{"id":35083,"date":"2014-03-31T08:17:57","date_gmt":"2014-03-31T08:17:57","guid":{"rendered":"http:\/\/cloudtweaks.com\/?p=35083"},"modified":"2023-10-21T06:07:31","modified_gmt":"2023-10-21T10:07:31","slug":"security-concerns-online-security","status":"publish","type":"post","link":"https:\/\/cloudtweaks.com\/2014\/03\/security-concerns-online-security\/","title":{"rendered":"Concerns With Online Security"},"content":{"rendered":"

Cloud security is an evolving sub-domain of information security dedicated to the protection of data, applications and infrastructure values associated with cloud computing. It incorporates a broad set of policies that are driven by the security procedures for providing maximum level of assurance for customers of cloud services.<\/p>\n

Concerns with Cloud Security<\/h1>\n

Cloud computing is providing new horizons for maintaining organizational assets. But with ease and the convenience also comes the challenge to secure enterprise data. The biggest reason that raises concerns for security is involvement of third parties, i.e. cloud Service Providers who can access data stored at remote locations.<\/p>\n

Being a form of distributed computing, cloud computing is still waiting for proper standardization. While migrating to cloud services , there are a number of factors to be considered by organization. The organizations need to understand the key benefits along with the risks associated with adopting a particular solution or a service provider. As an evolving security and technological arena, the assessment of risks<\/a> and benefits keeps on varying depending upon the advancements that are brought by new technological implications.<\/p>\n

Cloud security is a shared responsibility model between cloud service provider (CSP) and clients associated with the same. It is important to note that not all cloud service providers provide equal amounts of security measurements and other operational and managerial functions. This should be clearly agreed , defined and discussed between service providers and customers.<\/p>\n

More and more organizations are migrating towards the cloud and enjoying the benefits of various service providers. Enterprises are embracing economic and operational advantages of cloud for extending their business to larger scales. But cloud providers like AWS need to meet key security requirements for organizations to be able to trust them with their most confidential data.\u00a0As malicious attackers are becoming more sophisticated, they are finding new ways to target applications and that data of enterprises. The attacking intentions are fed by the fact that cloud has some architectural flaws inherited from its parent applications that can be easily exploited for one\u2019s own gains. At an unprecedented rate, enterprises tend to shift their resources to cloud. There are many security threats that cloud data is vulnerable to.<\/p>\n

Some of them are listed below.<\/strong><\/p>\n