Cloud Computing Security: An Ongoing Issue

With the advent of cloud computing and cloud storage, many users fear that their personal data may be susceptible to Internet hackers, and that the overall concept of cloud storage isn’t safe.

In fact, information security is probably the most pressing issue facing today’s current and potential cloud users, and many wonder if the methods being employed are enough to keep cloud computing and cloud storage safe.


The Cloud Security Alliance

In order to help clear the air about cloud computing, the nonprofit organization, the Cloud Security Alliance (CSA), was formed to promote and understand security practices in the cloud computing arena.

Acting as a sort of community watchdog, the CSA evaluates and confronts various issues in the cloud environment, primarily cloud security competency.

The CSA claims that a secure cloud system should, for the most part, allow users to have secure access to their data and that data protection should also be implemented to prevent external users, who aren’t approved, from gaining access to sensitive material.

The CSA also serves as an instructional body, tutoring users (their sessions are open to everyone, not just geeks) on basic and advanced cloud knowledge.

They’ve also designed a Certificate of Cloud Computing Security Knowledge in order to ensure industry-wide cloud security training related to technical and security issues, very similar to how an electrician would need a license to practice his skills.


Threats to Cloud Computing

In response to the ongoing concern about cloud security, the CSA issued a report in March 2010 on the Top Threats to Cloud Computing (which can be found at: ). The report elaborated on the top factors to be addressed in order to create a safe cloud computing experience, and a version two is actually due for release this month (July 2012).

The CSA’s report offers several ways to circumvent any malicious intent from external users, such as abuse, insecure interfaces, inside threats, data loss, and hacking.

While some cloud services feature very low sensitivity, others are meticulously protected against external threats, so any customer should have a thorough knowledge of whatever cloud service they choose to avoid any possible risks. In the case of fatal errors, downtime or system faults, cloud computing should produce detailed event logs that help administrators and customers understand these very issues.

The CSA’s recommendations have quickly become a bible of sorts for cloud security practices, by suggesting a variety of options that can help protect your information in the long run, especially in regards to software, code updates, vulnerability profiles, intrusion attempts, and security design.

Of course, we all run the risks of having our accounts hacked into and data stolen (similar risks exist even if you’re not using the cloud), yet by prevention and a few safeguarding tips, there can be a limited vulnerability in this matter.


About the Author: Morris Fisher is a writer for This website provides in-depth reviews on the top cloud services.

Build Your Own Security
Subscribe to my newsletter and get a copy of my eBook for free.
We hate spam just as much as you

Related posts:

  1. Kaspersky 2012 Hybrid Protection with Cloud Protection
  2. Cloud Storage and Security Issues
  3. The Risks of Cloud Computing Storage


  1. anshul says:

    Hi Morris!
    in my opinion cloud computing is perfect to avoid from hacking and data stolen issues.and i would like to say that no one is perfect so without cloud computing this type of situation can be happen more.i like your blog and thanks for informing about cloud computing.
    anshul recently posted..Online Banking SoftwareMy Profile

  2. Aditya says:

    There are much heck going on about cloud computing’s advantages and disadvantages online.Although it is safe but somehow most of the businesses are not keen to have it.
    Aditya recently posted..ERP Software CompaniesMy Profile

Speak Your Mind


CommentLuv badge

This blog uses premium CommentLuv which allows you to put your keywords with your name if you have had 3 approved comments. Use your real name and then @ your keywords (maximum of 3)