background
What should I consider when selecting the cloud for my IP management system in the cloud?

When looking for a suitable IPM system, I would of course prefer a cloud application these days.
It would have to be fast, easy to use, and easy to understand. From tasks assigned to team members to documents to be uploaded and archived, I would focus on a provider that guarantees a cloud service.
However, I would make sure that the cloud service has the following minimum technical requirements:
- Hardening the system.
- Patch management.
- 2-factor authentication.
- End-to-end encryption with at least AES256 (standard). It's important that the encryption ends at the physical system where the data is processed, and no intermediate system (such as a proxy) decrypts the data. Only then can one speak of end-to-end encryption.
- Hard drive encryption at the storage location. Never forget that, theoretically, the hard drive could easily be stolen, as not every provider has a high-security facility. In short: The data on the hard drive must be encrypted.
- Monitoring and logging in accordance with legal requirements.
- High password complexity. What does high mean when we talk about password complexity? We believe that 2 characters are sufficient when used in conjunction with two-factor authentication, but only then.
- Role-based access. This is a basic requirement in an enterprise environment, but not necessary for an individual user.
- Least privilege principle. Typically a topic in larger corporate environments. For example, the functionality to assign tasks to another user requires that real users can search for other real users. To do this, they need a special right, which would actually contradict the least privilege principle. But still, the least privilege principle is a must.
More articles