
Assess Security Risks with Cloud-Computing

What are the emerging trends that are going to shape the role of risk management in the future?
Cloud-computing solutions continue to evolve and get adopted by several organizations across the industry. Though there are plenty of security specific challenges, the benefits to organizations are huge, which includes high availability, scalability of the environment, with auto-scale capabilities, flexibility, choice of environments, and more. All the factors mentioned above benefit the proposition that eventually directs to cost-reduction. The industry has different deployment models such as private clouds, public clouds, a hybrid as well as community clouds and different service models such as Infrastructure as a Service model, (IaaS), Platform as a Service (PaaS) and more. This is a tremendous opportunity but there is security risk associated with the cloud, which is left unnoticed some times.
What are the technological challenges that cloud-computing technology has been facing with regards to security and data handling?
Data stored in cloud-environments need specific care due to the large requirement of regulatory and legal frameworks. It also depends on different risk scenarios, such as when and where the data is exposed or how data is consumed while in transit. This isa not a new reality that organizations did not have to deal with before cloud-computing came into the picture. So, when considering security controls of the systems or the data center, they offer similar control strategies such as encryption and access controls that work in the cloud environment.
Data stored in cloud-environments need specific care due to complex regulatory and legal requirements
There are some security control aspects that are unique to cloud computing such as the security controls for virtualized environments, which involves attacks against the host system files and the hypervisors. Virtualization security in general is crucial as well as unique to the cloud systems.
New unique risks such as the vendor contract lock-in and privacy requirements that are driven by -geolocation of the data are also important and need to be accounted for in a cloud migration strategy.
So, business leaders, in particular, should have a clear cloud strategy that is capable of articulating not only the business value, roles and responsibilities between the firm and its cloud providers, but which is also inclusive of key governance and strong controls that mitigate security risks to the organization to an acceptable level. The focus of such strategy should be making the organization resilient. This means focusing on the organization’s ability to withstand, anticipate, respond, and later evolve from an attack, and build a resilient control stack rather than spending time avoiding every cyber threat, which is not only technically extremely difficult but also very costly.
What is the piece of advice that you would want to give to your industry peers?
The cloud risk management landscape has ample opportunities for learners and innovators alike. The field of cloud computing has changed the way corporations purchase and utilize technology. For instance, one renowned bank has announced it has moved away from physical data centers, and all its information is now on the cloud. However, as much as cloud computing brings a lot of innovation, the foundational elements haven’t changed in areas such as security, privacy, and risk and controls. Keysecurity controls such as encryption, access management, privileged accounts, data loss prevention might not be new,but they are revised, and need to be accounted for when adopting new technologies like cloud computing.
Check Out: Top Cloud Solution Companies
Featured Vendors
EDITOR'S PICK
Essential Technology Elements Necessary To Enable...
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
Comparative Data Among Physician Peers
By George Evans, CIO, Singing River Health System
Monitoring Technologies Without Human Intervention
By John Kamin, EVP and CIO, Old National Bancorp
Unlocking the Value of Connected Cars
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
Digital Innovation Giving Rise to New Capabilities
By Gregory Morrison, SVP & CIO, Cox Enterprises
Staying Connected to Organizational Priorities is Vital...
By Alberto Ruocco, CIO, American Electric Power
Comprehensible Distribution of Training and Information...
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
The Current Focus is On Comprehensive Solutions
By Sergey Cherkasov, CIO, PhosAgro
Big Data Analytics and Its Impact on the Supply Chain
By Pascal Becotte, MD-Global Supply Chain Practice for the...
Technology's Impact on Field Services
By Stephen Caulfield, Executive Director, Global Field...
Carmax, the Automobile Business with IT at the Core
By Shamim Mohammad, SVP & CIO, CarMax
The CIO's role in rethinking the scope of EPM for...
By Ronald Seymore, Managing Director, Enterprise Performance...
Driving Insurance Agent Productivity with Mobile and Big...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
Transformative Impact On The IT Landscape
By Jim Whitehurst, CEO, Red Hat
Get Ready for an IT Renaissance: Brought to You by Big...
By Clark Golestani, EVP and CIO, Merck
Four Initiatives Driving ECM Innovation
By Scott Craig, Vice President of Product Marketing, Lexmark...
Technology to Leverage and Enable
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
AI is the New UI-AI + UX + DesignOps
By Amit Bahree, Executive, Global Technology and Innovation,...
Evolving Role of the CIO - Enabling Business Execution...
By Greg Tacchetti, CIO, State Auto Insurance
Read Also
Sailing through Uncertain COVID times
Paving the Way for Incentivized, Ethical Waste Collection
The Designer of the Future
Protecting Human Health and Aquatic Ecosystems with Ultrasonic...
Adding Dimensions to MMC
The Intelligent Legal Department
