preview

The Uses Of Cloud Computing

Decent Essays

The use of cloud computing expands the risk of insider access not only to the staff of cloud service company but also the consumers of the cloud services. A good example can be drawn from the denial of service attack launched by a malicious insider as demonstrated by a well-known Infrastructure as a Service (IaaS) cloud infrastructure (Sense Post: , 2009). The insider access risk can be mitigated by deploying technical and administrative procedures that will monitor the activities of the users with access to the cloud infrastructure. An example of such procedures include access reviews for users with especially high risk access rights (such as execute access rights to data objects). These control procedures may be monitored by a third …show more content…

The base cloud service provider here is the provider who provides the primary cloud services with which the other service providers build their services on. The use of composite cloud services generates the risk of control over the third party services. The cloud service provider is required to disclose the relationship with other third parties and terms of service involving the third party should be clearly defined. The cloud service provider should provide an assurance of how liability and performance will be achieved in the composite cloud services. The service agreements should be developed based on the performance capabilities of all the nest cloud service providers. o Visibility – The use of cloud services requires an organization to hand over the security management procedures of the systems with which the organization’s data and applications operate on to the service provider. Management and technical security control measures of the service provider should be in alignment with that of the service consumer to ensure that the security objectives of the consumer is achieved. Research on metrics for comparing the security procedures and controls between the consumer and service provider is still underway (Jansen, Directions in Security Metrics Research, 2009). An ideal procedure for gaining visibility of security requires the service provider to disclose details about their security and privacy measures to the consumer. Service providers are however sceptical

Get Access