The secrecy and location of the data determine cloud security

Source: Internet
Author: User
Keywords Cloud security Cloud computing

For many enterprises, the transfer of business processes and data to cloud computing has become an enterprise to improve business and technical capabilities of the measures. Using cloud computing applications can help businesses save costs and improve efficiency. However, companies that are using cloud computing or planning to start or expand cloud computing are increasingly concerned about cloud computing security, especially with regard to the question "Why is cloud security a big challenge?"

The challenge of cloud security comes primarily from the need for organizations to control their data and ensure the security and privacy of their data. Whether it's outsourced data storage or the use of popular cloud computing SaaS applications, storing more data in the cloud essentially means potentially more unwanted or unauthorized access to information. But because of the commercial benefits of cloud computing, many companies are moving into cloud computing. So the corporate security team and the IT team need to find ways to protect the data in their cloud while allowing legitimate enterprise users to access and use the data in cloud computing.

Another big challenge for cloud security is to determine the exact location of cloud data. Once the data is removed from the enterprise's firewall and moved into cloud computing, the data is typically located in the cloud service provider's device, which is usually located outside the enterprise's geographic location. Because the laws of each country and industry are different, companies must be able to comply with the laws applicable to their data, which is a big challenge for multinationals, who need to comply with specific data laws and their cloud service providers may be located in multiple countries.

There are other important cloud security issues, including compliance requirements such as HIPAA, Cjis, GLBA, PCI DSS, and so on. All of these regulations have specific requirements for clarifying how sensitive data should be handled (for example, personal identification information may need to be encrypted in the cloud, and encryption must meet certain requirements, such as FIPS 140-2).

Although for the enterprise, cloud security poses a great challenge, there are feasible solutions. For example, to help enterprises solve various cloud security problems of products-cloud data protection gateway.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.