Logo
  • Deals
    • Hardware - Overview
      • Mobile Computing - Overview
      • Notebooks
      • Mobile Workstations
      • Tablets
      • Smartphones & Mobile Phones
      • Wearables
      • Mobile Computing Warranties & Services
      • Mobile Computing Accessories
      • Mobile Computing Spare Parts
      • Communication & Conferencing - Overview
      • Conference Systems
      • VoIP Telephony
      • Headsets
      • Webcams
      • Communication Warranties & Services
      • Communication Accessories
      • IT Infrastructure - Overview
      • Servers
      • Storage
      • Uninterruptible Power Supply
      • Network
      • Security
      • Racks
      • IT Infrastructure Warranties & Services
      • IT Infrastructure Accessories
      • IT Infrastructure Spare Parts
      • Computing - Overview
      • PCs
      • Workstations
      • Thin Clients
      • All-in-One PCs
      • Point of Sale & Point of Information
      • Computing Warranties & Services
      • Computing Accessories
      • Computing Spare Parts
      • Peripherals - Overview
      • Monitors
      • Public Displays
      • TVs
      • Projectors
      • Input Devices
      • Audio, Photo & Video
      • Peripherals Warranties & Services
      • Peripherals Accessories
      • Printers & Scanners - Overview
      • Printers
      • Label Printers
      • Disc Duplicators
      • Scanners
      • Barcode Scanners
      • Mobile Data Collection
      • Consumables
      • Warranties & Services
      • Printer & Scanner Accessories
      • Printer Spare Parts
      • Components - Overview
      • SSDs & HDDs
      • Memory
      • Graphics Cards
      • Drives & Enclosures
      • Interfaces & Controllers
      • Storage Media
      • Power Supplies
      • Processors
      • Component Accessories
      • Connectivity - Overview
      • Network Connectivity
      • PC Connectivity
      • USB Connectivity
      • Power Connectivity
      • Phone Connectivity
      • Device Servers
      • Extenders & Splitters
      • Connectivity Accessories
      • Office Equipment - Overview
      • Organisation & Ergonomics
      • Smart Home
      • Cleaning Products
      • Safety, Security & Protection
      • Office Appliances
      • Mounting Solutions
      • Office Furniture
      • Batteries
      • Office Equipment Accessories
      • Outlet - Overview
      • B-Stock
    • Software - Overview
      • Storage, Backup & Recovery - Overview
      • Client Backup & Recovery
      • Backup, Recovery & Archiving
      • Server Backup & Recovery
      • Security Software - Overview
      • Endpoint Security
      • E-mail Security
      • Security Suites
      • Mobile Security
      • Network Security
      • Cloud Security
      • Gateway Security
      • Management & Training
      • Development Software - Overview
      • Project Management & Collaboration
      • Collaboration Software - Overview
      • Communication
      • Document Management
      • File Sharing
      • Office Applications - Overview
      • Office Software & Add-ons
      • Creative Design & Publishing
      • Infrastructure Software - Overview
      • Operating Systems
      • Monitoring & Reporting
      • Software Deployment & Maintenance
      • Print Management
      • Optimisation
      • Virtualisation - Overview
      • Desktop Virtualisation
      • Infrastructure & Management
    • IT Solutions - Overview
      • Business Applications - Overview
      • Collaboration
      • Enterprise Resource Planning
      • DMS & ECM
      • Template Management System Docunize
      • Cloud solutions - Overview
      • Multi-Cloud
      • Public cloud
      • Clouds-Shop
      • FinOps (Financial Operations)-Service
      • Data & Analytics - Overview
      • Data platform and integration
      • Analytics & AI
      • Data visualisation
      • Data strategy
      • Data Centre - Overview
      • Multi Cloud
      • Modular Data Center Competence
      • Hyper Converged Infrastructure
      • Software-defined Datacenter
      • SAP HANA Infrastructure
      • IoT/AI - Overview
      • Bechtle Control Suite
      • Servinvent | Platform for collating medical devices
      • Modern Workplace - Overview
