Managing security in the cloud

April 2018 Editor's Choice, Information Security, Security Services & Risk Management

According to BT’s CEO 2017 survey, cloud computing is cited as one of four critical technology trends (others include Internet of Things, mobile computing and social media) that are likely to have the most significant impact on business over the next two to three years. But, is it secure?

Alessandro Postiglioni.
Alessandro Postiglioni.

It’s also important to note that cloud computing is founded on a virtual environment, where the threats that apply to virtualisation also apply in the cloud computing space. Added to this, as cloud computing expands to cover data stored in private and public clouds, and on numerous roaming mobile devices, security is expanding out of the data centre. This leaves security decision-makers without visibility or control of cloud applications used within their environments – and new threats are inevitable.

Some of the main issues that businesses face when it comes to cloud security, include:

• Visibility – businesses can’t ‘see’ sanctioned and unsanctioned cloud applications, so they have no visibility of the cloud applications used by employees within the business (or the risk associated with them).

• Threats – whether from compromised accounts, insider threats and/or malware attempting to move data to and from the cloud, businesses are constantly at risk from cyber criminals. Below I’ve listed seven major potential threats that BT has identified.

1. Virtualisation and hypervisor based attacks.

2. Insider threat across the Cloud Service Provider (CSP) and the business.

3. Malware and data movement and remnants.

4. Phishing attacks to compromise accounts.

5. Legal and jurisdictional threats.

6. Threats to physical infrastructure.

7. Threats to shared infrastructure.

• Compliance – data-leak prevention solutions in data centres can’t protect businesses against data exfiltration by remote or bring-your-own-device (BYOD) users.

• Collaboration – businesses have no visibility of whose files are shared with or who has access to them, and they can’t apply policy around secure collaboration.

• Data security – there is no way to consistently apply encryption across sanctioned applications, or control access to sensitive data from unmanaged devices.

• Inconsistent security policy – businesses can’t consistently apply policy across all cloud applications users are collaborating with.

With the above in mind; any business considering cloud services should reflect the following questions, so as to better understand who needs to take ultimate responsibility for security at the end of the day.

• Who’s really responsible for my data? The short answer is, the client/business is. As the owner, it is their responsibility, and not the CSPs to secure their clients’ data.

• Where is my data? Although it’s in the cloud, it must also reside in a physical location. This must be discussed with the CSP as to which country/countries the data will reside in – and businesses should be aware that different countries have difference requirements and controls placed on access.

• Who has access to my data and my code? Insider attacks are a huge risk, and a potential hacker can be someone with approved access to the cloud. The client/business will need to know who will be managing their data and the types of control applied to these individuals.

• What is the current maturity and long-term viability of my chosen CSP? How long have they been in business? What’s their track record? Are they operationally effective and secure? If they go out of business, what happens to the data?

• What happens if there’s a security breach? What support will the client/business receive from the CSP?

• What is the disaster recovery/business continuity plan? The data is physically located somewhere, and all physical locations face threats, such as fire, storms, natural disasters, and loss of power, for example. It’s therefore important for a client/business to understand how their chosen CSP will respond, and what guarantee of continued services they promise.

A business’ data can actually be safer in the cloud – if cloud is used effectively and securely, and the business has solid endpoint protection measures in place. And, possibly even more safe when partnering with a reputable CSP who is able to offer a managed cloud solution through advanced self-service IaaS capability; allowing businesses to manage their own virtual infrastructure and cloud solutions – from virtual machines to the network, storage and security – from the cloud.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.