With increased performance, decreased costs and easy access of applications to the masses, cloud computing has been adopted by several enterprises today. It alleviates the problem of underutilisation of infrastructure and enables optimum usage of computing power and storage capacity. Cloud infrastructure can be deployed in operational models such as private cloud, public cloud or hybrid clouds. In any of these operational models – although the architecture supports high performance and improved access, these are the exact factors that aid cybercriminals as well.
There is always a tinge of worry when it comes to data being sent from clients to servers – especially due to the uncertain physical location of the data. Data spoofing, data leakage and unauthorized access – all pose a number of vulnerabilities in a shared infrastructure environment. Although there are a number of concerns there are also equal number of methods to identify risk factors and mitigate Cloud security risks. The aim is to reduce the attack surface and bolt in security at every layer or probable access point.
