How do you view cloud security issues?

Source: Internet
Author: User
Keywords Cloud security Cloud security
How many enterprises and organizations are catching up with cloud computing in the Shanyun of everyone today? And how many onlookers are waiting for the opportunity to get ready to plug in? Before we go into the cloud, do we ask ourselves whether cloud computing is necessary? The need for cloud computing (Cloud computing) is a new way of sharing infrastructure that can connect huge system pools to provide a wide range of IT services. Cloud computing is the Super computing model based on the Internet. The pooling of information and processor resources stored on personal computers, mobile phones and other devices to work together. Is cloud computing necessary? Let me give you an example of this. In the past, people own wells, each drink water, to meet their needs can be. But as the population more and more, the demand for water is more and more, at the beginning, their home is not enough can go to the neighbors to borrow some, but always enough words can not borrow, and water resources distribution uneven, some people are thirsty some people support, this How to solve? To this end, the government unified the water resources, to build a water pipe to each household, the home on demand, and pay on demand, this is what we call tap water. In short, cloud computing is like this tap water. It provides IT resources as services, and almost all IT resources can be delivered as cloud services: Applications, computing power, storage capacity, networking, programming tools, and communications services and collaboration tools. Almost all IT resources can be delivered as cloud services: Applications, computing power, storage capacity, networking, programming tools, and communication services and collaboration tools. Cloud computing has the advantage of being low-cost and efficient. In many cases, a variety of institutions and individuals prefer to buy "calculations" as a service, and companies that are already building hyper-distributed data centers will choose to provide this infrastructure as a service, without exception. Cloud computing is a trend that is unstoppable, as well as the water that has become today's tap. Cloud computing security since the deployment of cloud computing is imperative, then we are fully prepared to meet the cloud of the coming! In the process of deploying the cloud, however, security issues are not to be underestimated. When it comes to cloud computing, the reality of security debate seems to have never ceased. Cloud computing security issues are broadly divided into three areas. First of all, cloud computing service providers are their networks secure, is there anyone else breaking in to steal our account? Are the storage they provide safe? Will it lead to data leaks? These are the problems that cloud computing service providers are trying to address and promise to users. Second, the services that users use in cloud computing are also to be noted: balance the security of the cloud service provider with the security of its own data, too important data not to be put into the cloud, but hidden in its own safe, or encrypted and then placed in the cloud, only to decrypt the data, Keep the security initiative firmly in your hands, without relying on the service provider's commitment and their actions. Third, users have to keep their accounts well,Prevent others from stealing your account to use the services in the cloud, and finally let you pay for it. It is easy to see that the technology and services used in cloud computing can also be exploited by hackers to send spam, or to launch more advanced malware attacks against downloads, data upload statistics, and malicious code detection. Cloud computing security technology is the same as traditional security technology: cloud computing service providers need to use a firewall to ensure that no unauthorized access, the use of anti-virus software to ensure that the internal machine is not infected with intrusion detection and defense equipment to prevent hackers; File content filtering prevents sensitive data from being stored in a relatively insecure cloud. Several core issues of cloud security one, identity and rights control large numbers of users lack confidence in cloud computing, first because of concerns about usage rights and administrative permissions in cloud mode. In the virtual, complex environment, how to ensure that their applications, data is still clear and controllable, this is both the user's problem, but also the cloud service provider issues, and this is the information security sector to see more clearly. Therefore, the identity and privilege control solution becomes one of the core issues of cloud security. Authentication control solutions have been able to basically cover all business processes and most business directions, while simplifying authentication management and hardening End-to-end trusted access will be one of the next phases of development. Second, web security Protection Cloud Computing mode, Web application is the most intuitive user experience window, but also the only application interface. In recent years, a variety of web attacks, it has a direct impact on the smooth development of cloud computing. Virtualization security Virtualization is one of the most important technical support for cloud computing and one of the hallmarks of cloud computing. The result of virtualization, however, is that many traditional security measures fail. Technically speaking, the biggest difference between cloud computing and traditional IT environments lies in its virtual computing environment, which makes its security problems extremely "tricky". The computation of virtualization makes the interaction between application processes more elusive; Virtualized storage makes data isolation and removal difficult to measure; The virtualized network structure makes the traditional domain protection difficult to realize, and the virtualization service delivery mode makes the identification of user's identity, authority and Behavior, Control and auditing become extremely important. Cloud security services face the security of cloud computing, and today there are a number of security offerings based on cloud services, including web and mail filtering, network traffic access control and monitoring, and tagging of payment card services. One important difference between the different security services is that some are "in the cloud" and some are "targeted at the cloud", that is, those security services that are integrated into the cloud environment as virtual devices are provided to users and controls. When choosing a cloud security service, communicate with your service providers to find out what they can provide and what they want, and it's best to sign a service agreement that will help reduce the risk of your business. Gartner predicts that the security application services provided by cloud computing will grow three times times in 2013. Cloud security condition changedVery quickly, security technicians must understand the factors that affect their work, including government law and industry standards, and they should be aware of whether these factors are properly applied to the risk assessment methodology and whether the methods are regularly modified. "Responsible editor: Shang Micro TEL: (010) 68476606" Original: How to look at cloud security issues? Back to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.