Wednesday, 4 January 2012

Mail platform

Security Challenges for Cloud Computing - How Prepared Are You?

Cloud computing is here, and has been embraced by lots of an home business. Cloud computing as defined by the US National Institute of Standards and Technologies (NIST) is "a model for enabling handy, on-call for network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be quickly provisioned and released with minimal management effort or service provider interaction." [1]. Cloud computing is fundamentally about outsourcing IT resources just like you would outsource utilities like Electrical energy or water off a shared public grid. The cloud services possibilities incorporate:

Computer software as a Service (SaaS): Whereby the customer makes use of the cloud provider's applications operating on a cloud infrastructure and the applications are Out there from a great number of customer devices by way of a thin customer interface which includes a internet browser (e.g., internet-based e-mail).

Platform as a Service (PaaS):Here the customer deploys their own applications on the provider's infrastructure. This alternative enables the consumer to develop home business applications and bring them web based rapidly they involve services like, E-mail Campaign management, Sales Force Automation, Employee management, Vendor management and so on...

Infrastructure as a Service (IaaS): The client has access to processing, storage, networks, and other fundamental computing resources where the client is able to deploy and run arbitrary Computer software, which can consist of running systems and applications. The customer does not manage or manage the underlying cloud infrastructure but has manage more than running systems; storage, deployed applications, and possibly restricted manage of selected networking components (e.g., host firewalls).

Cloud computing has turn into fashionable considering, Enterprises are consistently seeking to cut expenses by outsourcing storage, Computer software (as a service) from third parties, permitting them to concentrate on their core business enterprise activities. With cloud computing, enterprises save on setting up their own IT infrastructure which would otherwise be pricey in terms of initial investment on hardware and Computer software, as nicely as continued upkeep and human resource expenses.

According to the Gartner report on cloud security [two], Enterprises demand new skill set and to manage the issues of cloud security. Enterprises demand to see to it that their cloud service provider has most of "the boxes ticked" and that they have their security issues addressed. Cloud computing getting a somewhat a new field of IT with no precise standards for security or information privacy, cloud security continues to give managers with a great number of difficulties. There is demand for your provider to be able to address some of the concerns that come up which includes the following:

Access manage / user authentication: How is the access manage managed by your cloud service provider? To be alot more precise, Do you have selections for function based access to resources in the cloud,? How is the process of password management handled? How does that compare to your business enterprise's Data security policy on access manage?

Regulatory compliance: How do you reconcile the regulatory compliance concerns concerning information in a completely varied nation or place? How about information logs, events and monitoring choices for your information; does the provider let for audit trails which may be a regulatory requirement for your company?

Legal concerns: Who is liable in case of a information breach? How is the legal framework in the nation where your cloud provider is based, visa vi your own nation? What contracts have you signed and what concerns have you covered/discussed with the provider in case of legal disputes. How about nearby laws and jurisdiction where information is held? Do you know where you information is stored? Are you conscious of the conflicting regulations on information and privacy? Have you asked your provider all the suitable concerns?

Information safety: Is your information safe in the cloud? How about the concerns of Man-in-the-middle attacks and Trojans, for information moving to and from the cloud. What are the encryption possibilities supplied by the provider? A further imperative question to ask is; who is responsible for the encryption /decryption keys? [three]. Also you will uncover that cloud providers work with a lot of other third parties, who may well have access to your information. Have you had all these issues addressed by your provider?

Information separation / segregation: Your provider might be hosting your information along with many other customers'. Have you been given verifiable assurance that this information is segregated and separated from the information of the provider's other customers? According to the Gartner report, its a very good practice to discover out "what is completed to segregate information at rest," [two]

Enterprise continuity: What is the acceptable cloud service down time that you have agreed with your provider? Do these downtimes compare properly with your home business acceptable down time policy? Are there are any penalties/ compensations for downtime, which may well lead to home business loss? What measures are in location by your provider to assure home business continuity and availability of your information / services that are hosted on their cloud infrastructure in case of disaster? Does your provider have choices for information replication across various internet sites? How very easy is restoring information in case a demand arises?

Cloud services providers have elevated their efforts in addressing some of the most pressing concerns with cloud security. In response to cloud security concerns, an umbrella non-profit home business known as the Cloud Security Alliance was formed, some of its members incorporate: Microsoft, Google, Verizon, Intel, McAfee, Amazon, Dell, HP, amongst other people, its mission is "To promote the use of finest practices for delivering security assurance inside Cloud Computing, and provide education on the makes use of of Cloud Computing to support safe all other types of computing" [four]

As additional and extra organizations move to the cloud for internet-based applications, storage, and communications services for mission-imperative processes, there is require to make sure that cloud security concerns are addressed.

References

1. National Institute of Standards and Technologies, N., Cloud Computing definition, I.T. Laboratory, Editor. 2009.
two. Gartner (2008) Assessing the Security Risks of Cloud Computing
three. Rittinghouse, J.W. and J.F. Ransome, Cloud Computing: Implementation, Management, and Security. 2009., New York: Auerbach Publications.
four. Alliance, C.S. Cloud Security Alliance. 2011; Out there from: https://cloudsecurityalliance.org/.

About the Author

Mr. Thomas Bbosa, CISSP, is an Data Systems security Consultant and Managing Partner with BitWork Consult Ltd - (http://www.bitworktech.com) a top East African IT security consulting firm based in Kampala, Uganda.

No comments:

Post a Comment