How Secure is Your Data? 5 Key Considerations around Data Center Compliance
To truly understand compliance and regulation – it’s important to apply it to your business, technological model, and know how all of this will impact you.
As cloud computing continues to grow and evolve – one of the key consideration points remains security. However, these concerns have evolved to encompass users, data, application, workload and even data center security considerations. As more organizations push their infrastructure into the cloud, they’ll need to understand how security, compliance, and regulation all impact their data center model. From an IT perspective, the most common data center compliance standards include SOX, PCI-DSS, FISMA/FedRamp, HIPAA/HITECH, SAE 16, SOC 2 & 3, OCC which serve a very wide number of common industries. To truly understand compliance and regulation – it’s important to look at each standard and apply it to your business, technological model, and how this will impact you in the future.
This webinar from Iron Mountain examines the five key things to consider when it comes to data center compliance. This includes:
What are your compliance requirements?
The cost of compliance: In-House vs Outsourced
Difficulty in achieving compliance
Maintaining Compliance
Cost of Non-compliance
Furthermore, this webinar outlines the key questions which are being asked as it relates to security, cloud computing and the compliance dilemma.
Find out:
What are the specific compliance regulations governing my industry?
What are the day-to-day tasks that I need performed in the data center? Who will do them?
How important is physical security?
How dynamic is my information technology environment? Does this impact compliance?
What services and support will I need to make my environment compliant?
There are more demands being placed around the modern data centers are organizations now create their business model directly around technology. Already we are seeing changes in regulation and compliance to allow for more data to reside in secure cloud environments. For example, the recent Omnibus Rule (an update to HIPAA) allows for the transient access of protected healthcare information (PHI) to move through a business associate which has signed a business associate agreement (BAA). These changes are giving organizations more options around their cloud and what they can do with their enterprise. Through it all, security and data integrity will always be critical considerations.
About the Author
You May Also Like