10 ways to protect data in the cloud
1. Apply big data analytics to detect anomalous connections to cluster
How? Use solutions like TLS/SSL, Kerberos, Secure European System for Applications in a Multi-Vendor Environment (SESAME), Internet protocol security (IPsec), or secure shell (SSH) to establish trusted connections to and–if needed–within a cluster to prevent unauthorized connections. Use monitoring tools, like a security information and event management (SIEM) solution, to monitor anomalous connections. This could be, for instance, based on connection behavior (e.g., seeing a connection from a ‘bad Internet neighborhood’) or alerts being filed in the logs of the cluster systems, indicating an attempt to establish an unauthorized connection.