Should Cloud Computing Service Providers Screen Potential Customers?

Should Cloud Computing Service Providers Screen Potential Customers?

The World Wide Web is full of articles advising consumers on what they should look for when choosing a cloud provider, how they should negotiate contracts with providers, what danger signs they should be aware of and a plethora of other advice. However, an extremely illuminating article that I read recently on IT World (See: What should cloud providers know about their customers?) made me think from the other side of the fence – “Should cloud computing service providers screen potential customers?”

Many would consider this line of thinking ludicrous. After all, what business it is of cloud providers to screen customers, as long as they pay for services rendered? Do other sellers of goods or services screen customers? Turns out, many do. If you were to go to a bank and open a safe deposit box, the bank will definitely run a background check even if they don’t scrutinize what you actually keep in that deposit box. Whether we like it or not, we live in dangerous times where criminals and terrorists are getting increasingly sophisticated by the day. Therefore, vetting customers who would be granted access to systems that are used by other customers to store confidential and proprietary information may not be unreasonable.

There are other considerations at play here. Under the PATRIOT Act, American investigating agencies have sweeping powers of search and seizure that extend to the realm of cloud computing as well. Whether we like it or not (See: Is Cloud Computing a Threat to Consumer Rights? ), whether it adversely affects business or not (See: Your Data in Australia is subject to the US Patriot Act), companies have to follow the law. While I am not a lawyer, I am sure that the FBI wouldn’t look kindly on a cloud provider who takes on a terrorist organization as a customer.

Finally, there’s the matter of being accountable to shareholders and other customers. All cloud computing companies have terms of service that must be adhered to. In that light, preemptive screening may actually help reduce monitoring costs and prevent Amazon’s WikiLeaks fiasco (See: Cloud Computing and WikiLeaks: Was Amazon’s action justified?). Please note that I neither endorse nor condemn Amazon’s actions in this regard, but am trying to present a balanced opinion.

As it happens, some companies are already thinking along these lines. The aforementioned article that set me thinking mentions a blog post (See: IBM Vets IaaS Customers To Ensure Security) which reported an interview with an IBM executive who was quoted saying, “An individual can’t simply sign up with a credit card” to use IBM services. Rich Lechner, vice president of cloud for IBM’s Global Technology Services unit, stated that IBM monitors the identity of each customer using its cloud service so that they know “who is in the building.”

Other organizations did not categorically deny such screening. Amazon Web Services spokesperson Kay Kinton had responded to an email saying, “We do not inspect customer data,” but then mentioned the use of “sophisticated screening up front to protect against fraud and abuse before customers are allowed to consume our services and then to scale.”

Personally speaking, I would not be surprised if some screening procedures are already in place. As for the justification of such actions, I will let you decide.

By Sourya Biswas

Sorry, comments are closed for this post.

4 Things To Know Before Virtualizing Your Desktops

4 Things To Know Before Virtualizing Your Desktops

Forrester Research: The Keys to a Successful Deployment Desktop virtualization projects are transformational. They can dramatically minimize IT costs while better empowering workers with more ubiquitous access to the applications and data they need to be productive. In fact, according to recent research by Forrester, worker productivity when working remotely across multiple devices, increased 51%…

The Success Formula For Private Cloud Deployments

The Success Formula For Private Cloud Deployments

OpenStack For Private Clouds On February 15th Tom Bittman of Gartner published a blog which asserted that 95% of Private Clouds are Failing. When an industry analyst makes a statement that big, in one of the top three priorities for enterprise CIOs today, it’s critical that we as an industry step back and understand how we…

Medical Professionals Face Unique Challenges Using The Cloud

Medical Professionals Face Unique Challenges Using The Cloud

Medical Professionals Using The Cloud The presence and value of Cloud tools have seeped into virtually every industry, and the medical profession is certainly no exception. However, because of the special rules regarding patient privacy, specifically those found in HIPAA, people handling patient information must follow specific guidelines that in many cases, are violated by…

Are You SURE You Are Ready For The Cloud?: Financial

Are You SURE You Are Ready For The Cloud?: Financial

Are You Cloud Ready: Financial In my previous article, I discussed several different points about moving to the cloud. A lot of companies do it for many reasons, but the majority of them in my experience normally come down to two major reasons: 1) Financial 2) Security of business. The security tab isn’t the same…

Where Is The Tipping Point For The Flying Drone Market?

Where Is The Tipping Point For The Flying Drone Market?

The Flying Drone Market In the past year I have written a number of articles here on CloudTweaks about Drones. I enjoy flying drones. One thing I’ve used my drone for is proving I didn’t need to do the worst fall maintenance job ever. Cleaning the gutters of the house by flying the drone around…

Immune Systems: Information Security And Risk In 2016

Immune Systems: Information Security And Risk In 2016

Information Security And Risk C-suite executives have woken up to the threat posed by data theft, denial-of-service attacks and vulnerable systems. In 2015, for example, a series of high-profile cases illustrated the degree to which such attacks can damage a company’s reputation, brand and, ultimately, profits. Where businesses once undervalued cybersecurity, considering it the domain of CIOs and…

Automation of Access Management Means a Happier IT Staff

Automation of Access Management Means a Happier IT Staff

Automation of Access Management One of tasks that your IT department probably really dislikes is managing the in-house and cloud user accounts and passwords for all of the employees in the company. Though this is usually an easy task, it is extremely mundane and time consuming, especially for a company that has frequent movement of…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor