How to evaluate, choose and work securely with cloud service providers
A comprehensive collection of articles, videos and more, hand-picked by our editors
What are the biggest cloud computing security risks, or "blind spots," that many providers tend to overlook?
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
The biggest security blind spot among cloud providers involves the fact that virtual servers have an intrinsic capability to create snapshots of memory and disk space at any given point in time. This creates a frozen image that can lead to an undetectable compromise of the virtual servers. The image can be examined, and when it includes all the in-operation encryption keys for Secure Sockets Layer (SSL), Secure Shell (SSH) , Internet Protocol Security (IPSec), etc., a hacker can gain control of a hosted server without leaving a footprint.
Related Q&A from Mooney Sherman
Cloud providers must cover security, access control and restoration time when negotiating DRaaS SLAs with customers, says cloud expert Mooney Sherman.continue reading
Crafting an SLA for DR in the cloud requires providers to address several issues up front with customers, according to cloud expert Mooney Sherman.continue reading
Cloud expert Mooney Sherman offers tips on how to evaluate various security architectures to provide optimal sensitive data protection in the cloud.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.