preview

Assessing the Security Risks of Cloud Computing

Better Essays

Research
Publication Date: 3 June 2008 ID Number: G00157782

Assessing the Security Risks of Cloud Computing
Jay Heiser, Mark Nicolett

Organizations considering cloud-based services must understand the associated risks, defining acceptable use cases and necessary compensating controls before allowing them to be used for regulated or sensitive information. Cloud-computing environments have IT risks in common with any externally provided service. There are also some unique attributes that require risk assessment in areas such as data integrity, recovery and privacy, and an evaluation of legal issues in areas such as e-discovery, regulatory compliance and auditing. Key Findings
• • The most practical way to evaluate the risks …show more content…

All this makes it easier for them to keep their costs down and scale to meet changing customer demands, but it also makes it harder to assess the risk to your organization from using such a service. Organizations potentially can gain a competitive or cost advantage through selective adoption of cloud computing, but not without first taking a comprehensive look at the associated risks, ensuring that they are consistent with business goals, along with the expectations of regulators, auditors, shareholders and partners. It is especially challenging to understand the risks associated with cloud computing, and CIOs, chief information security officers, compliance and privacy officers, and line-of-business managers should be involved in the risk assessment of new cloud-based services. If a company is considering the use of an external service of any sort, then it needs to: • • • • Assess the security, privacy and regulatory compliance risks Identify use cases that are inappropriate for this service delivery method, based on risk level and current controls Identify use cases that pose an acceptable level of risk for the service delivery method Choose and implement compensating controls before going fully operational

What to Evaluate
Privileged User Access
When sensitive data is processed outside the enterprise, or by non-employees, it means that organizational managers are less immediately aware of the nature and level of

Get Access