What is Cloud Computing?
Cloud Computing can be stated as the general term for anything that involves hosted services delivering over the internet. Furthermore, the term “Cloud Computing” term named after the symbol. The Cloud Symbol represents the internet in flowcharts and diagrams.
Cloud Computing security is a set of technologies, policies, controls, and applications. They also protect virtualized data, IP, applications, and services.
Cloud computing provides us with capabilities to store and process the data in third-party data centers. Organisation uses the cloud in a variety of different service models and deployment models.
The various security concerns associated with cloud computing fall into two categories.
- security issues faced by cloud providers
- the security issues faced by the customers
However, they share equal responsibility. The provider ensures that their infrastructure is secure and the clients’ data and applications are safe and protected. Whereas, the user should take measures to strengthen the application and use strong passwords and authentication measures to save themselves.
An organization loses its ability to have physical access to the servers hosting its information after it elects to store data or host applications on the public cloud. The potentially sensitive data is at risk from insider attacks as a result. Insider attacks are the biggest threat in cloud computing according to a recent Security Alliance report. So, thorough background checks should be conducted for employees who have physical access to the servers in the data center. Furthermore, they should monitor data centers for suspicious activity.
Cloud service providers often store more than one customer’s data on the same server to conserve resources, cut costs, and maintain efficiency which could lead to one user’s data being observed by another user. So, cloud service providers must ensure proper data isolation and logical storage segregation.
Cloud Computing Security Architecture
Cloud security architecture is effective if correct defensive implementations are done. So, the cloud security architecture should recognize the issues that would arise with security management. Some of the types of controls behind the cloud security architecture are:
- Deterrent controls- To reduce attacks on cloud systems
- Preventive controls- they strengthen the system against incidents
- Detective controls- To detect and react to any incidents
- Corrective controls- They reduce the consequences of an incident and normally limiting the damage.