Where and how our data is composed, processed, accessed, stored, backed up and destroyed is, what is sure to become massively overlaid cloud-based services and ‘by whom’ and ‘using whose infrastructure’ solely yields significant concerns related to security, privacy, compliance and survivability.
This paper will show multiple cascading ‘levels of failure’ associated with relying on cloud based infrastructure including exposing ‘flawed assumptions’ and ‘untested theories’ as it relates to security, privacy and confidentiality in the Cloud with some unique attack vectors.
This publication will also address varied critical areas of concerns, when securing cloud infrastructure services and managed enterprise applications, thus providing the acumen towards mitigating the risk of being vulnerable against the perpetrating alarming attacks.
A managed cloud deployment definitely offers the opportunity for the enterprise to build in security from the ground up. In fact, it will be seen in this publication that properly configured and managed, enterprise security in the cloud may be greater than what they could achieve on their own.
It shouldn’t be believed that security should be a more of a concern in the cloud environment then it is in an in-house environment. It’s really a matter of “have one identified clearly what they are trying to achieve?” and “have they recognized clearly the procedures that are required to protect the environment?”. Thus, more analyses including these could be critically evaluated through this paper.