123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Carefully Monitor Cloud Policy Exceptions For Misuse

Profile Picture
By Author: Lauren Ellis
Total Articles: 35
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

You know the old adage – “For every rule there is an exception.” (Please temporarily ignore the paradox this creates). This saying certainly seems to apply to every cloud access policy I have ever seen. Here are some of the most common examples:

A financial services company sees only risk and no value in providing access to social media platforms from desktop workstations, but then the Marketing group needs to promote the brand on Facebook and Twitter so they are given an exception to use social media services.

A tech company’s sales team is not permitted to access their corporate Cloud Security services like Salesforce from personal tablets without having to VPN into the corporate network. However, when the CEO and VP of Sales want to travel with their iPads only, they are granted an exception to directly access the services they use everyday, like Salesforce, Workday, Netsuite, and Box.

These exceptions make sense. IT wants to enable business units to use the services that help them do their jobs, and sometimes those services exist outside of the blanket ...
... cloud access policies governing day-to-day usage.

So guess what happens when a company has to grant access to a service? There is no easy way to grant access just to a service, so the exception is granted for the entire category. The result: employees are granted broad access to all services in the category, effectively allowing an access level beyond the intent of the policy exception.

Here’s an example – a healthcare company had fairly restrictive cloud storage policies due to the HIPAA and HITECH Cloud Compliance requirements. They prohibited all use of personal cloud storage services, but their CIO was asked to make a policy exception for a newly acquired business unit to use Mozy, an online back-up service. When granting access to this service, they allowed the entire cloud storage category for these users. Only later and by accident did they discover that usage had crept beyond Mozy to several high risk file sharing services including Dropbox, Zippyshare, and Carbonite, creating a compliance and security risk that was in violation of their corporate policies.

The lesson here is that when you grant exceptions, you also need visibility to make sure usage hasn’t unintentionally crept beyond the intended exceptions to new, high risk services that lead to greater compliance, security and governance risks.

Author :
Lauren Ellis is a research analyst covering the technology industry’s top trends & topics, focusing on Cloud Security, Cloud Computing, Data Loss Prevention etc.,

Total Views: 639Word Count: 417See All articles From Author

Add Comment

Computers Articles

1. Best Epos Systems In The Uk For Retail & Hospitality
Author: POS Buyer

2. Why Local Technical Support Still Matters For Computer Repair In Westlake In A Cloud-first World
Author: Arun Singh

3. How To Make Keycloak Truly Enterprise Ready
Author: Soham Biswas

4. Driving Scalable Digital Solutions With Tech Gazebos Microservices Expertise
Author: Tech Gazebos

5. Spark Matrix : Artificial Intelligence Services
Author: Umangp

6. Cash Drawer Dealers In India For Pos Billing Systems
Author: pbs

7. Choosing Reliable Experts For Cracked Laptop Screen Replacement
Author: computerrepairservices

8. Foxpro Migration: A Strategic Path Forward For Modern Businesses
Author: Tech Gazebos

9. Spark Matrix™: Ai Governance Platforms
Author: Umangp

10. Digital Product Passports Power Transparent And Circular Supply Chains
Author: Rutuja kadam

11. Epson Barcode Printer Sales & Service Dealers In Hyderabad
Author: prime pos

12. Black Friday Tech Deals: Lock In Your 2026 Ai Readiness With Exclusive Ecf Data Offers
Author: ECF Data

13. What Is Nova And How Does It Help Businesses?
Author: TrackHr App

14. Edge Development Platform Market: Powering Next-generation Distributed Applications
Author: Umangp

15. Enterprise Mobile App Development 
Author: brainbell1021

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: