Protected Voices: Cloud-Based Services
The FBI’s Protected Voices initiative provides cybersecurity recommendations to political campaigns on multiple topics, including cloud-based services, to help mitigate the risk of cyber influence operations targeting U.S. elections.
When you use cloud-based services, you’re relying on a third party to keep your sensitive information safe.
Hi, I’m Amy, a special agent with the FBI.
Cloud-based services offer a convenient way to store your data and access that information anywhere through an Internet connection. When you use a cloud-based service provider, you’re outsourcing the burden of maintaining and upgrading software, storage, and other IT infrastructure.
A secure cloud environment is an effective way to store data and to manage who can access it. Large corporations and the U.S. Department of Defense, among others, use cloud services. One of the benefits of cloud-based services is that they eliminate the need for local servers, which are attractive targets for attackers.
There are basically three ways to configure your system: Set up your own server, use a free third-party service, or use a paid third-party service.
How can you decide the best way to safeguard your sensitive information?
When you’re contemplating your options, know what you’re getting into.
Take some time to read the entire end-user license agreement—the fine print—for any cloud service provider you’re considering.
Those terms and conditions should spell out what happens to the information you put on the cloud. Will it be collected and sold to third parties? What can the cloud services provider do with your information? Who will have access to your data? How much storage do you need?
Make a point of carefully setting up managerial controls that limit access to trusted managers. Calibrate your settings to ensure your private campaign data remains private and can’t be viewed by just anyone. And make sure access to cloud-based services uses multi-factor authentication—which is the subject of another of our videos on campaign cybersecurity.
Only you can decide the best balance of security, cost, and privacy for your campaign.
There’s no foolproof way to solve all cybersecurity issues. But carefully weighing the pros and cons of where to store your data is an important step.
Remember, your voice matters, so protect it.
- 05.17.2019 — Wanted by the FBI: Charles Lee Hill
- 05.08.2019 — Wanted by the FBI: Arnoldo Jimenez Added to Ten Most Wanted Fugitives List
- 05.03.2019 — 2018 Director’s Community Leadership Awards
- 05.03.2019 — Dolly Parton Thanks FBI and Director's Community Leadership Award Recipients
- 04.30.2019 — Download the myFBI Dashboard App Today
- 04.29.2019 — FBI Plea for 9/11 Responders to Register for Health Benefits
- 04.24.2019 — Seeking Information in Indiana Double-Murder Investigation
- 04.15.2019 — Seeking Information: Feb. 14, 2019, Bank Robbery, Las Vegas
- 03.27.2019 — FBI Boston Seeking Witnesses in Jassy Correia Kidnapping Case
- 03.26.2019 — FBI and Partners Target Darknet Opioid Traffickers
- 03.20.2019 — FBI Marks 20 Years of Training at ‘Body Farm’
- 03.20.2019 — FBI Training at the ‘Body Farm’ (360º)
- 03.20.2019 — Training at Human Remains Recovery Course
- 03.13.2019 — Their Voices: Remembering 9/11
- 03.13.2019 — FBI Agents and Analysts Tour 9/11 Memorial & Museum
- 03.11.2019 — Portland Teen Academy
- 03.06.2019 — Director Discusses FBI Approach to Cyber Threats at RSA Conference
- 03.03.2019 — Former FBI Director William Webster Helps Foil Scam
- 02.27.2019 — FBI Seeking Owners in Cultural Artifacts Case
- 01.30.2019 — Partners in Prevention: Vehicle Rentals and Vehicle Ramming