• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Shared Responsibility in Cloud Security

By Abhishek Ghosh December 22, 2018 5:32 pm Updated on December 22, 2018

Shared Responsibility in Cloud Security

Advertisement

When it comes to cloud computing, many companies first think of the benefits of technology. However, security still often falls by the wayside. The reasons are manifold – high complexity, unclear legal responsibilities and missing strategies mean that especially smaller companies see the security responsibility at the provider – a fallacy, which can have serious consequences in the worst case. If safety is neglected, it can undeniably have devastating consequences. But even today this self-evident knowledge has only gradually made it into the minds of motorists. This is proven by the sometimes very amusing articles, which regularly remind of the hysterical reaction of motorists in the introduction of seatbelts in 1975.

Now that the benefits of the cloud are scarcely disputed, the advent of widespread security awareness is still to come. When looking for the reasons for it is striking that especially small and medium-sized enterprises lag behind the development – a circumstance that has something to do with the available resources.

Shared Responsibility in Cloud Security

 

Holistic Security

 

Very few companies rely on a singular cloud solution in their everyday life, but mostly use a multi-cloud structure that is individually tailored to the company’s requirements in terms of its structure. The companies use different filesharing, virtualization or collaboration vendors and often a combination of on-premise and cloud solutions . But the more individual and modular the setup is, the more interfaces open up – potential break points for the safety of the entire system. This complexity can overwhelm especially small businesses quickly. The result is above all uncertainty, which leads to the fact that the responsibility is gladly unloaded on the shoulders of the respective provider.

Advertisement

---

Many rely solely on the provider for the security of their data, but public cloud providers like AWS, of course, have no end-user responsibility, which is always up to the user – but only a fraction of companies are aware of it To create awareness, to communicate meaning and gradually to bring the necessary know-how into the company The term cloud is often associated with a dilemma between productivity and security at the same time efficient clouds are possible.

Clouds are mostly for simplification: the industry is still at the beginning of a fundamental development in the cloud and IoT sectors, and new cloud solutions are continually creating new business models and potentially new risks Eliminating opportunities is a challenge. The idea of ​​efficiency has meanwhile also prevailed in the public sector, where the private cloud is experiencing strong growth, but the public cloud will never be a blanket alternative there.” Simplicity is still the best guarantee of security when building an infrastructure additional layers increase the complexity and thus the probability of security gaps. It is often forgotten that lax security has not been around since the cloud, for example, poor password protection could cause immense damage to the business, but the cloud will increase the attack surface significantly.

The digital transformation now allows employees to flexibly access data and intellectual property across countless systems, applications and devices to perform tasks anywhere, anytime, resulting in multiple vulnerabilities and potential compliance violations. Companies should take a holistic, end-to-end security approach to assess and control risks in real time, and in large companies, security has become more important and has already made it to the boardroom, with small and medium-sized businesses urgently needing to catch up Many see the responsibility solely with the provider, but they can never assume full liability, so a model of “shared responsibility” should be sought by leveraging our software-based security solutions can be implemented.

However, this is only partially liable, as the cooperation between user and cloud provider is generally based on the so-called Shared Responsibility model. Thus, providers are only responsible for the infrastructure itself, while companies are responsible for protecting their own data and applications.

This is all the more true with a look at the legal situation. The US Cloud Act, which allows US security authorities in certain cases access to European customer data, creates a situation in which many providers have the choice to either break the rules of the Cloud Act or the DSGVO. This creates a legal uncertainty whose solution is currently not in sight. Users must therefore ensure that their data does not fall into the wrong hands.

It’s about data that has long been collected and processed throughout the enterprise. Security must apply analogously to all levels. Responsibilities are still often delegated or integrated into existing processes that date back to times when the IT department alone was managing the enterprise infrastructure. These times are, so the unanimous opinion in the round, over.

In order to assess and control the diversity of cyber risks in real time, companies should adopt a holistic, end-to-end security approach.” In large companies, security has become more important and has already made it into boardrooms Companies urgently need to catch up in order to meet the security requirements of the advancing digitization, notes Sebastian Spann of Microfocus.

 

Conclusion

At the latest since the entry into force of the GDPR and potentially draconian penalties for violations of the rules and regulations, data protection and data security are also in the focus of the boardrooms. And since the widespread use of cloud solutions, appropriate precautions are urgently required. However, it is often forgotten that lax security measures in companies are not a new phenomenon. Even in the past, poorly protected passwords could cause immense damage to the company. However, the risk is significantly increased by the cloud – because it simply offers more attack surface due to the large number of interfaces. After all, each additional software layer increases complexity many times over – and with it the likelihood of security holes.

In addition, the development and operation of cloud-based business applications today no longer allow for post-deployment security as an add-on to an existing infrastructure. The widespread triumph of DevOps requires a Security by Default approach, which meets the dynamics of modern software development. When development becomes a process, then security must be considered process-wise.

Many companies still see a contradiction between productivity and security. According to the participants in the discussion, this misjudgment must be overcome. If appropriate security concepts are taken into consideration right from the start, are incorporated into the development process and also reach a cultural level, secure and at the same time efficient cloud solutions can be realized.

The need for a comprehensive change of consciousness is all the more true because development has just begun: the technological possibilities of the cloud are creating new, data-based business models. The Internet of Things creates a multitude of additional interfaces, which in turn require completely new, smart security concepts. At the end of this development is the use of artificial intelligence – both in the analysis and in the backup of data.

Tagged With cloud computing shared responsibility , cloud security blanket language:en , https://doc microsoft com/en-us/security/fundamental/shared-responsibility , shared responsibilities for security in cloud computing

This Article Has Been Shared 907 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Shared Responsibility in Cloud Security

  • Explained : This site works only in browsers with SNI support

    We have explained the implication of the error message “This site works only in browsers with SNI support”. It is a thing related to IPv4.

  • Brute Force SSH Test Own Server With ncrack, hydra, medusa

    Here is Real Life Way to Brute Force SSH Test Own Server With ncrack, hydra, medusa. These will give you idea why odd log entries appear too.

  • Configure and Setup SSHFP : SSH Fingerprint in the DNS

    Here is How to Configure and Setup SSHFP. SSHFP is SSH Fingerprint in the DNS. This Tutorial Must Be Tested on Development Server to Learn Before Deploying on Production Server.

  • Effectiveness of Flushing DNS Cache to Prevent DNS Cache Poisoning and Spoofing

    Effectiveness of Flushing DNS Cache to Prevent DNS Cache Poisoning and Spoofing Discussed in Details in Plain English Making Readable to All.

  • Solve NET::ERR SSL PINNED KEY NOT IN CERT CHAIN

    Do You Want to Solve Solve NET::ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN as Webmaster? Unfortunately Out of Immature Technology, There is No Manual Way.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What is Voice User Interface (VUI) January 31, 2023
  • Proxy Server: Design Pattern in Programming January 30, 2023
  • Cyberpunk Aesthetics: What’s in it Special January 27, 2023
  • How to Do Electrical Layout Plan for Adding Smart Switches January 26, 2023
  • What is a Data Mesh? January 25, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Shared Responsibility in Cloud Security," in The Customize Windows, December 22, 2018, February 1, 2023, https://thecustomizewindows.com/2018/12/shared-responsibility-in-cloud-security/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT