Can security concerns kill cloud computing?

The IT industry has identified cloud computing as a major trend for the future. But how much of a barrier to its development and adoption will security be?

It seems as though not much new is happening in enterprise IT development that doesn't involve the cloud.

The uptake of outsourcing and software-as-as-service (SaaS) based delivery models has softened end-using organisations to the idea of not necessarily owning the IT infrastructure their business may rely on. The advent of the cloud has even encouraged blue-sky thinkers to declare it will, one day, render the IT department redundant.

But, despite the advent of more and more data centre-as-a-service-type launches, recent security issues involving the likes of vendors such as Salesforce.com and Google Docs have thrown a spotlight on the security risks associated with running IT in the cloud.

"There's been a lot of hype around cloud computing recently," said Ian Osborne, project director of the Grid Computing Now! initiative of IT trade body, Intellect. "It offers enterprises the opportunity to flex their IT infrastructure more dynamically to meet demand."

Open challenges

But he told IT PRO there were inherent challenges in extending cloud infrastructures out to enterprises in an open, virtual or utility' based way. "With very little agreement on standards, the issues of provisioning, security and ownership of the data could be major inhibitors to adoption," Osborne said.

In response, both enterprise IT suppliers and consumers have stepped up attempts to close security loopholes and offer best-practice solutions and guidance on governance, standards and compliance. In fact, it was just over a year ago that Gartner first warned IT organisations that alternative delivery models like cloud computing would make the governing principles that worked with the traditional models of buying, building and accessing IT irrelevant.

David Mitchell Smith, vice president and Gartner Fellow, said: "Why pay to build it and maintain it, if you can buy it in at a fraction of the price?"

But he added that one of the main challenges for IT organisations in adapting to this next technological revolution will be dealing with the cultural impact both internally and in the way IT interfaces with other functional areas, which is exactly where loopholes around data governance can open up.

Jericho looks to best practice

Earlier this month, the independent security expert group Jericho Forum announced it was focusing its activities on establishing best practices to meet the challenges of collaborating securely in the cloud. As a result, it has published a cloud cube model designed to provide clarity of vision on the essential areas organisations need to consider when evaluating a cloud-computing environment. "The cloud approach to organising business can be both more secure and more efficient than the old-style silo structure," said Adrian Seccombe, Jericho Forum board member, who is chief information security officer and senior enterprise information architect at healthcare giant Eli Lilly. "Viewed from a different perspective it opens a potential Pandora's box of security nightmaresnot least of which is loss of data confidentiality and integrity."

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

TsuNAME vulnerability could enable DDoS attacks on major DNS servers
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

7 May 2021
What are SSH keys?
cyber security

What are SSH keys?

7 May 2021
Google’s about to push everyone into two-factor authentication
Security

Google’s about to push everyone into two-factor authentication

6 May 2021
Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems
ethical hacking

Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems

5 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Dell patches vulnerability affecting hundreds of computer models worldwide
cyber security

Dell patches vulnerability affecting hundreds of computer models worldwide

5 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021