Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance by Tim MatherYou may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, youll learn whats at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure.
Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. Youll learn detailed information on cloud computing security that-until now-has been sorely lacking.
Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability
Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services
Discover which security management frameworks and standards are relevant for the cloud
Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models
Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider
Examine security delivered as a service-a different facet of cloud security
The Top 5 Security Risks of Cloud Computing
Nevertheless, the best known companies in the IT field offer or will shortly offer Cloud Computing services to a range of customers from organisations of all sizes to individuals. Gmail, Google Docs, Google Calendar . Cloud Computing is often marketed as an efficient and cheap solution that will replace the client-server paradigm. For this reason caution is advised when deploying and using Cloud Computing in enterprises. With Cloud Computing rapidly gaining popularity, it is important to highlight the resulting risks. As security and privacy issues are most important, they should be addressed before Cloud Computing establishes an important market share. Many IT and important research agencies are aware of these risks and have produced reports and analyses to document them , ,  ,.
This publication discusses the risks associated with cloud computing and provides guidance on suitable mitigation strategies. Cloud computing offers potential benefits including cost savings and improved business outcomes for organisations. However, there are a variety of information security risks that need to be carefully considered. Risks will vary depending on the sensitivity of the data to be stored or processed, and how the chosen cloud vendor also referred to as a cloud service provider has implemented their specific cloud services. This discussion paper assists organisations to perform a risk assessment to determine the viability of using cloud computing services. This document provides an overview of cloud computing and associated benefits.
Cloud computing presents many unique security issues and challenges. In the cloud, data is stored with a third-party provider and accessed over the internet. This means visibility and control over that data is limited. It also raises the question of how it can be properly secured. It is imperative everyone understands their respective role and the security issues inherent in cloud computing.
Top 10 cloud security issues experienced with software-as-a-service (SaaS)
Privacy is a major concern for any organisation using the cloud. Handing over your data to others has always been something contentious and the more we do it, the more organisations are becoming nervous that the data is falling into the wrong hands. This article will cover major concerns that companies have when data is stored and processed in the cloud, and things that can be done to better protect against the threat vector. There are conflicting opinions as to who is responsible for security and privacy in the cloud. Some might like to place the responsibility on the provider, ultimately the responsibility for the security and privacy of the data lies with the data owner. If a security breach were to occur the organisation would be held liable for any damages, so to rely entirely on the service provider to protect and secure the data would be considered as being reckless. The organisation should ensure that the data that is being stored or processed in the cloud is secure, possibly by encrypting all data that moves into the cloud.