Cloud is increasingly being adopted for software deployment by ISVs across the industry in an attempt to access far cheaper infrastructure as a pay-as-you-use service. Thus there is no requirement for capital expenditure to own and maintain their infrastructure.Migrating an application to the Cloud comes with many advantages: on demand availability, subscription based charging model, fast scalability of both storage and CPU capacity, network management handled by the Cloud provider, reduced capital requirement, customer satisfaction and new social drivers for sales, and better customer value.
Gartner’s recent predictions are further indication of this movement to the Cloud. It is expected that by 2016, the impact of Cloud will create a clear separation between the emergent Cloud based ERP systems and the old highly customised legacy ERP systems. It is further expected that by 2018, at least 30% of service-centric companies will move the majority of their ERP applications to the Cloud.
Although, the many positive features of Cloud deployment are making it a platform of choice to many, Cloud security threats for many is still a hindrance to adoption. Cloud providers go to great lengths to make their services as secure as possible, but Cloud deployers have to still consider some more techniques for securing their application.
Some of the most common Cloud security threats for ISVs are:
1. Sensitive data breach
Whether the data breaches occur from external or internal person, its consequences can be catastrophic for the enterprises credibility, and the more sensitive the data the more the damage to its reputation. Encrypting the data is perhaps the best solution, but the downside is increased CPU usage and hence also cost. The encryption should be applied to all data that can in anyway inform the intruder of the content or value of any other related data. Since the Cloud deployment means you are location blind, legal obligations must be considered before placing personal data in the Cloud. Standard secure practices must be put in place when back door access is provided to the database.
2. Vendor credibility
It is always a good principle to purchase services from a long standing reputable and financially stable Cloud service provider. The move to Cloud is a major step for the enterprise and to take that step with an inexperienced or financially unstable Cloud service provider is never an option. It is always advisable to go with the best in class Cloud service provider.
3. IP protection
If you opt for shared services from your Cloud provider then you will also be sharing your IP with other web applications. There is nothing inherently wrong in this as the Cloud provider is going to manage the service levels for your purchase. The problem arises when the activities of the application that you are sharing the IP leads to a blocking of the IP, then your application will also be blocked. Consider not sharing your IP, and the consequent increased costs.
Enterprises that use private Clouds will mitigate many of the security risks when compared to a public Cloud. Although, a private Cloud is not necessarily a solution for enterprises of all sizes, as the cost can be excessive for most ISVs. If the choice is to use “Platform as a Service”, then the downside is vendor lock-in. The enterprise will be restricted to using only the database, for example, for which the vendor provides an API. The vendor’s security strategy for data, systems must be clearly understood by the enterprise prior to any decision.
Once you know what to expect and how much of a risk you can afford to take, you will be able to better craft a Cloud security strategy and properly utilize all the benefits of the Cloud technology.