Hazards In The Cloud Motivate Backup Best Practices
Do Hazards In The Cloud Motivate Backup Best Practices For Your Company?
Fully benefiting from the efficiencies and scalability of the cloud does require certain proactive measures and backup best practices to structure and maintain a secure environment. Cloud security threats reported by the Cloud Security Alliance (CSA) at the RSA Conference in San Francisco CA in February 2013 include the following. A quick review of some of these challenges should help to motivate backup best practices.
It’s vital for cloud service providers to decisively define what constitutes “cloud abuse” so that methodologies can be employed to identify it and to deal with it. So what commonly constitutes “cloud abuse?” here are a few examples:
• Using a cloud server to propagate malware
• Sharing pirated software via cloud-based servers
• Launching a malicious DDoS attack
• Using cloud computing power to crack an encryption key
Insecure Interfaces & APIs
APIs are a fact-of-life when it comes to both general cloud services and cloud security. In the world of cloud computing, layered API becomes more common and therefore more of a potential problem. For example, credentials may need to be given up to third parties to enable services.If interfaces in this multi-layered environment are weak, confidentiality, accountability, and integrity can be compromised.
Denial of Service (DoS)
It is perhaps a truism that, the more powerful and ubiquitous the computing power, the more that its loss will damage an organization. Today, many a business is critically reliant on one or more cloud-based services 24/7. One challenge that a hacker might pose is to gain only partial access, but in so doing cause the consumption of so much processing time that things become simply too expensive to run.
Shared Technology Vulnerabilities
Service providers in the cloud enjoy scalable capabilities thanks to shared applications, platforms, and infrastructure. However, it is vital that such providers make sure that elements of the underlying infrastructure in their systems, such as CPU caches, in fact offer the impenetrable isolation properties necessary to fully secure multi-tenant architecture, multi-customer applications, and re-deployable platforms.
A multi-faceted approach to cloud security is recommended for backup best practices. Such an approach may include, but not be limited to, defensive, in-depth strategies. Ongoing enforcement and monitoring is important in all areas, including computing, networking, storage, applications, and user security.
For insight into how your transition to cloud computing can be as seamless and secure as possible, please contact us today about Backup Best Practices.