Cloud computing needs to be safe first

Source: Internet
Author: User
Keywords Cloud computing cloud security cloud security
Cloud computing is an emerging technology system that also offers new business opportunities, the fourth it revolution following mainframes, PCs and the Internet. There have been more and more discussions about cloud computing in recent years. Cloud preachers tell people that "cloud" means unprecedented convenience and value. However, in practical applications, the "cloud" of doubt has not been dispelled. To best understand the potential risks and the rewards of the business, you should try to find opportunities to enhance communication and communication with the security team as much as possible, says Penny, a consultant at Forrester Research. "Security and compliance needs to be properly interpreted," says Penny. Business executives must understand the importance of cloud security and measure the level of risk to develop the budget needed to mitigate those risks. Migrate to the cloud integrate the security domain enterprise goals in a more sustainable manner by formalizing the risk assessment function through the Security Council. The Security Council can help companies assess risk and provide budget proposals that conform to the corporate strategy. You should also keep a close eye on the security innovations of the various cloud security services and vendor partnerships that are rapidly growing in the cloud. Amazon's partner, DOME9, has solved a special cloud technology problem-shutting down the security shell (SSH) and other cloud server ports (when they are not in use), so that attackers who have logged in to the cloud cannot access it. "Within the enterprise," said Davemeizlik, vice president of marketing at DOME9. The default settings for devices such as the security shell and cloud server ports are turned on, but when they are on the cloud, they should be turned off if they are not used, and you cannot rely on the cloud provider to dispose of your servers every time. Providers may never want to tell anyone their firewall is set up and something like that. On the other hand, if delivered correctly, there is a lot of information that is useful from a compliance or cloud security standpoint. If we differentiate facts from exaggerated propaganda, as consumers of cloud computing, I get enough information about where my apps are running today and how it works, and it doesn't affect your cloud security at all. So, by providing me with the information I need, I will trust my environment. In fact, from a consumer perspective, things can be simpler because applications become instrumented, and you can determine if these applications are in the right environment. DARPA has done a lot of research on the multi-tenant environment. They studied the control of the application and let the application report the security of its environment. Most of our focus remains on building the fundamentals of cloud computing. But thoughtful leaders can help to influence the tactical aspects of building this foundation, so this is transferable. So we don't have to separate this foundation and rebuild it every time we go into another cycle of the cloud. From the perspective of the future, I think it's naïve for anyone to tell you that they can predict the state of the cloud after two years. Everything is changing.Of。 We cannot predict the outcome of all these changes. Cloud computing is different from mainframe transitions to distributed systems, and cloud computing will change everything about computing. Cloud computing may pose some risks, but as cloud security innovations continue to evolve, these risks may gradually diminish. "Even today, cloud security is not the most worrying issue for the corporate Security team, like the other IT trends such as smartphones or social media sprawl," says Penny of Forrester. For the spread of the cloud, the ultimate cloud security problem will be resolved over time. "Edit Recommendation" Cloud computing: Governance and Security cloud computing security technology architecture support trend technology OfficeScan seven winning streak cloud computing security resolution: from icloud to see information security IaaS Cloud computing model: need to pay attention to five major security issues trend Technology Cloud Security 5.0 escort Enterprise safety and security into cloud computing development important prerequisite Innovation and technology to promote the development of industry cloud computing services hidden dangers: Privacy protection Cloud computing security two big lies "responsible editor: Liyan TEL: (010) 68476606" Original: Cloud computing needs to return security first
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.