The Cloud Security Alliance (CSA) released yet another paper at the RSA conference this year— Top Threats to Cloud Computing. This document is in relation to the recent CSA paper, Security Guidance for Critical Areas in Cloud Computing, v2 that was updated in December 2009. Since the v2 update and the release of the top threats document, the organization has fallen short to provide the industry with actual use-cases that illustrates true deployment scenarios of cloud computing environments, especially those 13 domains identified. Enterprises that are planning or who have actually made the leap to cloud computing environments are desperately seeking options to secure their services.
According to a recent Gartner report, organizations will spend more of their IT budget on private cloud computing, than public cloud computing through 2012. As the industry continues to move forward with cloud computing, particularly to a private cloud, need for use-cases is critical and timely for these companies, and a one-size fits all approach will not suffice. Thomas Bittman points out in his blog post, Cloud Computing: Through a Glass, Darkly, the key to private cloud computing is spending time with the design process and ensuring the architecture gives them enough flexibility to adjust as needed. This couldn’t be any truer from a security standpoint, and even more of a reason for a use-case paper.
Follow this discussion on Twitter @hyperguard