SHARE
Facebook X Pinterest WhatsApp

Top 5 Security Concerns for Applications in Cloud Computing

Develop solid, secure user management 1 | 2 | 3 | 4 | 5 | 6 Internally, the application had only trusted users. Often, internal authentication services, such as LDAP and Microsoft Active Directory, are based on protected internal databases and used for secure user access and logging of user traffic. Challenge: If there has […]

Written By
thumbnail Sue Poremba
Sue Poremba
Jun 16, 2010
Enterprise Networking Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Develop solid, secure user management

1

|

2

|

3

|

4

|

5

|

6
Previous Next

Internally, the application had only trusted users. Often, internal authentication services, such as LDAP and Microsoft Active Directory, are based on protected internal databases and used for secure user access and logging of user traffic.

Challenge: If there has not yet been any user management, solid and secure user management has to be developed and used �on the cloud.� If the application continues using the current authentication services, the challenge is whether the user�s credentials should be �replicated� and made available on the cloud — if so, how can this be done in a secure way? Or should the user access management on the cloud ask in a secure way (i.e., through a VPN tunnel) the internal authentication databases? Therefore, the user�s credential database does not leave the secure enterprise infrastructure, but the communication with it has to be secure.

Applications are typically built from the ground up using programming languages, such as PHP, JAVA or .NET by an internal development team or a third-party vendor with “For Internal Use Only� in mind.  There has been a general assumption by development teams that users can always be trusted, the application will be used “as intended,� and all information (i.e., user data) and content (i.e., product data from databases or ERP systems) are coming from safe and secure sources.

As cloud computing becomes more favorable among companies, they are forcing their applications out of the internal network into the cloud, causing them to be vulnerable to Web threats.  If the application, or part of the application, is moved into the cloud, there will be typically less security within the infrastructure and several more users will be accessing it.  Therefore, vulnerabilities turn up and hacks occur.  The following are typical challenges enterprises face when moving an application to the cloud, prepared by security vendor Art of Defence.

Recommended for you...

8 Best Firewalls for Small & Medium Business (SMB) Networks
Mobile Network Security: How to Secure Mobile Networks
Devin Partida
Dec 5, 2023
8 Best Mobile VPNs for Every Use Case in 2024
Mobile Network Hacking: Definition, Methods, and Detection
Enterprise Networking Planet Logo

Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.