Top Threats For Cloud Computing

Top Threats For Cloud Computing

Cloud computing reached the point where computing functions as a utility. Here are the top cloud computing threats to help organizations better understand them and make the best choices for their businesses.

Threat no 1: Security threats

With cloud computing managing critical enterprise data, are enterprises and individuals possible victims of hacking and data loss? Although it is not a very common issue, this may occur. For this reason, adoption of cloud computing within industries such as healthcare and finance is not recommended by some. Some providers encrypt data at rest and have backups for customers’ data on tapes or disk drives, and destroy these after a while.

Threat no 2: Outages

Some of the most common outages that may occur are: data backup, down times, and data centers going offline. The good thing is that cloud outages can be predicted. The best method to solve problems with outages is to prevent them. I offered some examples of common outages and how to prevent them in the blog article What are the most common cloud outages and how to prevent them?.

Threat no 3: Malicious Insiders

Malicious insiders are dangerous both inside organizations and with cloud providers. A cloud provider may not reveal the type and level of access to physical and virtual assets of their employees or how it analyzes and reports on policy compliance. So, this means that the level of access granted could enable a malicious insider to harvest confidential data or gain control over the cloud services. However, this kind of information can be detailed in the Service Level Agreement and audit reports, if the customer asks for it.

Threat no 4: Lack of information

Although it may not look like a threat, lack of information regarding where the data center is stored, or what levels of security a data center has, may influence in a negative way cloud computing. I would also like to add this point as a lack of sufficient standards, because for both of these issues I see similar solutions. Although standards are established by worldwide recognized organizations, they are mentioned in the SLA (Service Level Agreement). So, in order to be informed about where your data is located and how it is managed, try to sign a detailed SLA with the provider. I also recommend you to read further on this topic in the Working on a cloud software Service Level Agreement blog article.

Where there is a threat, there is also a solution – at least most of the time. So, what are the top threats for cloud computing you confronted with? And what are the solutions you found?

By Rick Blaisdell / RicksCloud

Follow Us!

cloudtweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Comments

  1. sarojkar says

    Cybercriminals are always one step ahead of the latest developments in Internet and cloud computing is no exception. The threat is based on the ability of these cyber criminals to infiltrate networks and cloud providers, with most venerable are registration and validation processes, and credit card fraud. Other likes, by sharing technologies you are sharing risk too. Virtualization is the example as it allows multiple companies (eg clients of a cloud provider) share resources and applications over a single piece of hardware. In addition, you can not always trust the cloud provider’s employees.

  2. sarojkar says

    Cybercriminals are always one step ahead of the latest developments in Internet and cloud computing is no exception. The threat is based on the ability of these cyber criminals to infiltrate networks and cloud providers, with most venerable are registration and validation processes, and credit card fraud. Other likes, by sharing technologies you are sharing risk too. Virtualization is the example as it allows multiple companies (eg clients of a cloud provider) share resources and applications over a single piece of hardware. In addition, you can not always trust the cloud provider’s employees.

    • says

      I think the most dangerous treat for cloud system is the security threat.  Will all these hacking news coming out everywhere and all over the web, business owners are getting anxious and nervous for their business security .  I have to agree that cyber criminals have their own ways to get inside a system, so cloud should really be careful about this threats by boosting their security levels.

      • AbbasSarfraz says

         @cloud computing  I do like to extend this list further with few additional threats which might be directly or indirectly related to the one pointed out by you;
         
        5. Insecure Vendor API’s: Weak API’s can prove be a vulnerability point for malicious intruders. 
         
        6. Colocation/Data Amalgamation: Though most are tightly coupled, your data can be mixed with others and vice versa.
         
        7. Identity Theft: Cloud vendors hold most of your private data and it can subject to be used without intimation. 
         
        8. Regulatory Compliance: Is your cloud vendor complying with all the Government and/or industry standards and regulations?
         
        9. Forensic Support: What kind of support is available in-case of a breach? Does the vendor allows your intervention for a joint investigation?
         
        10. Geographic Location of data/services: Where in the world does your data physically exist? 

  3. AbbasSarfraz says

     @cloud computing  I do like to extend this list further with few additional threats which might be directly or indirectly related to the one pointed out by you;
     
    5. Insecure Vendor API’s: Weak API’s can prove be a vulnerability point for malicious intruders. 
     
    6. Colocation/Data Amalgamation: Though most are tightly coupled, your data can be mixed with others and vice versa.
     
    7. Identity Theft: Cloud vendors hold most of your private data and it can subject to be used without intimation. 
     
    8. Regulatory Compliance: Is your cloud vendor complying with all the Government and/or industry standards and regulations?
     
    9. Forensic Support: What kind of support is available in-case of a breach? Does the vendor allows your intervention for a joint investigation?
     
    10. Geographic Location of data/services: Where in the world does your data physically exist? 

Add Comment Here