Better – 4 Things We Do To Secure a Content Migration

Security is one of the most important aspects of any content migration. Security considerations impact migration in a number of ways, summarised simply below;

  • Understand the security in the source.
  • Securing the content during migration.
  • Appropriately applying security in the destination.

This article is concerned with securing the content during migration.

In delivering content migrations we do 4 key things to ensure security;

  • We Understand
  • We Plan
  • We Design
  • We Implement

We Understand

We understand that different organisations, jurisdictions, and content will be subject to differing legislation, regulation, and policy considerations. For example;

  • HIPAA / HITECH
  • PCI
  • EU Model Clauses
  • General Data Protection Regulation
  • Australia Privacy Act
  • ISO
  • Data Residency
  • South Africa’s Protection of Personal Information (POPI) Act

We Plan

It is critical in all content migrations that data should be treated with respect. We work with our clients to agree an appropriate content migration security plan as part of any content migration.

Plans are normally specific to client, source, destination and the nature of the content.

We Design

We design our migration tooling with security at the forefront of considerations.

We design our client’s migration processes again with security at the forefront and reflective of the agreed content migration security plan.

We Implement

We implement security measures across our migration tooling and processes. These will be appropriate to each aspect of the migration, for example;

  • Extract
  • Transform
  • Load
  • Remote Access

Extract

Appropriately secure the extraction process. For example if the source is a cloud based system where https:// has been deemed appropriate for user access then this will likely be appropriate for the extract aspect of the content migration.

Transform

Appropriately secure the transformation process. This may be simple but important measures such as minimising or eliminating the amount of content which is written to any temporary location and ensuring it’s expedient removal.

Load

Appropriately secure the load process. When loading to SharePoint Online for example we communicate to SharePoint using the https protocol and encrypt library content using the Advanced Encryption Standard (AES).

Remote Access

Appropriately secure remote access. If remote access to client systems is required then this will be secured in accordance to the agreed content migration security plan.

In Conclusion

Talk to us about how we can secure your content migration.

Share