Cloud computing can and does mean different things to different people. The common characteristics most share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from nearly anywhere, and dislocation of data and services from inside to outside the organization. While aspects of these characteristics have been realized to a certain extent, cloud computing remains a work in progress. The National Institute for Standards and Technology (NIST) Cloud Computing Guidelines on Security and Privacy document lets the cloud service provider off the hook for security. It's hard for the customer to see what insider threats might occur, how virtualization security is being handled and most of the providers are loath to document what controls they have put in place if any. In the end, who is responsible for Cloud Security? END USERS, says the NIST!
Where would you rather drop your wallet - on the hallway of your home, or on a busy sidewalk downtown?
Similarly:
- Where would you rather have a tire blowout? On your driveway or on a public street?
- Where would you rather throw away a hard disk you haven't completely erased - or paper documents poorly shredded - in your private dumpster, your fireplace, someone else's dumpster, or a public recycle bin?
- Where would you rather talk about corporate secrets? In your conference room, or your ISP's conference room?
- In which scenario will greater loss of life occur? One plane out of one - with 300 passengers aboard - crashes, or one of 300 planes - each with 1 passenger aboard - crashes? Where is your laptop less likely to get stolen, your shoulder less likely to be surfed, your body less likely to catch a cold?
- Where would you rather use your password to log in - taking the risks that accompany that action - from your desk to your server room in the same building occupied exclusively by you, or from your desk to another company's server room in another city?
Clouds offer the cost benefits that they do - which go almost entirely to their owners - via the sharing of resources. The flip side of this coin - the exact same thing restated - is that they deny any and all benefits availed by the use of the opposite - user-owned, dedicated resources.
So:
- Your switched traffic can now be sniffed, whereas it wasn't before
- You can not erase your hard disks when you are done using them, whereas you could before
- Your stuff can be seized by the FBI when your neighbor gets investigated, whereas it wasn't before
- Your security can't be known to be correct, whereas it -could- have before, had you spent the time to do so. Admittedly, nobody does, by and large.
The biggest benefit by far - the dollars in cost savings from the power and cooling reductions and from overbooking go to the cloud owner, not the customer. Learn the facts and get a professional involved before dedicating your proprietary assets to an environment that you have no control over.
