• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Security in the Cloud : The Divided Responsibilities

By Abhishek Ghosh January 18, 2013 9:14 am Updated on May 23, 2022

Security in the Cloud : The Divided Responsibilities

Advertisement

Security in the Cloud in the part of the services offered by third parties is part of the prospects for risk management of a company to run assessments. An assumption is taken for granted that each service provider running their service from a data centre is safer than your own. However with assumption based ideation, a serious issue like security in the cloud can not be determined.

 

Security in the Cloud : The Parameters

 

But when these service providers are asked for the details to confirm these assessments, many providers can not help but ask about the word – trust. Addressing this lack of visibility on the part of the services offered by third parties is part of the prospects for risk management of a company and it is important to make a correct assessment of this risk, which also depends on the cost. This evaluation phase has seven different areas of responsibility to consider for security in the cloud, each with its characteristics, and dependent on the type of cloud model that is in use – readers can read the article on Cloud Computing Service models for the details on the models.

 

The Different Aspects of Security in the Cloud

 

Client security

Generally, the client’s security is the responsibility of the owner of the service. In the case of SaaS, with a downloaded application, the question becomes more complicated. Of course, the end user has accepted the terms and conditions before downloading the app, but we know that there are not many who read the top of the condition to the bottom. In a public cloud, we do not know how the SaaS provider secures the connection and how the identification of the device in the cloud application is executed. There is a possibility of identifying an interception or theft of data.

Advertisement

---

Network Security

Cloud services are accessed more and more over the Internet, often using SSL/TLS connections. In some cases, mainly in the case of managed cloud services, you may choose to use VPN connections or leased lines if you believe that they provide the highest levels of security. There is a price for these choices, and you will then need to balance the risk and cost.

Physical Security

The service provider is responsible for the security of its data centres, so this issue is no longer your problem when using cloud services. However, if the service provider hosts the applications and distributes the information to many users (like employees leaking information), the probability of a data centre becoming a target for criminals and hackers grows exponentially. In such cases, precautions must be taken greater than those of a normal data center. You might want an audit before consuming the service provider and this is typically possible with a managed cloud but much more difficult with the public cloud. So once again physical security should become an integral part of your selection criteria.

Safety of platform

The security of the images of the virtual machine, the robustness of the operating system, patching of the software to prevent security breaches, and intrusion detection, all are under the responsibility of the service provider. If you consume IaaS services, you receive a VM environment which is considered safe and you have the responsibility for anything that will run on the virtual machine. Essentially your responsibilities begin at the VM level. You should consider, however, what steps are deemed to provide the necessary security for you.

Security in the Cloud

Vim
1
The Table's Image is by HP Cloud

Application-level security

If you make good usage of IaaS or PaaS, at least the part of the security of the application is at your own risk. If you consume SaaS services, however, the responsibility is all on the side of the service provider. The case of PaaS is very interesting since in this case, you have the responsibility of security at the application level while using the libraries and other software tools offered by the Service Provider. Defining the responsibilities of each party is critical in this environment and once again reading the terms and conditions, is not a waste of time.

Security of data

Here the term comes – encryption and those who manage the encryption keys. If the data are persistent and the data stored in a cloud provider does not delete immediately, you should think about what data to put in an external cloud before you begin to go into production. Keep in mind the precautions and educate users to follow and how to behave in the event of a security breach.

Identity and access management

The hybrid cloud typically uses the Single Sign-On, which allows us to identify once and access multiple services. This makes life easier, but at the same time can cause a SPOF (Single Point Of Failure).

 

A good way to protect yourself regardless of the cloud model is to protect your API keys. We have discussed all these points as elaborated separate articles, for example, if you search with Identity and access management in the cloud, you will get elaborated articles.

Tagged With Cloud security matrix , cloud security responsibilities , https://thecustomizewindows com/2013/01/security-in-the-cloud-the-divided-responsibilities/ , role of security with cloud

This Article Has Been Shared 472 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Security in the Cloud : The Divided Responsibilities

  • Cloud Computing Risk Analysis

    Cloud Computing Risk Analysis is an important administrative and marketing task. ENISA itself has a pdf guide. However, we will cover a generalized idea.

  • Keyless Door Unlocking Mobile Cloud Based Apps : Gaining More Interest

    Keyless Door Unlocking Mobile Cloud Based Apps like Lockitron, ShareKey are growing interest from both the developers and the users. Let us have a deeper look.

  • Cloud Computing : Your Concerns and Thoughts of Richard Stallman

    Cloud Computing as terminology raises the eyebrows of some users who are associated with academics and computing for many years. Let us discuss on the topic.

  • Linux : Basics About Unix-like OS

    Linux referred to the usually free, unix-like Operating systems based on the Linux kernel and is GNU GPL based software. Licensing of the Linux kernel is under GNU GPL.

  • Contrast of Public Cloud and Private Cloud

    Contrast of Public Cloud and Private Cloud lies in various aspects. Naming system made a simple division as private and public cloud, but things are not easy.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cyberpunk Aesthetics: What’s in it Special January 27, 2023
  • How to Do Electrical Layout Plan for Adding Smart Switches January 26, 2023
  • What is a Data Mesh? January 25, 2023
  • What is Vehicular Ad-Hoc Network? January 24, 2023
  • Difference Between Panel Light, COB Light, Track Light January 21, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Security in the Cloud : The Divided Responsibilities," in The Customize Windows, January 18, 2013, January 29, 2023, https://thecustomizewindows.com/2013/01/security-in-the-cloud-the-divided-responsibilities/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT