WELCOME TO THE CONTINUITY CENTRAL ARCHIVE SITE

Please note that this is a page from a previous version of Continuity Central and is no longer being updated.

To see the latest business continuity news, jobs and information click here.

Business continuity information

Secure migration to the cloud

Cloud computing continues to have a significant impact on the way enterprises operate, and companies are increasingly migrating to the cloud as a result of its value. But security and data privacy concerns are critical issues to consider before adopting cloud-computing services.

‘Security Considerations for Cloud Computing’, a new book from ISACA, presents practical guidance for IT and business professionals to help them securely move to the cloud.

The book, available as a complimentary download for ISACA members and at $75 for nonmembers, details how cloud computing will gain importance as both the cloud and cloud-service-provider markets mature. Particularly in times of cost optimization and economic downturn, the cloud can be perceived as a more cost-effective approach to technological support of the enterprise.

Before migrating to the cloud however, ISACA recommends considering the following risk factors:

  • Legal transborder requirements: cloud-service providers are often transborder, and different countries have different legal requirements, especially concerning personal or private information.
  • Absence of disaster recovery plans: the absence of proper backup procedures implies a high risk for any enterprise.
  • Physical security of computer resources: physical computer resources can be shared with other entities in the cloud. If physical access to the cloud-service provider’s infrastructure is granted to one entity, that entity could potentially access information assets of other entities.
  • Data disposal: proper disposal of data is imperative to prevent unauthorized disclosure.
  • Cloud provider authenticity: although communications between the enterprise and the cloud provider can be secured with technical means, it is important to verify the identity of the cloud provider to ensure that it is not an imposter.

Just as cloud computing is about more than just IT infrastructures, platforms and applications, the developers of Security Considerations for Cloud Computing stress that the decision to operate in the cloud should not be made solely by IT organizations. The use of cloud services might entail high risk for the business and should be evaluated by responsible parties from the different control functions within an enterprise.

More information.

•Date: 5th Oct 2012 • World •Type: Article • Topic: Cloud computing

Business Continuity Newsletter Sign up for Continuity Briefing, our weekly roundup of business continuity news. For news as it happens, subscribe to Continuity Central on Twitter.
   

How to advertise How to advertise on Continuity Central.

To submit news stories to Continuity Central, e-mail the editor.

Want an RSS newsfeed for your website? Click here