In the
computing world, cloud security is a sub-domain of Information security.
Cloud model is a type of distributed computing which includes services such as
IaaS (Infrastructure-as-a-service), SaaS (Software-as-a-service) and PaaS
(Platform-as-a-service). As the cloud structure is still not fully
standardized, it contains much inherent vulnerabilities. This paves the way for
network intruders to get access of customer credentials.
Here is the list
containing some of the security challenges commonly found under a cloud
environment.
Data Vulnerability
Most cloud platform vendor’s trumpet about the
robustness of their services, often claiming 100% data security of the enterprise
data. The fact was boasted on the basis of encryption services provided to
customer data before actually storing it on server space. Still the data can be
accessible to third party organizations (Cloud vendors) because of access to
decryption methods. Data vulnerability can only be prevented if a customer
encrypts the whole information at his end before finally transmitting data through
the channel.
Service Hijacking
The multi-tenant architecture of cloud is a real threat
for providing safe services to all customers. For example, if a hijacker gains
access to your account credentials, he can easily intercept, forge or act on
your behalf. Such distorted information can be used to redirect users to
malicious websites making them a victim of phishing attacks. To prevent service
traffic hijacking instances, organizations should deploy authentication
controls over their login credentials, in order to reduce the risk of data loss. A two-way authentication reduces the chances
of snooping in cloud systems.
Contract Management
In a cloud computing contract, software or hardware
resources are leased to customers. Only a single contract is required to acquire
software and hardware integration. Cloud contracts are known as service-level
agreements (SLAs). SLA generally focuses on the quality of network interaction,
but under shared architecture it becomes nearly impossible to deliver the
promised quality. Also, relatively low compensation is provided against service
breaches.
Lock-in Situations
Customers must be aware of the cost associated with
changing a business service from one platform to another. The switching cost
must be in your mind before finalizing a deal for cloud services on contract
basis.
No comments:
Post a Comment