Protected Voices: Cloud-Based Services
The FBI’s Protected Voices initiative provides cybersecurity recommendations to political campaigns on multiple topics, including cloud-based services, to help mitigate the risk of cyber influence operations targeting U.S. elections.
When you use cloud-based services, you’re relying on a third party to keep your sensitive information safe.
Hi, I’m Amy, a special agent with the FBI.
Cloud-based services offer a convenient way to store your data and access that information anywhere through an Internet connection. When you use a cloud-based service provider, you’re outsourcing the burden of maintaining and upgrading software, storage, and other IT infrastructure.
A secure cloud environment is an effective way to store data and to manage who can access it. Large corporations and the U.S. Department of Defense, among others, use cloud services. One of the benefits of cloud-based services is that they eliminate the need for local servers, which are attractive targets for attackers.
There are basically three ways to configure your system: Set up your own server, use a free third-party service, or use a paid third-party service.
How can you decide the best way to safeguard your sensitive information?
When you’re contemplating your options, know what you’re getting into.
Take some time to read the entire end-user license agreement—the fine print—for any cloud service provider you’re considering.
Those terms and conditions should spell out what happens to the information you put on the cloud. Will it be collected and sold to third parties? What can the cloud services provider do with your information? Who will have access to your data? How much storage do you need?
Make a point of carefully setting up managerial controls that limit access to trusted managers. Calibrate your settings to ensure your private campaign data remains private and can’t be viewed by just anyone. And make sure access to cloud-based services uses multi-factor authentication—which is the subject of another of our videos on campaign cybersecurity.
Only you can decide the best balance of security, cost, and privacy for your campaign.
There’s no foolproof way to solve all cybersecurity issues. But carefully weighing the pros and cons of where to store your data is an important step.
Remember, your voice matters, so protect it.
- 09.04.2018 — Facebook Live Event: An Inside Look at Physical Fitness
- 09.03.2018 — Smithsonian Assists FBI in Minnesota Ruby Slippers Case
- 08.30.2018 — Protected Voices: Information Security (InfoSec)
- 08.30.2018 — Protected Voices: Wi-Fi
- 08.30.2018 — Protected Voices: Social Engineering
- 08.30.2018 — Protected Voices: Virtual Private Networks
- 08.30.2018 — Protected Voices: Safer Campaign Communications
- 08.30.2018 — Protected Voices: Router Hardening
- 08.30.2018 — Protected Voices: Patching, Firewalls, and Anti-Virus Software
- 08.30.2018 — Protected Voices: Passwords
- 08.30.2018 — Protected Voices: Incident Response
- 08.30.2018 — Protected Voices: Have You Been Hacked?
- 08.30.2018 — Protected Voices: Browser and App Safety
- 08.29.2018 — Seattle Detective Describes Sex Trafficker David Delay's Methods
- 08.29.2018 — Seattle Special Agent Describes David Delay Sex Trafficking Case
- 08.29.2018 — Seattle Sex Trafficking Survivor Shares Her Story
- 08.28.2018 — Apply for the FBI Honors Internship Program
- 08.03.2018 — Unexpected Agents at the FBI
- 08.03.2018 — FBI Special Agent Careers – Law Enforcement