At present, cloud computing industry is highly praised by the industry and launched a series of services based on cloud computing platform. But security has been a concern in the already-implemented cloud computing services. Security and privacy issues have become one of the main obstacles to the spread and spread of cloud computing.
January 21, 2011, ITGI, a research firm, says many companies are controlling investment in cloud computing, given the security of their data. Half of the 834 CEOs of the 21 companies surveyed said they were delaying the deployment of the cloud for security reasons and One-third of users were waiting.
Cloud Computing Data Center as the core platform for cloud computing, its security considerations are more important. What are some of the different risk points that cloud computing brings to the usual data centers that require special attention?
Special risk points for cloud computing data centers
Due to the "dynamic cloud" characteristics of cloud computing, the main risk points of cloud computing can be summarized as follows:
1. Resource and Data Outsourcing
Enterprise resources and data are placed on shared public networks, outside the enterprise boundaries. Cloud computing, the new service model, separates the ownership, management, and use of resources, so users lose direct control of their physical resources and face some security problems in collaboration with cloud services. At the same time, more and more data are stored in the cloud, which means that the more data can be abused. If it is not important data, the company's concern is not so big, if it is confidential data, that is, corporate privacy, the information is stolen, the blow to the enterprise is very large, this is also a lot of companies have not yet dared to try cloud computing reasons.
2. Cloud computing Service provider reliability
Ideally, your cloud provider would never go bankrupt or be bought and swallowed by a larger company. You must be sure that the data will continue to be used after such an event occurs. Ask a possible cloud service provider how to get your data back and whether the data format allows you to import into alternative applications.
3. Multi-tenant environment
Data is typically in the cloud in a data-sharing environment with other customers. While encryption is effective, it is not a panacea, so find out if your data is isolated during hibernation. Cloud computing platform integrates a number of tenants, how the information resources between the tenants of the security isolation, the service specialization caused by the multi-level subcontracting of security issues.
4. Dynamic Trust boundaries
The trust boundary of the enterprise is dynamic, and the enterprise cannot determine the change of the trust boundary. When using cloud computing, customers may not know exactly where your data is hosted. In fact, you may not even know which country this data resides in, or it may be spread across a changing set of hosts and data centers.
5. Lack of transparency
The lack of transparency in the security controls and implementations of cloud computing services providers is a lack of transparency in the areas of service level agreements, provider management functions, and security responsibilities for most cloud providers. The vulnerability of cloud computing services software is not transparent to cloud users, which hinders the user's management of the risk associated with the vulnerability.
6. Cloud Management standards lack
Cloud computing providers must comply with various it process control and management requirements, both external and internal requirements can be achieved through joint compliance efforts to address all of these requirements, using a more unified and strategic approach that enhances efficiency and compliance while achieving seamless interoperability between different cloud computing. At present, various kinds of cloud computing standards are still scarce, making it very difficult for companies to change cloud service providers.
Cloud Computing Data Center security Policy
Cloud computing security and traditional IT security have a lot in common, their ultimate goal is to protect the integrity of the data, the protection of the objects are computing resources, storage resources and network resources. However, due to the different characteristics of cloud computing, in addition to the traditional it protection technology, the following is for the cloud Computing data Center security response considerations.
Summary
A secure information system should consider not only environmental security and technical security, but also management security, not only to provide static protection capabilities, including the prevention and reduction of fault, damage, but also the ability to have active defense, can detect attacks in time, and can recover from the damage. For cloud computing Data Center security, through a single means is not enough, the need for a complete system, involving a number of levels, from the law, technology, supervision three levels.
Cloud computing security is an absolute problem, but with the development of cloud computing technology, a better understanding of cloud computing, more transparency and better security technology, cloud computing security concerns and sound will gradually disappear.