Follow Tweet This Facebook LinkedIn

Main menu

Skip to secondary content
Menu
  • Tech News
    • Last 48 Hours
    • Analytics
    • Artificial Intelligence
    • Careers
    • Cloud
    • Digital Transformation
    • Ecommerce
    • Education
    • Emerging Tech
    • Infrastructure
    • IT Workplace
    • Leadership
    • Managed Services & Outsourcing
    • Marketing
    • Mobility
    • Opinion
    • Privacy & Security
    • Public Sector
    • Software
    • Wireless & IoT
    • Women in Technology
    • Work from home
  • Resources
    • Reports and Whitepapers
    • News for CIOs
    • CIO Census
    • Digital Security Zone
    • Webinar Highlight Reports
    • Roundtable Highlight Reports
    • 2020 IT Salary Calculator
    • AI Directory
    • ITWC Talks
    • Featured Partner Content Hubs
    • Digital Magazines
    • Blogs
  • Events
    • Canada’s Top Women in Fintech/Blockchain
    • CANADA’S TOP WOMEN IN CYBERSECURITY
    • CIO OF THE YEAR
    • MapleSEC
    • UPCOMING EVENTS
    • FLAGSHIP EVENTS
    • VIrtual Events
    • Webinars
    • Roundtables
    • All IT World Canada Events
  • Videos
    • President to President
    • All Tech Videos
  • Podcasts
    • Cyber Security Today
    • #Hashtag Trending
    • Leadership in the Digital Enterprise
    • CMO Talks
    • ITWC Podcast Network
  • Engage
    • Blogger Opportunities
    • 2020 Vision
    • Gartner Corner
    • About Us
    • Privacy Policy
    • Contact Us
  • Subscribe
#TRENDING
  • Analytics
  • Women in Tech
  • MapleSEC
  • Work from home
  • Morning Briefing
  • Cloud
  • Technicity WEST

OUCH! Free Content gets hurt by enabled Ad Blockers

Please consider unblocking us or Subscribe in support of our great non-gated content.
Cloud Computing
Cloud Privacy & Security

Cloud security’s seven deadly sins

IT World Canada Staff
IT World Canada Staff
@itworldca
Published: August 9th, 2013
  • Data Loss/Leakage

    Data Loss/Leakage

    There isn’t currently an acceptable level of security controls surrounding data in the cloud. Some applications could be leaking data as a result of weak API access control and key generation, storage and management. And, data destruction policies may also be absent.

  • Shared Technology Vulnerabilities

    Shared Technology Vulnerabilities

    In the cloud, a single misconfiguration can be duplicated across an environment where many virtual servers share the same configuration. Enforce service level agreements (SLAs) for patch management and best practices for network and server configuration.

  • Malicious Insiders

    Malicious Insiders

    The level of background checks that cloud providers perform on staff may differ compared to how enterprises would prefer to control data centre access. Many providers may do a good job but it’s largely uneven. Perform a supplier assessment and outline a level of employee screening.

  • Account, Service & Traffic Hijacking

    Account, Service & Traffic Hijacking

    A lot of data, applications and resources are concentrated in the cloud where, with weak authentication, an intruder can access a single user account and ultimately get at that customer’s virtual machines. Proactive monitoring of threats and two-factor authentication is advised.

  • Insecure Application Programming Interfaces

    Insecure Application Programming Interfaces

    It’s important to perceive the cloud as a new platform and not merely as outsourcing when it comes to developing applications. There ought to be a vetting process surrounding application lifecycles, where the developer understands and applies certain guidelines regarding authentication, access controls and encryption.

  • Abuse and Nefarious Use of Cloud Computing

    Abuse and Nefarious Use of Cloud Computing

    The bad guys are probably more progressive than the good guys in how they use technology. Hackers are seen very quickly applying new threats combined with the ability to easily scale up and down in the cloud. All it takes is a single credit card to open up the floodgates.

  • Unknown Risk Profile

    Unknown Risk Profile

    Transparency issues continue to persist concerning cloud providers. Account users only interact with the front-end interface and really don’t know what goes on in the backend. Who knows which platforms or patch levels the provider is employing?

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7









Tweet This Facebook LinkedIn google+
Cloud, Privacy & Security
The biggest e-waste offenders
The biggest e-waste offenders
Cloud Computing on camera

Related Content

Technicity West welcomes Calgary Mayor Naheed Nenshi

Technicity West: What’s next for digital government?

Digital Transformation Awards nomination
Sponsored By:

Myth busting: Seven reasons not to submit a Digital Transformation Award nomination

Sponsored By: AMC

Convergence of the titans: Today’s top technologies meet in Toronto

Supercluster cements global leadership in 5th Machine Age with ground-breaking protein production addressing global food insecurity

Fraud Prevention Month: Fight business email fraud

Max level vulnerability found in Logix PLCs

Citrix completes acquisition of Wrike

Tweets by itworldca

Follow
Tweet This Facebook LinkedIn google+

Subscribe
Resources CanadianCIO Digital Security CMO Digital CDN Magazine IT Salary Calculator LightningPR Webinars and Events Tech Research Partner Content
IT World Canada Community About Us Contact Us Technology Videos IT News IT Blogs Mobility News Cloud Computing Technology Topics ITWC Talks
ITWC Websites ITWC.ca Channel Daily News.com IT World Canada.com IT Business.ca Direction Informatique.com
© 2021 IT World Canada