What's different about Cloud Computing

My blog posting yesterday, criticising the Cloud Security Alliance’s paper on Top Threats to Cloud Computing created a few comments and discussions on whether the risks are actually any different from other forms of in-house or outsourced computing. Here’s my take. 

Cloud computing is a rich subject, with many variants of service delivery and service usage. The risks vary considerably, but one thing is guaranteed: you lose visibility and control of what’s happening to your data. 
From a threat perspective, the only difference is that a large collection of data will attract attacks that an individual organisation might not. From a vulnerability perspective the main difference from conventional outsourcing is that you’re buying a standard service, so you can’t expect the same scope for due diligence inspections, negotiation of terms and personalization of security. 
For more on this, look out for my forthcoming book “ Managing Security in Outsourced and Off-shored Environments: How to safeguard intellectual assets in a virtual business world” expected to be published by BSI in May. The book has a most attractive cover, featuring a clown fish in a sea anemone. The clown fish is one of very few species of fish that can avoid the potent poison of a sea anemone, so it’s an appropriate analogy.

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Cloud computing makes infrastructure and services of the organization to be available as per the requirement basis. It does not involve long term commitments and assignments.
Cancel

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close