End-to-end approach critical to securing cloud computing

February 11, 2013 Off By David

Grazed from ITWeb. Author: Roelof Louw.

Cloud computing is predicted to be the future of the technology world, and analyst reports abound on the expected growth of the uptake of these solutions. However, security issues remain one of the dominant barriers with the adoption of cloud solutions. Many organisations are hesitant to migrate to the cloud in light of the ever-increasing number of attacks on cloud-based solutions, as well as the risk of downtime caused by natural disasters and other issues in the regions where cloud data is stored.

When making the transition to the cloud, it is critical to adopt an end-to-end approach that focuses on IT security, data protection and availability, enabling organisations to leverage the multiple benefits of the cloud while minimising the risks. Furthermore, it is crucial to factor in both the internal and external risks associated with cloud computing, which too require a holistic approach, says Roelof Louw, Cloud Expert at T-Systems in South Africa. This in turn requires that all potential threats be identified, and structured protection mechanisms are put into place which go beyond technology and incorporate processes and people across multiple areas…

There are 12 elements that should be considered to ensure the security of both data and applications when moving to a cloud platform.

1. Identity management
Identity management, including roles and rights, end-point security and access control, is a cornerstone of any ICT security solution, but is particularly important when it comes to the cloud. If employees can access business-critical information, there is always a risk that this will be misused, and if outside persons can access this information, the danger is even greater. Thus, applying stringent identity management, security and access control on a need-to-know basis is a vital foundation component of an end-to end cloud security solution…

Read more from the source @ http://www.itweb.co.za/index.php?option=com_content&view=article&id=61677:End-to-end-approach-critical-to-securing-cloud-computing-&catid=355