preview

Cloud Security : Treacherous 12-Top Threats

Better Essays

The cloud era has evolved to become the engine of enterprise technology innovation but, this advancement has also made us vulnerable to security issues related to cloud. Although moving to cloud has provided us with benefits like reduced IT costs, Scalability, access to automatic updates, collaboration efficiency and many more, yet it also requires business level security policies. And in the absence of these policies, companies become susceptible to security or data breaches. Considering both the gains and harms related to the cloud world, Cloud Security Alliance(CSA) has set some cloud security standards throughout the industry. The report “Treacherous 12 - Top Threats” is an important research artifact done by the CSA. Though there are …show more content…

This breach can be a deliberate attempt, a result of poor security or a result of human error. An organization’s cloud data can be a useful entity for different people for different reasons. Major concern for an organization is unauthorized insiders getting access to data stored on the cloud. Other security alerts could be seeking financial data or private information for unlawful activities. Business rivals seeking trade secrets or copyrighted information. Although these security issues are not solely for cloud computing, it can happen in regular corporate world as well, but cloud is highly accessible and entirely through internet network which makes it an easy target. In many countries, there are certain laws made to ensure that private and sensitive information is highly protected. Because more sensitive the data, more is the damage. When a breach occurs, company can face criminal charges and must bear the related costs and inform customers who are affected. Then there are consequences related to the brand value, it gets hard to retain the customers. So, companies using cloud can keep their data secure using MFA (Multi Factor Authentication) and Encryption. Examples: • BitDefender and Anthem in 2015, had its customers security credentials stolen because of a security loophole. • TalkTalk in 2014 & 2015 experienced theft of 4 million customer’s personal information due to its failure to encrypt customer data. 2. Insufficient

Get Access