Five Hidden Risks with Public Cloud Usage

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Hidden Risks with Public Cloud Usage-6 Next

Compliance Shortcomings

Risk #5: Data compliance shortcomings.

Data compliance regulations like PCI DSS, ITAR, SOX, GLBA, HIPAA and HITECH offer specific guidance on handling personal information and cloud compliance for sensitive data. As the CSO, you don't want to be left holding the bag for a surprise non-compliance situation involving your public cloud environment. Know your CSPs and their ability (or lack thereof) meet data compliance guidelines.

For example, the Gramm-Leach-Bliley Act (GLBA) Financial Privacy Rule requires institutions to provide an annual notice to customers explaining how their data is maintained and shared as well as the steps that are taken to protect it. Clearly, the use of the services of an outside cloud provider complicates matters greatly. Loss of full control of the data makes compliance with this rule quite challenging. Also, the Safeguards Rule requires institutions to implement an information security program and the adoption of public cloud services can significantly complicate this task. Many financial institutions are wrestling with the loss of data control that comes with the business benefits of cloud adoption.

As usage continues to expand across industries around the world, it's apparent that even more mission-critical operations and services will be moved to the cloud in the coming years.

According to a recent survey from Business Cloud News, the majority of respondents are planning a significant increase in cloud adoption in the next two years. This predicted growth of the cloud begs some questions about the current state of the cloud, including the hidden sources of risk with public cloud usage.

While many enterprises are clearly realizing promised benefits, there are still challenges and a consistent set of concerns. Before companies can move a new process to the cloud or expand current deployments, they need to understand the risks. In this slideshow, Perspecsys, a leader in enterprise cloud data protection solutions, takes a closer look at five hidden sources of risk associated with public cloud usage.


Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

More Slideshows

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

cloud50-190x128.jpg How to Use the Cloud to Become a High-Velocity Business

Cloud SaaS adoption allows organizations to gain the flexibility and scalability necessary for creating a high-velocity business. ...  More >>

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.