IAS Module 2
IAS Module 2
IAS Module 2
and Technology
BSIT
I. INTRODUCTION:
Cloud security is a collection of procedures and technology designed to address external and internal threats
to business security. Organizations need cloud security as they move toward their digital transformation
strategy and incorporate cloud-based tools and services as part of their infrastructure.
BSIT
Lower IT costs: Cloud lets you offload some or most of the costs and effort of
purchasing, installing, configuring, and managing your own on-premises
infrastructure.
Improve agility and time-to-value: With cloud, your organization can start
using enterprise applications in minutes, instead of waiting weeks or months for
IT to respond to a request, purchase and configure supporting hardware, and
install software. Cloud also lets you empower certain users—specifically
developers and data scientists—to help themselves to software and support
infrastructure.
Scale more easily and cost-effectively: Cloud provides elasticity—instead of
purchasing excess capacity that sits unused during slow periods, you can scale
capacity up and down in response to spikes and dips in traffic. You can also take
advantage of your cloud provider’s global network to spread your applications
closer to users around the world.
BSIT
2. Cost Management
Even as almost all cloud service providers have a “Pay As You Go” model, which
reduces the overall cost of the resources being used, there are times when there
are huge costs incurred to the enterprise using cloud computing. When there is
under optimization of the resources, let’s say that the servers are not being used
to their full potential, add up to the hidden costs. If there is a degraded
application performance or sudden spikes or overages in the usage, it adds up to
the overall cost. Unused resources are one of the other main reasons why the
costs go up. If you turn on the services or an instance of cloud and forget to turn
it off during the weekend or when there is no current use of it, it will increase the
cost without even using the resources.
3. Multi-Cloud Environments
BSIT
multiple clouds. This often ends up being hindered and difficult to manage for the
infrastructure team. The process most of the time ends up being highly complex
for the IT team due to the differences between multiple cloud providers.
4. Performance Challenges
BSIT
BSIT
Cloud Security
Cloud security is a discipline of cyber security dedicated to securing cloud
computing systems. This includes keeping data private and safe across online-
based infrastructure, applications, and platforms. Securing these systems
involves the efforts of cloud providers and the clients that use them, whether an
individual, small to medium business, or enterprise uses.
Cloud security is the whole bundle of technology, protocols, and best practices
that protect cloud computing environments, applications running in the cloud,
and data held in the cloud. Securing cloud services begins with understanding
what exactly is being secured, as well as, the system aspects that must be
managed.
The full scope of cloud security is designed to protect the following, regardless of
your responsibilities:
Engineering-Computing Academy of Science
and Technology
BSIT
1) Multifactor authentication
Engineering-Computing Academy of Science
and Technology
BSIT
3) Permissions sharing
Another way to assist cloud computing security is to track who you allocate permissions
to, as well as exactly what they can access with those permissions. Data can often be
compromised through the lax sharing of credentials or not updating the systems when
someone leaves the company or changes roles. Companies should ensure employees
do not share their account details with anyone as another essential security measure.
4) Ensure encryption
We recommend that any data passed between your company and the cloud is
encrypted. You can do this through a virtual private network (VPN), which ensures all
Engineering-Computing Academy of Science
and Technology
BSIT
users benefit from a standard level of encryption. As the name suggests, VPNs are
private connections that nobody outside the network can access – especially useful for
remote working. There are also several third-party encryption tools out there you can
use to encrypt files before uploading them, should you prefer to do that.
BSIT
While the potential security issues in cloud computing may seem daunting, the pros far
outweigh the cons. Employing strong, but simple security measures and finding a
trustworthy cloud provider will help to ensure your data is safe. Find out more about
our cloud services online and get in touch with the team today to discuss your
migration.
IV. ASSESSMENT:
1. Define Cloud Computing
2. What are the cloud computing security measures?
Reference List:
Cloud Computing
https://blog.stormid.com/7-cloud-computing-security-measures-to-take-now/