TechTonic Times

Security I Networking I Storage I IT Staffing I Managed Services

Why Every Relationship Needs A Little SSL

accesspriviliges (150x150)

Doesn’t the word ‘access’ turn you on on multiple levels?

The idea that,

you’re in the know,

that you’ve got clout,

And,

that you’re an

Insider?

Now,

Let’s add,

‘Privilege.’

Access Privilege.

Sends your ‘cloutiness’ over the top, doesn’t it?

Now you’re a real high roller…

But, you know what?

Privileged Access is Expensive.

Cost me a friend of 7 years.

We were at ground zero of operating a small business. She contributed no financial capital,

Yet,

She wanted access to the bank account.

I said,

‘No.’

In an earlier post, we discussed the 7 elements of choosing a Cloud Provider. Now we will investigate the first component:

Access Privileges

Cloud service providers should be able to demonstrate they enforce adequate hiring, oversight and access controls to enforce administrative delegation.

Secure Socket Layer (SSL) is a security protocol used by web browsers and web servers to help users protect their data during transfer. It is the standard for establishing trusted exchanges of information over the internet.

‘Trusted Exchanges.’

That’s the ticket. The missing element in my relationship in what was, I thought, a solid friendship.

I thought.

We do not have time to discuss her presumption.

Tacky.

So how does SSL work?

Well,

Before I tell you how it works, let me tell you how it will help you when you are hanging out in the Cloud.

SSL delivers two services that help with some cloud security issues. First SSL encryption keeps inquisitive eyes from reading private data as it is transmitted from server to server and between server and browser.

The second benefit, and possibly more important?

It establishes that a specific server and domain that can be trusted. An SSL certificate can authenticate that a specific server and domain do belong to the person or organization that it claims to represent. This benefit requires that the hosting provider use SSL from a third-party Certificate Authority (CA).

How SSL Works

An SSL certificate contains a public and private key pair as well as verified identification information. When a browser (or client) points to a secured domain, the server shares its public key (via the SSL certificate) with the client to establish an encryption method and a unique encryption key for the session. The client confirms that it recognizes and trusts the issuer of the SSL certificate.

Most reasonable people know this to be true:

A handshake can go a long way in every relationship.

SSL is just that, a firm handshake.

It says, this thing between you and me? It’s real.

So go ahead,

Access my data.

My data is safe with you. My privacy is your top priority and integrity regulates our relationship.

SSL also says,

Trust but verify.

 

Further Reading:
2014 Forecast for Cloud Computing
One quarter of all Cloud Providers will disappear by 2015
 
Source:
  • Gartner Research
  • Gartner EXPworldwide Survey
  • IDC exchange
  • “Assessing the Security Risk of Cloud computing.”~Gartner
It's only fair to share...Share on Facebook
Facebook
0Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin

Leave a Reply