Security and Cloud Computing
Cloud computing and its potential for powerful computing and data storage options offer small businesses at very competitive prices bootstrap have a lot of enthusiasm generated in the sector. Both, however, that the critical questions on the safety of data stored in the cloud "are often overlooked by its most passionate users. 'S understandable, because the emphasis names behind some of the largest cloud computing projects around the world. (Google Apps anyone?) If you like Cisco and Oracle are betting their future activities and activities to cloud computing, but it must be hot out all the kinks have been drawn up, right? Or at least, as the top priority must be security for them, given their enthusiastic approach to network security in general, and that everyone can enjoy the trickle-down effect of their tireless efforts to get our data from violations of all firewall security.
Right?
Well, yes and no.> Cisco CEO John Chambers has been so much in a speech in 2009 that while cloud computing presents many opportunities but is also a "security nightmare." And with good reason. Some of the security problems that providers of information technology needs to address to allay the fears of cloud clients include:
tenancy issues. Cloud Computing is, by definition, common data management includes the towns with a number of users and distributed to several companies.They must be able to assure customers that business users of another company will not be able to access - accidentally or otherwise - and their account information.
data loss and recovery. What happens in case of a disaster that results in loss of data? The provider has a strict and regularly tested backup solution to ensure data recovery? If a problem occurs in a customer's account that result in loss of data, the supplierhave security systems fail to provide a devastating domino effect occurs that is not leading to loss of customer data for their other? What happens if the cloud computing provider goes out of business is purchased or acquired by another company, or in case of failure? How close to its customers the assurance that their sensitive corporate data, or data is not lost in the transition?
Filing and storage of information. Where are the data physically stored?If the server somewhere in Silicon Valley, Chicago, or Bangalore, India? Who provides its hosting services? If your hosting provider is a third, the Cloud Computing provider properly checked his credentials to ensure compliance with industry standards for data security?
safety testing and updates. How often is the software platform or updated? How often do you feel? During and after the test, the provider must have systems in place to ensure that all updatesadjustments or safety violations result? We want to ensure that unauthorized users - from your company, your supplier or a third party - not by chance have access to your data.
Compatibility of different security policies. If your organization has also established a security policy with regard to sensitive customer and company information, differs from that offered by the provider? The provider is ready to meet your internal standards ofSecurity? What about third parties with whom the provider is in and who are involved in some way with the service? It will be for your company standards as well?
problems of collaboration. One of the most interesting advantages of the users of cloud computing is the ability to promote cooperation among his own, both with internal staff or external parties. If the software or platform providers have systems and measures for cooperation, which have affectedSecurity?
human resource issues. If providers have access to information within your company? Who is responsible for data security? If they are made available to you to solve any problems? May more properly questions for your satisfaction? What is their experience and background of corporate data and network security?
relationship and frequency of inactivity. How many times the company experienced server downtime? If theytheir downtime reports available in order to examine the reliability of their network? Have systems to ensure that data are secure and that unauthorized users do not have access to your account during and after the idle time?
Cyber Attack Defense. 'Inevitable that the next challenge for large cloud cyberattackers drooling over the large amount of sensitive information concentrated in a handful of ComputingServices, all available on the web. How does the provider plan to potential cyber-address because it's only a matter of time, if not, try an attacker to run on their network?
This list is just the beginning. The best cloud computing providers spend most of their waking hours - and I am willing to bet a couple of hours of their dreams, too - think about security issues and how they can given the increasing threats that can be pro-activetheir customers' business of compromise and destroy the confidence and belief that they have established with their audience. There is an ongoing conversation that we are looking at us very Mothernode, is a part, and that use by our industry for the foreseeable future.
Danos tu comentario
Post a Comment