Posted by aionol | 01 FEB 2018

Taking A Closer Look At the ‘Treacherous 12’ Top Security Threats in The Cloud (Part V)

We have reached the last and final post that investigates the ‘Treacherous 12’ (Cloud Security Alliance). As started before, the most common security threats businesses face are concerned with moving their workloads to the cloud, and these posts were created to raise awareness about those threats. After discussing the previous threats in posts I to […]

We have reached the last and final post that investigates the ‘Treacherous 12’ (Cloud Security Alliance).

As started before, the most common security threats businesses face are concerned with moving their workloads to the cloud, and these posts were created to raise awareness about those threats.

After discussing the previous threats in posts I to IV, let’s finish with looking at points 11 and 12 –

11. Denial of Service

DoS attacks cause your network to be unavailable for an extended period of time by flooding the system with illegitimate requests. As a result, your business will not be able to function and fulfill its targets. You need to be especially aware of attacks of an asymmetric nature at the application level that target vulnerabilities in your web server and database.

The CSA points out that cloud providers are in a better position to protect against such security threats – so make sure you check with your provider that they have emergency response plans in place.

Top Security Threats in The Cloud

Security Threats in The Cloud

12. Shared Technology Issues

Handing over your data is scary. Especially if there is a systems risk involved. Shared technology means shared risks. Your cloud providers infrastructure, platforms and applications are not exclusively reserved for you. All their clients’ processes are handled in the same cloud. As a result, a vulnerability on one level, can cause disruption for an entire clientele.

In order to make sure that this eventuality does not hurt your business, check with your cloud provider that security measures such as multifactor authentication, intrusion detection systems and defense-in-depth-strategy are in place.

Don’t let your cloud move to the dark side of the force. Get in contact with Iono Inc to make sure your cloud stays happy, healthy, and secure.

Leave a Reply

Your email address will not be published. Required fields are marked *