Cloud App Policy

Cloud app policy refers to policies and procedures put in place by enterprises to ensure that the usage of cloud applications by employees complies with the overall corporate security plan as well as regulatory requirements.

Policies Range From Minimal to Highly Restrictive

The cloud app policies put in place by companies can range from minimal restrictions to highly restrictive, blocking almost all cloud app usage. Many companies have started looking for something in between these two extremes, seeking more fine-grained control of their cloud app policies.

This level of control typically permits use of a wide range of cloud apps but with specific restrictions placed on how and when certain activities can be performed by employees. These types of cloud app policies are designed to protect intellectual property and sensitive data from data loss or leakage from cloud apps without needing to block the usage of apps completely.

Cloud App Policy Examples and Reporting

As an example, a flexible cloud app policy might permit the general use of a specific cloud app while blocking its use after work hours or preventing the sharing or uploading of documents likely to contain confidential corporate information.

A variety of software vendors and software-as-a-service companies have launched cloud app policy suites that will help companies enforce their cloud app policies. These cloud app policy solutions often offer unified reporting consoles that provide detailed and real-time reporting on cloud app usage by time, user, department level or similar measurable.

Related terms: Cloud app, cloud computing and Cloud Computing Security Challenges

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.

Related Articles

@ Sign

Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...

Munging

(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...

How to Create an RSS Feed

In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...

Dictionary Attack

(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...