Fathoming the cloud

Silver Linings

Coordination

A final component of the Cloud Security Alliance is coordination. A number of other related security efforts are in place. The Trusted Cloud initiative, for example, specializes in Identity and Access Management. If you think you have too many passwords now, just wait until everything is a service. Governments and companies have also started creating cloud security groups. Without coordination, a whole lot of wheel reinvention will be going on, and, chances are, not all of the wheels will work.

Conclusion

The cloud is definitely not for everyone. A lot of technology forces are pushing and pulling against cloud computing: high-speed Internet, faster computers, and better software tools. The business side has the potential to reduce large expenditures in favor of smaller, but more frequent, costs. (Guess which one your manager will want to pick, even if it doesn't make technological sense?). As they say in Latin, Praemonitus praemunitus (forewarned is forearmed).

Infos

  1. Cloud Security Alliance: http://www.cloudsecurityalliance.org/
  2. Hype cycle: http://en.wikipedia.org/wiki/Hype_cycle
  3. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1: http://www.cloudsecurityalliance.org/csaguide.pdf
  4. PCI Data Security Standards Documents: https://www.pcisecuritystandards.org/security_standards/documents.php
  5. Security Guidance – Portability and Interoperability: https://wiki.cloudsecurityalliance.org/guidance/index.php/Portability_and_Interoperability

Buy ADMIN Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Securing Your Data In The Cloud: an insiders perspective

    As the increasing use of cloud computing and other technologies is changing the world of data management, keeping your data private and secure is an ongoing concern for everyone. Memset, a cloud computing Infrastructure as a Service (IaaS) provider gives an insider’s perspective on what you should be doing to keep your data safe.

  • Delivering Cloud Services: Five Essentials for Success

    You can meet the challenges of delivering cloud services successfully and profitably, if you have the right identity management capabilities. This paper outlines the five infrastructure essentials for successfully delivering cloud services to a rapidly growing customer base. You'll learn how these essentials can benefit both you, the cloud services provider, and your customer, the cloud services consumer – to your ultimate economic benefit. Plus, we'll outline why traditional identity management infrastructures fall short, and how a new approach is the key to building the essentials into your business.

  • Getting started with the OpenStack cloud computing framework
    OpenStack brings common virtualization technologies such as KVM, Xen, Hyper-V, and QEMU into the cloud.
  • Can you trust the cloud?

    Everything you need to know about cloud security.

  • Setting up an OpenNebula Cloud
    The OpenNebula cloud middleware system is one of the easiest private clouds in the sky. We'll show you how to get started.
comments powered by Disqus