      • 360° Workplace of the Future
      • Device as a Service
      • Modern meetings
      • Communication and Collaboration
      • Azure Virtual Desktop Solutions
      • Mobile working ▷ Remote & flexible on the road
      • Managed Workplace Services
      • Efficient room management
      • Workplace Security
      • Networking - Overview
      • Data Centre Networking
      • Enterprise Networking
      • Bechtle service bundles for Cisco infrastructure
      • IT Security - Overview
      • Application Security
      • Cloud Security
      • Cyber Security
      • Data Centre Security
      • Data protection and information security
      • Infrastructure & Perimeter Security
      • IAM Identity & Access Management
      • Security awareness training
      • Ransomware
      • Cyber Defence Centre
      • Display solutions - Overview
      • The Reception
      • Wayfinding
      • Employee Communications
    • IT Services - Overview
    • Service Desk
      • Consulting Services - Overview
      • Cloud Consulting
      • Managed Services - Overview
      • Printing Services
      • Azure Operations
      • 360° Managed IT
      • Bechtle Prime Support
    • Onsite Services
    • Professional Services
      • Software Asset Management - Overview
      • SAM as a Service
      • SAM Baseline
      • SAM Solution Advisory
      • SAM Cloud Readiness
      • SAM Consulting
      • SAM Century Platform
      • SAM Inventory2go
      • Workplace Services - Overview
      • Assessment, design and procurement
      • Staging and Rollout Services
      • IMAC/RD Services
      • Break&Fix service
      • Customised IT Accessories
      • Financial Services - Overview
      • Consultation
      • Structuring
      • Financing
      • E-Procurement - Overview
      • My Bechtle
      • ERP Connection
      • Electronic invoicing
      • Quotes
      • Framework agreements
      • Special conditions
      • Promotion Products - Overview
      • New in
      • USB Sticks
      • Wireless Charging Station
      • Powerbanks
      • ProPro range
      • Lifestyle
      • The Webkey
      • 3D Promotional Products
      • Digital Prints Under Tempered Glass
      • Quick Service
      • Process Flow
    • 360° Managed-IT - Overview
    • 360° Managed IT on Microsoft Azure
    • 360° swiss cube
    • 360° colocation
    • 360° infrastructure
    • 360° firewall
    • 360° network
    • 360° backup control
    • 360° cloud backup
    • 360° monitoring
    • 360° CIRT
    • Career - Overview
      • Bechtle as an employer - Overview
      • Development
      • Benefits
      • Departments - Overview
      • IT
      • Sales
      • Other departments
    • Vocational education
    • Application process
    • Career Contact
    • Jobs
    • About Bechtle - Overview
      • Company - Overview
      • Management
      • Bechtle management in Switzerland
      • Locations
      • Bechtle Group Companies
      • Company Development
      • Vision 2030
      • Certifications
      • Bechtle in Switzerland
      • Investors - Overview
      • Bechtle Share
      • Publications
      • Financial Calendar
      • General Meeting
      • Corporate Governance
      • Investors Contact
      • Retail Investors
      • Software revenue according to IFRS 15
    • Sustainability / CSR
      • Events - Overview
      • Bechtle IT Forum 2025 - Replay
      • Webinar Replay Bechtle
      • Webinar: Intel Xeon 6 (Only German)
      • Bechtle X-MAS Market. (Only French)
      • Webinar: Discover Cybersecurity with Arctic Wolf (Only German)
    • References
      • Public Sector - Overview
      • Schools and IT
      • OCRE with Bechtle
      • International business with Bechtle - Overview
      • Global IT Alliance
    • Partners
      • Contact - Overview
      • Bechtle direct Rotkreuz
      • Bechtle direct Dübendorf
      • Bechtle direct AG Schweiz Morges
      • Bechtle Schweiz AG
      • Support
      • News - Overview
      • Newsroom
      • Corporate News
      • Newsletter
      • Bechtle Blog CH
      • Podcast. bits & bytes
About Bechtle
News
Bechtle Blog CH
Cloud / Data Center
Cloud security - tips from our expert Maximilian Munker
security_header_1440x480.jpg
Cloud / Data Center - Nov 10, 2022

