Hazards In The Cloud Motivate Backup Best Practices

by | Apr 1, 2013 | Business Continuity, Cloud & Hosting

Do Hazards In The Cloud Motivate Backup Best Practices For Your Company?

Fully benefiting from the efficiencies and scalability of the cloud does require certain proactive measures and backup best practices to structure and maintain a secure environment. Cloud security threats reported by the Cloud Security Alliance (CSA) at the RSA Conference in San Francisco CA in February 2013 include the following. A quick review of some of these challenges should help to motivate backup best practices.

Cloud Abuse

It’s vital for cloud service providers to decisively define what constitutes “cloud abuse” so that methodologies can be employed to identify it and to deal with it. So what commonly constitutes “cloud abuse?” here are a few examples:

• Using a cloud server to propagate malware
• Sharing pirated software via cloud-based servers
• Launching a malicious DDoS attack
• Using cloud computing power to crack an encryption key

Insecure Interfaces & APIs

APIs are a fact-of-life when it comes to both general cloud services and cloud security. In the world of cloud computing, layered API becomes more common and therefore more of a potential problem. For example, credentials may need to be given up to third parties to enable services.If interfaces in this multi-layered environment are weak, confidentiality, accountability, and integrity can be compromised.

Denial of Service (DoS)

It is perhaps a truism that, the more powerful and ubiquitous the computing power, the more that its loss will damage an organization. Today, many a business is critically reliant on one or more cloud-based services 24/7. One challenge that a hacker might pose is to gain only partial access, but in so doing cause the consumption of so much processing time that things become simply too expensive to run.

YOU MIGHT ALSO LIKE:  What's the Best Data Backup for SMB? Here's How to Choose

Shared Technology Vulnerabilities

Service providers in the cloud enjoy scalable capabilities thanks to shared applications, platforms, and infrastructure. However, it is vital that such providers make sure that elements of the underlying infrastructure in their systems, such as CPU caches, in fact offer the impenetrable isolation properties necessary to fully secure multi-tenant architecture, multi-customer applications, and re-deployable platforms.

A multi-faceted approach to cloud security is recommended for backup best practices. Such an approach may include, but not be limited to, defensive, in-depth strategies. Ongoing enforcement and monitoring is important in all areas, including computing, networking, storage, applications, and user security.

For insight into how your transition to cloud computing can be as seamless and secure as possible, please contact us today about Backup Best Practices.

Dale Shulmistra is a Business Continuity Specialist at Invenio IT, responsible for shaping the company’s technology initiatives -- selecting, designing, implementing & supporting business continuity solutions to bolster client operational efficiencies and eliminate downtime.