The Many Dangers of Cloud Computing - Page 2

An industry analyst looks at the security concerns inherent in outsourced computing, and gives advice for businesses seeking to contract a cloud provider.

By James Maguire | Posted Aug 7, 2008
Page 2 of 2   |  Back to Page 1
Print ArticleEmail Article
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn

2) Compliance

In the era of Sarbanes-Oxley, companies are held responsible for an exacting level of data monitoring and archiving. Even if a company contracts with an external cloud-based provider, these regulations hold the company itself responsible. Cloud-based providers should submit to audits and security certifications to ensure they're able to hold up their end of the bargain.

Advice: "A cloud computing provider that is unwilling or unable to do this is signaling that customers can only use them for the most trivial functions."

3) Data Location

With cloud computing, you won't know where in the world - literally - your data is stored. The servers might be in Malaysia, Canada, or Hoboken, New Jersey - or a combination of the three.

Ask your provider: are they willing to give a contractual commitment that they are obeying the privacy laws of specific jurisdictions?

4) Data Segregation

Certainly cloud providers use SSL to protect data as it travels, but as it sits in storage it may share a "virtual locker" with data from other companies. Is your data properly segregated from the rest?

It's likely a provider will offer impressive tales about the strength of its ultra-heavy duty encryption. You'll hear great claims about key length and exotic encryption algorithm.

Still, if your data can be read at your provider's site, then you must assume it will be read.

Advice: "If your data will be stored and backed up in encrypted form, find out who has access to the decryption keys and whether it's possible for authorized individuals at your company to gain access to their employees' data in an emergency."

5) Availability

In theory, you don't have to worry about your data disappearing when using a cloud provider - it's easy for these providers to redundantly mirror your data in various locales, providing peace of mind against a system crash.

But will your staff have access to the data they need to do their jobs, 24/7? What if the virtual pipes are clogged, so to speak? Or some kind of internal snafu within your provider puts a brick wall between you and your critical data?

Advice: "Organizations should define service-level requirements for any nontrivial IT workload and demand service-level agreements from the provider and ensure that the contract contains penalty clauses when the service-level agreements are not met."

6) Recovery

Hopefully, the worst will never happen, and nothing resembling a total disaster will befall you, your provider or the world at large. But your provider must be prepared for this.

Essential question: Does your provider have the ability to do a complete restoration, and how long will it take?

7) Investigative Support

It's never easy to undertake an internal legal investigation, because it requires combing through masses of documents that may be spread across real and virtual locations. It's even harder to conduct such research when you use a cloud provider: data for many customers may be co-located and spread across a constantly shifting set of data centers.

Advice: "If you cannot get a contractual commitment to support specific forms of investigation, along with evidence that the vendor has already successfully supported such activities, then your only safe assumption is that investigation and discovery requests will be impossible."

8) Viability

Will your provider get acquired or - even worse - go broke? If so, how will they return your data to you in a format that you could import into another provider's infrastructure?

9) Support in Reducing Risk

Your staff will have a learning curve as they begin using an external provider. How easy does this provider make their interface? Does the provider help your managers set up monitoring policies? What about guards against malware and phishing?

James Maguire is the managing editor of Datamation.

Article courtesy of Datamation

Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter