Learning Guide

Security in cloud computing: Risks, remedies and priorities

Channel professionals are often responsible for addressing the security in cloud computing implementations. Ultimately, as a trusted advisor, your goal is to identify and

    Requires Free Membership to View

articulate your customers' cloud security challenges as well as provide offerings that both save your customers money and build stronger client relations. Solution providers face the task of securing cloud computing projects, and they often lack comprehensive work papers to help them along the way.

This Security in Cloud Computing guide offers a collection of original SearchSecurityChannel.com content that highlights cloud computing security risks, and how you can find and fix them.

Secure cloud computing how-to documents
(see links below)
Before you review our tips and expert articles, however, make sure you review the current, essential secure cloud computing how-to documents:, including those from the Cloud Security Alliance, European Network and Information Security Agency (ENISA) and National Institute of Science and Technology (NIST).

Cloud security audit checklists
(see links below)
Then move on to a helpful tip, where Beth Cohen, contributor to the Cloud Security Alliance, spells out what should be on every channel professional's cloud computing data security audit checklist. Cohen also highlights various cloud computing security audit issues, including legal and regulatory challenges, potential business integration problems and technical concerns like data integrity and privacy.

Cloud-based security services
(see link below)
VARS can also help customers by offering cloud-based security services to customers, including long-term archival services, customized reports for specific compliance mandates, data masking and least privilege access control. In a SearchSecurityChannel.com Q&A, Gartner Research analyst John Pescatore details emerging cloud-based security services, including those related to messaging security.

Automating the assessment and audit of cloud computing risks
(see link below)
The "value-add" for resellers needs to be about helping customers manage cloud computing risks effectively rather than just being collectors of data. Learn about CloudAudit, a program begun by director of cloud and virtualization systems at Cisco Systems Inc. Chris Hoff. See how the new directory and namespace aims to create an automated risk assessment and audit for cloud computing infrastructures.

Security in cloud computing: Cloud compliance
(see link below)
With new services and an intriguing technology model, what's the holdup? Cloud compliance is one reason why some of your customers may hesitate to move their data. Jim Reavis, co-founder and executive director of the Cloud Security Alliance, explains how to meet regulations like HIPAA and PCI DSS while transitioning to a cloud computing environment.

Send your feedback on our guide, Security in cloud computing: Risks, remedies and priorities. What other cloud computing security issues should be addressed in future tips?

This was first published in April 2010

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: