Protected Voices: Cloud-Based Services
The FBI’s Protected Voices initiative provides cybersecurity recommendations to political campaigns on multiple topics, including cloud-based services, to help mitigate the risk of cyber influence operations targeting U.S. elections.
When you use cloud-based services, you’re relying on a third party to keep your sensitive information safe.
Hi, I’m Amy, a special agent with the FBI.
Cloud-based services offer a convenient way to store your data and access that information anywhere through an Internet connection. When you use a cloud-based service provider, you’re outsourcing the burden of maintaining and upgrading software, storage, and other IT infrastructure.
A secure cloud environment is an effective way to store data and to manage who can access it. Large corporations and the U.S. Department of Defense, among others, use cloud services. One of the benefits of cloud-based services is that they eliminate the need for local servers, which are attractive targets for attackers.
There are basically three ways to configure your system: Set up your own server, use a free third-party service, or use a paid third-party service.
How can you decide the best way to safeguard your sensitive information?
When you’re contemplating your options, know what you’re getting into.
Take some time to read the entire end-user license agreement—the fine print—for any cloud service provider you’re considering.
Those terms and conditions should spell out what happens to the information you put on the cloud. Will it be collected and sold to third parties? What can the cloud services provider do with your information? Who will have access to your data? How much storage do you need?
Make a point of carefully setting up managerial controls that limit access to trusted managers. Calibrate your settings to ensure your private campaign data remains private and can’t be viewed by just anyone. And make sure access to cloud-based services uses multi-factor authentication—which is the subject of another of our videos on campaign cybersecurity.
Only you can decide the best balance of security, cost, and privacy for your campaign.
There’s no foolproof way to solve all cybersecurity issues. But carefully weighing the pros and cons of where to store your data is an important step.
Remember, your voice matters, so protect it.
- 09.21.2019 — FBI San Diego Think Before You Post PSA
- 09.18.2019 — My Dynamic Huntsville
- 09.18.2019 — My Unique Huntsville
- 09.18.2019 — Video Loop of The Killing Fields
- 09.18.2019 — FBI Seeking Clues in Texas 'Killing Fields' Murders
- 09.13.2019 — FBI Plea for 9/11 Responders to Register for Health Benefits (Social Media Version)
- 09.11.2019 — Lori's Story: 9/11 Victim's Sister Recalls 'Very Reverent Moment'
- 09.10.2019 — FBI Boston: Armed Robbery of Convenience Store in Dedham, Massachusetts
- 09.06.2019 — 9/11 Memorial at Terrorist Screening Center
- 08.22.2019 — Echoes of Columbine
- 08.16.2019 — FBI Honors Intern Profile: Kendall, Information Management Division
- 08.16.2019 — FBI Honors Intern Profile: Anne, Laboratory Division
- 08.16.2019 — FBI Honors Intern Profile: McKinley, Counterintelligence Division
- 08.16.2019 — FBI Honors Intern Profile: Mary Katelyn, Office of Public Affairs
- 08.09.2019 — FBI Special Agent Reunites with Rescued Newborn, Now Marine, During Retirement Ceremony
- 08.06.2019 — FBI Philadelphia: Armored Car Robbery in University City
- 08.06.2019 — FBI Boston: Arsons at Chabad Centers (Needham)
- 08.06.2019 — FBI Boston: Arsons at Chabad Centers (Arlington)
- 08.06.2019 — FBI’s Operation Independence Day Targets Human Trafficking
- 08.06.2019 — Raw Footage: Operation Independence Day