Skip to main content

How to avoid security pitfalls of Cloud Computing?

Steve, CTO at Secerno has written a neat article on security around CC.

Demystifying cloud computing

The realities of cloud computing are that it is driven by economics; and reducing cost does not always mean an improvement in security. Securing data isn't an easy task and exposing services and moving data outside an organisation does not automatically make data security easier, it can actually make it more complex. Those adopting cloud computing must remember it is the responsibility of the data owner, not the service provider to secure valuable data.

There are many myths surrounding the security of cloud computing, which need to be addressed to enable businesses to get the full benefits of this technology. Design and implementation of access controls is just as important and easy to get wrong in-the-cloud as it is in any IT system, but exposure to remote attackers is higher in-the-cloud, accentuating the risks. There is a perception that cloud computing removes data compliance pains, however it should be clear that the data owner is still fully responsible for compliance. Furthermore, concentrating several companies' mission critical data in a single location provides an enriched target that will inevitably attract the forces of e-crime. Hackers only have to get lucky once – the cloud must defend the data from all misuse – a tough job!

Cloud computing is not necessarily more secure; applications with years of expert development still contain undiscovered vulnerabilities that can be a risk to data security. There is insufficient evidence that cloud computing providers have got it right yet; nor for that matter, have the organisations in determining and enforcing which users have access to what.

Cloud applications undergo constant feature additions and users must keep up to date with the application improvements to ensure they are protected. This means that users have to constantly upgrade as an older version will not function, or protect the data.


Source

Comments

  1. Wow, where to start...

    Not for nothing, but I'm not sure this article demystified anything other than the fact that re-hashing the same privacy arguments brought forward by SaaS years ago is certainly a new trend.

    I do take argument with this statement however:

    "Those adopting cloud computing must remember it is the responsibility of the data owner, not the service provider to secure valuable data."

    ...actually it's the responsibility of BOTH parties. If it isn't, the folks negotiating your partner contracts ought to look for other work. BOTH parties are stewards of the information and should exercise due care in protecting it.

    Further, it's really odd that somehow the "cloud" means "massively distributed." That's not really the case with most SaaS offerings re-branded as "cloud offerings." There are LOTS of clouds, but that doesn't mean they are interconnected, federated or widely distributed outside of the datacenters serving them.

    OK, I sense a blog post coming...

    /Hoff

    ReplyDelete
  2. Wow, where to start...

    Not for nothing, but I'm not sure this article demystified anything other than the fact that re-hashing the same privacy arguments brought forward by SaaS years ago is certainly a new trend.

    I do take argument with this statement however:

    "Those adopting cloud computing must remember it is the responsibility of the data owner, not the service provider to secure valuable data."

    ...actually it's the responsibility of BOTH parties. If it isn't, the folks negotiating your partner contracts ought to look for other work. BOTH parties are stewards of the information and should exercise due care in protecting it.

    Further, it's really odd that somehow the "cloud" means "massively distributed." That's not really the case with most SaaS offerings re-branded as "cloud offerings." There are LOTS of clouds, but that doesn't mean they are interconnected, federated or widely distributed outside of the datacenters serving them.

    OK, I sense a blog post coming...

    /Hoff

    ReplyDelete

Post a Comment

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Virtualization: GlassHouse hopes to cash in with its IPO!

GlassHouse Technologies Inc. on Tuesday registered to raise as much as $100 million in an initial public offering that, despite the company's financial losses, could prove a hit with investors drawn to its focus on "virtualization" technology. The Framingham, Mass., company offers consulting services for companies that use virtualization software to improve the performance of corporate servers and cut costs in their data centers. GlassHouse also provides Internet-based data storage. "Software-as-a-service," or SaaS, companies and vendors of virtualization products have proved popular among investors in recent years as corporate customers seek alternatives to conventional packaged software. GlassHouse, with roots in both sectors, will test the strength of that interest, said Peter Falvey, managing director with Boston investment bank Revolution Partners. "It will be a bit of a bell weather," he says. "It's not as though it's the 15th SaaS m...