1. Find out how the vendor will secure your data.
Application Access Control
2. Ensure that data is encrypted both in motion and at rest.
End-to-end Data Encryption
4. Evaluate security certifications, audits and compliance mandates.
Open Web Application Security Project (OWASP) Cloud Security Alliance (CSA)
5. Determine the level of visibility into any intrusion or potential compromise.
6. Data security procedures and processes need to be an integrated part of the disaster recovery plan.
About the Author www.hubspan.com