5 steps to overcome cloud insecurities
October 4, 2012Grazed from ComputerWeek. Author: K.S.Abhiraj.
Speaking of current cloud security landscape, while security and privacy concerns gets ameliorated the way cloud gets procured yet, major concerns are amplified by re-permeterization and control over organizational assets and the potential for mismanagement of those assets. Transitioning towards public cloud involves a crisp transfer of responsibility and accountability to cloud provider over information, as well as core systems whereas the core pain area seen in today’s date in private cloud environment is the way Cloud gets procured in sync without proper security equation with an unknown security denominator.
Despite the inherent loss of control, the cloud service subscriber still requires to take the responsibility for their methodology on how to align the business operations vertically with the cloud providers architecture and near-to-perfect stratagem on how to procure and integrate with the provider, thus to avoid any security fluctuations which can exhibit an opportunity for external players to penetrate…
Transcending my earlier post Securing the Nebulous Cumulous, wherein we had mentioned the key security elements which gets ‘fractured’ in context when firms look at their pathway towards cloud, here I would showcase 5 considerations a firm should take to survive the cloud daemon apparently.
1) Platform Hardening:
Hardening both the hypervisor and the administrative layer according to way it has been procured and architected to the environment is one of the key considerations which play a critical role in the security equation of the infrastructure. And since, Virtualization has been the key for environment consolidation and integration with all other facets; it gives the administrative layer which squeezes the most of its resources which thus must be properly hardened…
Read more from the source @ http://www.informationweek.in/Cloud_Computing/12-10-04/5_steps_to_overcome_cloud_insecurities.aspx