Avoid these security risks and make your cloud more secure.

by Maximilian Munker

  1.  
  2.  
  3. 1. insufficient identity and authorisation management
  4. One of the core components of a functional cloud computing platform is identity and authorisation management, as this is essential for all access to services, applications and information. The main pillars of this system are authentication, authorisation of identities and the publication of attributes such as access rights. If misconfigurations or anomalies occur, there is a risk that identities could gain access to unauthorised information and, in the worst case, exfiltrate data. This also poses a significant risk if external parties gain access to the identities and can thus move freely through corporate resources and cloud infrastructure.
  5.  
  6. The visibility, scope and management of identity-related information, data and authorisations in such an environment requires a comprehensive, flexible and secure Identity and Access Management (IDA). This should be secured by several protective measures in order to be able to check access effectively. There are various aids in the form of technologies such as multi-factor authentication, conditional access or behaviour-based user analyses. Here, all user behaviour is proactively monitored and automated messages are generated in the event of anomalies.
  7.  
  8. With our Bechtle iam amira solution, we guarantee a rule-compliant and seamless linking of people and their accounts, mailboxes, resources, and access rights - throughout the entire life cycle of the objects.
  9.  
2. system vulnerabilities

Organisations are increasingly relying on cloud platforms such as Amazon AWS, Microsoft Azure or Google Cloud to run their business-critical applications and for their data and file management, as they advertise high security standards and various data centre certifications based on international standards. This gives the customer the impression that security is in good hands here. However, one must still be aware that the security of the company data as well as configurations of the services are still in the hands of the customer.

Although cloud service providers take on some security responsibilities, their customers still bear the responsibility for the security of end-user data, applications, operating systems, endpoints and network traffic. And just like on-premise applications, you need to monitor user and system activity to detect attacks. In addition, cloud platforms bring new security complications such as:

  • Complex and often erroneous configuration of cloud-based security tools.
  • DevOps processes that deploy application code daily or even hourly
  • Attacks specifically targeted against cloud platforms
  • Complex compliance requirements
  1.  
  2. 3. lack of cloud security architecture and strategy
  3. The cloud, whether private cloud, public cloud or hybrid cloud, promises agility, efficiency and cost-effectiveness. These are transformative attributes for any business: They make it possible to adapt to market changes through rapid service delivery and to make data-driven decisions. However, businesses can be prevented from using cloud resources without exposing themselves and their data to risk. With a cloud security architecture, businesses can take advantage of all the benefits that cloud products offer, including Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS), while minimising risks and security vulnerabilities. Without cloud security architecture, the risks of cloud use can outweigh its potential benefits.

  4. Cloud architecture describes the combination of technology components to build a cloud in which resources are bundled through virtualisation technology and shared in a network. Consistent application of cloud security measures can significantly reduce the risk of failures, data loss, DDoS attacks or unauthorised access. The concrete measures in each case consist of a combination of rules, processes and technical specifications to secure the entire cloud infrastructure and its applications.

    Cloud computing service providers that ensure confidentiality, integrity and availability are prerequisites for the secure use of cloud resources. Companies need a cloud infrastructure that is characterised by high performance. At the same time, this infrastructure must be reliable and trustworthy. An effective cloud security architecture relies on cloud architects who know that a trustworthy foundation must be a top priority in the initial planning stages and cannot simply be added later. Security is not a commodity, but an essential component.

  5. As a multi-cloud service provider, Bechtle also offers a variety of public cloud solutions in addition to its own-produced cloud services. This results from the close cooperation with leading cloud providers, which thus enables customers to choose from an even wider range of high-performance solutions. The use of Bechtle's cloud services is completely uncomplicated for customers thanks to fully automated procurement, provisioning and billing.

 

Written by

max-munker_portrait.png
Maximilian Munker
Consultant Information Security

E-Mail: maximilian.munker@bechtle.com

    This post was published on Nov 10, 2022.
    Company
    Bechtle Locations
    Career
    Press
    Investor Relations
    Events
    Payment and Delivery
    Help Centre
    Contact
    Support
    Newsletter

    LinkedIn Bechtle LinkedIn Bechtle Schweiz AG

    LinkedIn Bechtle LinkedIn Bechtle direct AG

    YouTube Bechtle YouTube

    Instagram Bechtle Instagram

    Facebook Bechtle Facebook

    Products are sold exclusively to commercial end customers and the public sector.

    Prices in CHF plus VAT.

    Legal Notice Privacy Policy T&Cs
    Support-ID: f1cee50961
    © 2025 Bechtle AG