Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Securing documents in the cloud

in Blog, Document Security, DRM, PDF Security

Document security in the cloud.

Everyone knows the ubiquity of the cloud – a big empty space just waiting for you to fill it up with all sorts of goodies that you want to be able to share with the right friends or business partners, or customers, and who may well equally want to share their information with you.

But not all friends are equally trustable.  And your business contacts may have different objectives from your own.  So maybe you should not trust that everyone will respect your confidence and treat your information securely.

Also, are you aware of the security services that the cloud provider you are using delivers?  Do they protect your documents, and if so, from who and what?  How do people gain access to your documents in the cloud?  Is there any method for making sure that people only get to see what they should, and how is that enforced?  Is information backed up, and if so, where and who has access?  This may matter a lot if you are using the cloud as an extended storage device or a portal for information distribution.

Why secure documents in the cloud?

So do you need any document security at all?  Well, if you don’t mind if documents you upload to the cloud can be all over the Internet, some versions being a little less accurate than when they set off, then you’re already good to go.  But if you’re reading this blog it’s likely you are wanting a bit of control, and you’d like to find out the ‘how to’ aspects of securing documents in the cloud.

The first thing to understand about the cloud model is that you are usually granting people that do not have accounts on your local network access to files you are storing in the cloud.  Whether they logon to a portal or are shown a ‘downloads page’ by an application, they are getting access.  So if documents in the cloud are not already secured they can take copies of them onto their own systems and then do what they want with them – like uploading them to Torrent sites.

Many suppliers will tell you that files on their cloud service are encrypted and that makes them safe.  But recipients have to have the decryption key or they cannot open the file.  Sometimes this ‘key’ is an identity field plus a password, and sometimes it is just the email address of the intended recipient.  Either way, the intended recipient can tell anyone else what those passwords are because they don’t lose any of their own security by disclosing the information (unless it would disclose their own personal information that they would rather was kept secret – sometimes called enlightened self-interest). This applies to Adobe Document Cloud and its security, as well as Google Drive, OneDrive, etc.

So that narrows the choice of security methods down.  Your requirement is to be able to decide who can actually see which documents, and what they are allowed to do with them.  Please note that this requirement runs counter to the Electronic Frontier Foundation (EFF) theory that there must be no controls limiting access to and use of information that gets published on the web.  There are some ideas that it must be impossible to have information that can be controlled, so that anyone has the right to study it (for personal use only – of course).

Only Digital Rights Management (DRM) technology has the ability to control exactly who is able to access documents, and what they are able to do with the content, if anything.

How does DRM work?

DRM starts off by encrypting documents to make sure that only those authorized can use them at all.  This is the basis of good security.  At the same time DRM takes the document controls that you want (stop copying, prevent printing, enforce document expiry, etc.), and binds them to the document so that they cannot be removed without destroying the document itself.

Document encryption is done before you upload to the cloud, so there are no concerns about attacks while documents are in transit or when stored in the cloud.  That way anything the service providers do is a bonus, but it is not critical if their encryption fails for any reason.

This gets you into generating and managing encryption keys, but select a DRM product that does all of that for you because it’s complicated and easy to get wrong.  DRM administration systems must not disclose cryptographic keys that can release the original documents, and must not send the keys along with the files so they cannot be easily attacked.  That tends to mean that special DRM document viewers are needed that have strictly controlled functionality so they cannot be hacked easily to allow content to be extracted.  Look out for a system that can prevent printing documents, and has no functionality for Save or Save As, so those features can never be used.

Other DRM controls that are valuable are:

  • when documents can be used (start and stop dates)
  • how often documents can be used (a number of views and prints)
  • if documents be used offline or must users always be connected to the Interent
  • the ability to revoke documents at any time
  • dynamic watermarks that identify users, which are automatically added on screen as well as in printed copies
  • restricting document use to specific country locations
  • restricting document use to an IP address or range (say an office location)

Having a range of granular document use controls is very important as the security requirements vary by the document content, not the group of people it is destined for.

Also look for controls that allow you to handle documents in groups or publications.  Typical groups of business documents are:

  • Board Papers
  • Monthly accounts
  • Sales distribution list
  • Manufacturing list
  • Franchisee distribution
  • Monthly sales forecast
  • Monthly markets analysis
  • Technical product training course
  • New edition(s) of analyses
  • Confidential data on competitors

and so on.

When you have protected your documents, you need to upload them to your cloud service in order to make them available to the intended recipients.

And finally you have to tell the administration system who gets to use which documents or groups of documents.  Customer/user records have to be set up establishing which documents or publications each individual gets to use.  What they can do with the documents they are being given access to has already been fixed, based upon the content of the documents.  This is a more pragmatic way of managing rights because it is the use of the content that is being controlled.  If there are different classes of use you need different versions of the document with different security profiles rather than trying to alter use controls through the definition of the user.  That leads to an impossibly complex system that is error prone both in implementation and administration.

Summary of cloud systems & document security

So cloud based systems can be exceptionally powerful in enabling the storage and access to information.  But they are not without their problems.

Document access control has to go a lot further than typical access control and encryption mechanisms if you are going to provide appropriate protection to the content of documents that you store and make available through the cloud.  DRM technologies with the granularity of features described, offer a pragmatic way forwards that allows you to take advantage of the conceptual benefits of cloud storage without exposing you to the potential security risks that cloud systems can create.

   FAQs

Is adobe cloud secure enough for sensitive documents?

Not at all. Adobe document cloud security is dependent on the security of users’ accounts. Account credentials can easily be shared, socially engineered, brute forced, etc. Additionally, once users download a document from the cloud, it uses the Adobe permission system for content restrictions, which are trivial to remove. For more information on this, see Adobe Experience Manager & Cloud Document Security.

How do people keep a sensitive document secure in the cloud?

By protecting them with a DRM solution before they upload them. Otherwise, anybody a user shares the document with will be able to edit, copy, and print it, as well as share it with others.

What is the best cloud-based service for secure documents for subscribers?

No cloud-based service is going to give you perfect security since its controls must be enforced (at least partially) through code in the user’s browser. This means controls can be manipulated with the browser’s developer mode to enable copy and paste, unrestricted printing, etc. Additionally, to our knowledge, no cloud-based solution successfully prevents screenshots. It is better to protect your documents before you upload them to a cloud service instead.

Tags: cloud document protection, cloud security, data loss prevention, document drm, document encryption, document protection, document security, protect documents
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Which documents should be protected? Link to: Which documents should be protected? Which documents should be protected?Link to: Access controls, encryption or DRM for Document Security? Link to: Access controls, encryption or DRM for Document Security? Access controls, encryption or DRM for Document Security?
Scroll to top Scroll to top Scroll to top