ARCHIVED CONTENT
You are viewing ARCHIVED CONTENT released online between 1 April 2010 and 24 August 2018 or content that has been selectively archived and is no longer active. Content in this archive is NOT UPDATED, and links may not function.Extract from article by Larry Biagini
In enterprise IT, cloud security remains a topic of contention. Many IT and security leaders fear that a move to the cloud could cause problems, such as losing control of sensitive data. While concerns about risk are understandable and need to be addressed, they’re often misplaced.
It’s time businesses are honest with themselves about in-house capabilities before dismissing security in the cloud. Traditional enterprise security is based on perimeter controls — a model that was designed for a world where all data, users, devices, and applications operated within the perimeter and within the security controls. But as today’s users blur the lines between activity inside and outside the perimeter, that model falls short because the perimeter is too big. I’d even say that in any mid- to large-size enterprise, there are more devices, users, and entry/exit points than the company knows about.
Cloud-centric computing is inevitable because the network, not your network, is just a conduit to allow access from trusted requestors to trusted resources. You will provide resources to those that you trust, when they need them and where they need them. The perimeter that will need protecting will be very small and contain services and properties that are critical to your business but not users. Users consume resources but are never on the cloud provider’s core network. If they were, their perimeter could not be protected. As you evaluate security in the cloud, be realistic about the risks because deferring the transition to cloud services is itself a risky proposition.
Read the complete article at Learning To Trust Cloud Security