Committed to a cloud provider can lead to significant cost savings and more streamlined, flexible operation. However, confidence in the provider to keep your data safe can be another matter entirely.
Cloud Computing
Cloud computing will open up a new world of opportunities for business now, but mixed with a lot of opportunities and security challenges need to be considered and addressed before committing to a cloud computing strategy. Cloud computer security challenges fall into three broad categories:
Data Protection: Secure your data at rest, in transit
User Authentication: Restrict access to data and monitor who accesses data
Disasters and data Breach: Contingency Planning
data Protection
Implementing a cloud computing strategy means putting critical data in the hands of a third party, to ensure that data remains protect both rest (data resides on storage media) as well as in transit is very important. Data should be encrypted at all times, with clearly defined roles when it comes to who will be managing the encryption keys. In most cases, the only way to really ensure the security of the data is encrypted on the server hosting provider's cloud computing to customers who own and manage data encryption keys.
User authentication
rest in cloud data needs to be accessed by those authorized to do so, making it important for both limited and monitored who will be visiting access to corporate data via the cloud. To ensure the integrity of user authentication, companies need to be able to view the log data access and inspection to verify that only the right users have access to the data. The access logs and audit trails should also be secured and maintained until the company needs or requirements for lawful purposes. As with all security challenges of cloud computing, it is the responsibility of the customer to ensure that providers of cloud computing have taken all necessary security measures to protect data client and the access to that data.
Contingency Planning Council based cloud cloud users with the cloud serves as a centralized repository of data unique to the importance of companies, the risk of having the data compromised by a data breach, or is temporarily unavailable due to implementation of a natural disaster is real concern. Much of the responsibility for the breakdown of the data in a cloud eventually belong to companies with mission-critical operations depend on data that, although responsibility can and should be negotiated in contract with the service provider before committing. A comprehensive security assessment from a neutral third party is strongly encouraged as well. These companies need to know how their data is secured and measures service delivery will be done to ensure the integrity and availability of data should the unexpected happen. In addition, companies also need to have contingency plans in place in case of providing its cloud services fail or go bankrupt. The data can be easily retrieved and moved to a new service provider or a non-cloud strategy if this happens? And what happens to data and the ability to access data if the vendor is acquired by another company? Abstract Cloud Computing Security While there are real benefits for the use of computing cloud, including a number of important security advantages, there are also many security challenges, if not prevent customers from committing to a cloud computing strategy. Ensure that your data is safely protected at rest, in transit, restrict and monitor access to data through user authentication and access logging, and adequate planning for very real possibility of the data is compromised or inaccessible data due to violations or natural disasters are all major security challenges that a company must address when considering the electricity supplier cloud. Congratulations! Now you have a better understanding of the security challenges related to cloud computing!
đang được dịch, vui lòng đợi..
