Cloud Security Planning Essays

2943 Words May 18th, 2013 12 Pages
Cloud Security Planning
Cloud systems as new online storage and computing systems provide great potentials to all businesses and organizations of creating new approach of storage and computing; cloud system guarantee that all your files and valuable data can be accessed and recovered from anywhere in the world, providing a new meaning of technology. Unfortunately and as to what happen with all emerging technologies there are new threats, risks, breaches, and problems arise with such technologies. They are considered challenges that vary from configuration problems to security breaches to harmful attacks; which may cost the company large losses and in some time financial disasters. In this case study we will try to identify
…show more content…
Second, discover the possible breaches and weakness within the system chosen services. It will also practice the possibility of filling any gaps in the system while not affecting other parts of the system. Third, what IT Managers should do to alleviate security vulnerabilities and reduce their impacts on the company; such as data encryption, secure the platform and infrastructure, and so on? Fourth, how to protect the data while it on the movement or processing, which suggest encryption as the best possible method. Of course it will come with an extra cost so we will need to know what should be or shouldn’t be encrypted. Fifth, create a trust foundation starting from the platform and extended it through trusted roots. Sixth extend the trust circle through the cloud systems. Finally, choosing the right service provider; which will involve a series of tests and measurements?
In conclusion, with everyone today is talking about cloud systems and with a lot of major companies considering cloud to be the next step for their databanks; great risks are rising as well. So, with the potential threats and the outcome penalties that may arise from them. Those companies should consider a cloud security plans to prevent such threats. In our case study we create an approach to achieve the desired security goals, plus other recommendations to make it cost

Related Documents