to fully erase the data and make sure that there are no remnant traces left of the deleted data. These types of measures are important, especially when dealing with sensitive information like income or other personal identifying details.

    On a private cloud setup, it is still relatively easy to control how data is destroyed. The infrastructure is accessible, and control over data destruction remains in a more closed environment. However, for public clouds, the destruction is left to the cloud service provider, relinquishing more control on how data is being deleted.

    What can you do for better security?

    The unfortunate truth is that with major service providers, like AWS, Azure, or Google Cloud, the assurance that data is being disposed of properly is less of a guarantee. Transparency with hyperscale providers can be difficult, as most of their services will respond with generic statements designed to answer waves of questions from hundreds of consumers. When trying to match higher standards like HIPAA or DoD, it can be difficult to guarantee that all levels of security are being followed to the letter when using major public cloud platforms.

    So, what is the recourse left after this situation? It’s not a one-size-fits-all solution, but there are steps that organizations can take to ensure better compliance with data destruction. Some first steps are the physical destruction of data and media that’s only feasible in a private cloud environment. For highly classified information organizations, this measure is taken to truly ensure data has been destroyed and is no longer recoverable.

    Performing steps like regular data wipes on hardware to make the media available for reuse Is great for regular upkeep. Additionally, tagging data throughout its lifecycle as mission-critical can keep providers aware of important points to keep track of, ensuring proper destruction.

    Other measures outside of destruction help resolve the issues of uncertainty with certain providers. By making sure that proper assignments and access rights are only granted to the correct individuals, data is limited only to those who should have access. In this same way, encrypting data can be one of the best steps to take to ensure confidentiality of data within an organization. These steps work to provide peace of mind that data is being handled properly.

    CloudKeySM is a highly available cloud platform

    We understand the need for transparency, and respond to your needs with the bespoke cloud platform that addresses uncertainty. CloudKeySM is the highly available, turnkey platform that is designed with cutting-edge technology and tailor-made to your specifications.

    We believe that a great solution for maintaining accurate and secure data comes from replication, but we also understand the need for solid data destruction. CloudKeySM is more than one simple solution; it’s a multi-tool with incredible functionality that works on your behalf to simplify what you need from IT. To learn more about CloudKeySM and the solutions it provides, please explore our overview.

    Can You Trust Your Old Data with Hyperscale Providers?

    Data Destruction is a hard topic when it comes to the cloud, with typically vague answers from the mega cloud providers.

    So much of the conversation around data is often concerning backup and storage in a way that the emphasis is towards data multiplication. It makes sense, as you don’t want to lose critical data that you need access to. However, what is not discussed as regularly is data destruction, especially when it comes to data destruction in the cloud.

    Deleting Data

    For on-premises hardware, the idea of data destruction is simple. You delete the data from the disk and the data is removed. Additional steps can be taken to fully erase the data and make sure that there are no remnant traces left of the deleted data. These types of measures are important, especially when dealing with sensitive information like income or other personal identifying details.

    On a private cloud setup, it is still relatively easy to control how data is destroyed. The infrastructure is accessible, and control over data destruction remains in a more closed environment. However, for public clouds, the destruction is left to the cloud service provider, relinquishing more control on how data is being deleted.

    What can you do for better security?

    The unfortunate truth is that with major service providers, like AWS, Azure, or Google Cloud, the assurance that data is being disposed of properly is less of a guarantee. Transparency with hyperscale providers can be difficult, as most of their services will respond with generic statements designed to answer waves of questions from hundreds of consumers. When trying to match higher standards like HIPAA or DoD, it can be difficult to guarantee that all levels of security are being followed to the letter when using major public cloud platforms.

    So, what is the recourse left after this situation? It’s not a one-size-fits-all solution, but there are steps that organizations can take to ensure better compliance with data destruction. Some first steps are the physical destruction of data and media that’s only feasible in a private cloud environment. For highly classified information organizations, this measure is taken to truly ensure data has been destroyed and is no longer recoverable.

    Performing steps like regular data wipes on hardware to make the media available for reuse Is great for regular upkeep. Additionally, tagging data throughout its lifecycle as mission-critical can keep providers aware of important points to keep track of, ensuring proper destruction.

    Other measures outside of destruction help resolve the issues of uncertainty with certain providers. By making sure that proper assignments and access rights are only granted to the correct individuals, data is limited only to those who should have access. In this same way, encrypting data can be one of the best steps to take to ensure confidentiality of data within an organization. These steps work to provide peace of mind that data is being handled properly.

    CloudKeySM is a highly available cloud platform

    We understand the need for transparency, and respond to your needs with the bespoke cloud platform that addresses uncertainty. CloudKeySM is the highly available, turnkey platform that is designed with cutting-edge technology and tailor-made to your specifications.

    We believe that a great solution for maintaining accurate and secure data comes from replication, but we also understand the need for solid data destruction. CloudKeySM is more than one simple solution; it’s a multi-tool with incredible functionality that works on your behalf to simplify what you need from IT. To learn more about CloudKeySM and the solutions it provides, please explore our overview.

    Subscribe to
    IT Best Practices.

    STAY CONNECTED

      ALL ARTICLES

      Cloud Services

      Component Highlight: Veeam Data Protection and Backup

      READ MORE
      Cloud Services

      Meet the team – A word (or two) from our CEO, Reyner Natahamidjaja

      READ MORE
      Cloud Services

      Why you need a full cloud platform, and the pitfalls of going piecemeal

      READ MORE
      Cloud Services

      Component Highlight: IBM Flash Storage

      READ MORE
      Cloud Services

      Can You Trust Your Old Data with Hyperscale Providers?

      READ MORE
      Cloud Services

      Increasing Data Integrity & Security through multi-site replication with CloudKey

      READ MORE
      Cloud Services

      The Dissolution of AWS and their Cloud Monopoly

      READ MORE
      Cloud Services

      Meet the team – The Insights of Chris Martin

      READ MORE
      Cloud Services

      Component Highlight: Palo Alto Firewalls and Edge Security Services

      READ MORE
      Cloud Services

      How the right cloud platform can reduce your RTO and RPO

      READ MORE

      You Have The Momentum. We Help Keep It Going.

      At Global IP Networks, our mission is to keep your net working. Our team of dedicated, certified IT experts is 100% committed to your success. For over 20 years, we’ve relentlessly helped companies like yours tackle their IT challenges to maximize the security, uptime and performance of their networks.

      That’s tenacity. That’s Global IP Networks.

      wLearn More