Suyati Technologies
  • Services
    • Custom Development
    • Salesforce
    • Analytics
    • Enablers
      • RPA
      • Cloud
      • Testing as a Service
  • Intel
    • Blog
    • eBooks
    • Webinars
    • Case Studies
  • About Us
    • Leadership Team
    • Our Story
    • Testimonials
  • Careers
  • Contact Us
Suyati Technologies
  • Services
    • Custom Development
    • Salesforce
    • Analytics
    • Enablers
      • RPA
      • Cloud
      • Testing as a Service
  • Intel
    • Blog
    • eBooks
    • Webinars
    • Case Studies
  • About Us
    • Leadership Team
    • Our Story
    • Testimonials
  • Careers
  • Contact Us
Suyati Technologies > Blog > The top risks associated with Cloud Computing

The top risks associated with Cloud Computing

by Nayab Naseer April 26, 2013
by Nayab Naseer April 26, 2013 0 comment

risks cloud computingCloud Computing, even when growing in popularity, is not without its fair share of issues. The basic issue is the risk of data loss or theft, as cloud providers move the data from the company’s in-house data center to an external facility. This risk of data-loss or data-theft could be due to many reasons.
Risks Associated with Accountability and Control
In a traditional data center model, the organization takes the responsibility for the security of its own data, and can customize the security to its liking. In the cloud, the data is stored outside the organization’s firewall, and control and accountability for data security is in the hands of the third party provider.
The third party provider may encrypt, offer one-factor or two-factor authentication, adopt network monitoring, or take any other security measure as it deems fit. From the organization’s perspective, even the most advanced security deployments to protect its own network become meaningless, as it may not apply to the third-party cloud server. Organizations needs to ensure that the security practices offered by the cloud provider remains compatible with what their data requires.
Risks Associated with Data Location
Cloud providers deploy their servers in multiple locations across the globe, to ensure redundancy and very high uptime. The selection of the datacenter locations depend primarily on cost-efficiency and convenience for the cloud provider. For the organization, such offshore locations may clash with their statutory obligations. For instance, some European nations restrict transportation of certain type of data beyond their physical borders. Businesses may face the risk of the local authority shutting down the data center for investigation, with the datacenter forced to provide access to the data to a stranger, as per local laws.There is also the very real risk of the data privacy laws of the datacenter location being different from the data protection and privacy laws of the organization’s country, and the data being compromised this way.
Businesses need to conduct due diligence on their own, and have detailed knowledge on where the cloud provider actually stores their data. It is important to partner with a transparent provider who offers such information and co-operates with the business to reduce the risks on this front.
Governance Risks
The cloud scores over the traditional datacenters in ease of provisioning services. This however gives rise to the risks such as organizational users or departments bypassing the IT team to migrate to the cloud on their own. Such actions can place the entire organization at risk of technology lockdowns, loss of data ownerships, and restrictive contracts. It also wrecks the application of a consistent policy across the organization, and may even allow cyber attackers a loophole to infiltrate the network.
Individual customers may also not have the technical knowledge or experience to understand the nature of services provided, and may buy more than needed, negating the cost advantages of migrating to the cloud. This is an issue for the organization to solve by having a comprehensive cloud migration policy, and implementing the same.
Risks Associated with Virtual Networks
Multi-tenancy is a common feature of cloud networks, and allows the cloud provider to offer economies of scale. Cloud providers also virtualizes just about everything, from the network layer to the application layer. Virtual servers of different organizations running on the same physical hardware however increase the risk of attackers exploiting vulnerable systems not otherwise visible.
The all too common designs flaws of a multitenant cloud service could lead to a situation where a flaw in one client’s application allows attackers to access the data of all clients. Nothing prevents an attacker, having compromised an account in a host, from compromising another virtual machine on the same host. They could also attempt to gain access to all the virtual machines running on the host, by compromising the hypervisor.
Researchers from the the University of Wisconsin, University of North Carolina, and RSA Corporation have demonstrated how attackers exploit a virtual machine to use side channel timing information. This would allow the attacker to gain access to the private cryptographic keys, in use by other virtual machines hosted on a single server.
Moreover, denial of service attacks against one client would result in all clients with data hosted in the same server being afflicted.
This again, underscores the importance of entering into a partnership with a cloud provider that not only takes adequate precautions against such risks, but also remains flexible and transparent to accommodate the client’s concerns.

Nayab Naseer
Nayab Naseer
cloud computingcloud computing risks
0 comment
0
FacebookTwitterLinkedinTumblr
previous post
Tips for Keeping Data Safe in the Cloud
next post
Templated EmailMessaging through apex code – things to remember

You may also like

Optimizing Cloud Costs: Strategies for Managing Your Cloud...

May 18, 2023

Salesforce Summer 23 Release Notes

May 16, 2023

Suyati at AJCU CITM

May 5, 2023

How Does Salesforce Help Slack Users Using Chat...

April 25, 2023

The Essential Handbook on How to Become a...

April 13, 2023

A Snapshot of the Salesforce Spring’23 Release Updates 

March 22, 2023

Boost Customer Experience through Agility and a Customer-First...

March 3, 2023

Einstein Analytics & Salesforce CRM Empowering Sales Teams

February 7, 2023

Resolve Cases Easily with Interactive Einstein Search Answers

February 7, 2023

2023 AI Landscape: Key Developments

February 7, 2023

Leave a Comment Cancel Reply

Save my name, email, and website in this browser for the next time I comment.

Keep in touch

Twitter Linkedin Facebook Pinterest

Recent Posts

  • Optimizing Cloud Costs: Strategies for Managing Your Cloud Infrastructure

    May 18, 2023
  • Salesforce Summer 23 Release Notes

    May 16, 2023
  • Suyati at AJCU CITM

    May 5, 2023

Categories

  • Twitter
  • Linkedin
  • Facebook
  • Instagram
  • Services
    • Custom Development
    • Salesforce
    • Analytics
    • Enablers
      • RPA
      • Cloud
      • Testing as a Service
  • Intel
    • Blog
    • eBooks
    • Webinars
    • Case Studies
  • About Us
    • Leadership Team
    • Our Story
    • Testimonials
  • Careers
  • Contact Us

© 2023 Suyati Technologies


Back To Top
Suyati Technologies

Popular Posts

  • Meet, perhaps, the happiest person at Synergy 2014!

    May 22, 2014
  • The Digital Magazine

    August 6, 2014
  • 7 notable advantages of a cloud-based POS system

    November 10, 2014
  • Should you opt for an open or closed source CMS?

    January 16, 2015
  • The year that was for Linux and Open Source

    March 2, 2015
© 2023 Suyati Technologies

Read alsox

A shift in Relational Data Storage Paradigms – Data storage...

July 25, 2012

Life at Suyati – the first 30 days

October 23, 2014

Best E-Commerce Software for Small Businesses

December 8, 2015
Suyati Logo

Leaving So Soon?

Know more about business technology platforms for your enterprise.

Thank you!

We're glad to have you as part of our community. You'll start receiving updates shortly. Please feel free to contact us anytime with feedback or suggestions.

By continuing to use this website you agree with our use of cookies. Read More Agree