The Top Four PaaS Security Questions You Aren’t Asking

Default Blog Top Image
by The App Dev Team Posted on February 07, 2014

When thinking about doing business in the cloud, security is always top of mind. As cloud technology matures and its adoption becomes more mainstream, security concerns about cloud-based software and data are shifting from shrill panic to practical embrace. When working through security issues in any cloud environment, including a Platform-as-a-Service (PaaS) environment, one thing is clear—it must be done carefully and deliberately.

Michael Benedict, VP and GM of Progress Pacific, lays the foundation for security standards in his paper, “Best Practices for PaaS.” Benedict addresses the top four PaaS Security Questions every company should be asking their security organization when adopting a PaaS environment:

  1. Who owns the code and the data?
  2. Is your IT department separating dev/test/run tasks or are you playing “Shadow IT”?
  3. Are security duties being segregated or is an “off the books” IT approach in place, which can resemble a formula for fraud?
  4. How does your PaaS provider handle a breach, and how will a security incident affect your application small or large scale?

Find out about these and other important security questions you need to know in Benedict’s white paper, where he provides a framework for considering the top security concerns when moving part or all of your application development projects onto PaaS.


Related Tags

Related Articles

Progress DataDirect Now Connects to Denodo
Progress DataDirect has added Denodo, a data virtualization software platform, to its catalog of connectors.
What Is the Difference Between SSO, 2FA and MFA?
Learn about the three main security protocols and their differences: Single Sign-On (SSO), Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA).
Website & App Security: What You Need to Know to Protect the Products You Build
What can you do to ensure that you’re not setting up your clients for failure or their end users for trouble? In this post, we’ll look at the four parts of a digital product that are the most vulnerable along with what you can do to secure those weak spots.
Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation