ABSTRACT

This chapter focuses on how to secure distribution among systems and measures that can be enacted to have a proactive stance. In order to ensure the implemented security in the architecture of the Cloud is effective, the utilization of defensive mechanisms is critical. Changing passwords or usernames or creating time limits spent on cloud storage following a breach may be implemented so that information cannot be stolen again in the future. Data breaches can cause companies to incur huge fines, lawsuits, or criminal charges depending on the sensitivity of the information that was compromised and the severity of the attack. Most cloud services offered today also provide some form of Application Programming Interface (API). An API can be used by Information Technology (IT) teams to manage and interact with the cloud services in use by their business. It would also be wise of the client to formulate an auditing process for the compliance of IT systems.