Who is "cloud security" subversive?

Source: Internet
Author: User
Keywords Cloud computing security

Although cloud computing may now be just hype, the advent of the cloud is inevitable as a trend. With the cloud computing, mobile Internet and other new technologies landing and a wide range of applications, new security risks and the emergence of more unknown security threats to the entire security industry is a bit unprepared, the "cloud" brought about by the security problems are gradually heating up.

Some users who have just come in contact with cloud computing concepts are always first responders-Is it safe? After some understanding of cloud computing, users always say that security is like the shortest piece of wood on cloud computing bucket, the reason why cloud computing this bucket of water is not satisfied, is safe this plank is too short. After all, the concept of "cloud security" has been controversial since it was proposed.

Earlier, Cisco's president, Chambers, had an astonishing claim that cloud computing would be a safe disaster, a story that has sparked a stir in the industry. In fact, this is not sensational, data protection, terminal protection, virtual environment, risk management and other information security issues with the advent of cloud computing will be more complex and difficult, enterprise users of information security will face more serious challenges.

A recent cloud computing survey confirmed the concern of users, with 50% per cent of respondents thinking that the "security of data or cloud infrastructure" was the main factor impeding the spread of cloud computing services, taking the top of all user concerns. Users generally believe that the security of cloud computing, although the unprecedented attention, but the information security environment has not been effectively improved, the opposite of insecurity increased.

In fact, we question the security of cloud computing primarily for two reasons: first, companies in the past are more accustomed to building security defenses based on network boundaries, but one feature of cloud computing is the elimination of network boundaries. This is what we are most worried about: there is no security in the case of borders, let alone in an environment without borders.

Second, cloud computing is another feature of virtualization computing, the past forensics technology has not been keeping pace with the development of network technology, in the cloud computing environment, multiple operating systems and applications running on the same physical machine, so how to ensure the virtualization environment of service security?

Cloud computing and virtualization can bring considerable benefits and cost savings, but moving servers beyond traditional information security boundaries extends the range of activities of cyber-criminals. On the way of cloud computing, how to remove the "stumbling block" of the security problem and the fog of "cloud security" has become the interest point of mutual concern.

Of course, security concerns do not prevent the use of cloud computing and prevent the adoption of cloud applications that address the real business needs. To ensure that the cloud is secure, it needs to be treated as the next step in technology, rather than as a revolution that requires a radical change in the security model. Security policies and programs need to be tuned for cloud mode toPrepare for the use of the service. As with other technologies, we have seen some early adopters gradually eliminating the mistrust of cloud models by taking the lead in deploying private clouds or experimenting with non-critical applications in a common cloud.

Industry insiders point out that if the security of cloud computing is to be solved, it is not enough to rely solely on the power of one vendor, which requires the industry to unite to form a complete ecosystem to protect the security of cloud computing. It is understood that although many manufacturers are aware of the importance of protecting cloud computing security, but due to the different business scope of manufacturers and their respective understanding of different, information security vendors, virtualization technology suppliers, network infrastructure equipment suppliers, server suppliers, application system suppliers, Operating system manufacturers, such as in the protection of cloud computing security aspects of the situation is inevitable, which will make security work into a disorderly state. Therefore, how to reach a consensus on "cloud security" is still a problem that all kinds of cloud computing vendors and security vendors need to solve in the future.

In summary, cloud security remains a major concern for businesses that are interested in using cloud computing. Only by solving the threat of cloud security, cloud computing may be really raging, which requires the parties to work together to push through the fog of cloud security.

(editor: Heritage)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.