How to evaluate, choose and work securely with cloud service providers
A comprehensive collection of articles, videos and more, hand-picked by our editors
What are the biggest cloud computing security risks, or "blind spots," that many providers tend to overlook?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The biggest security blind spot among cloud providers involves the fact that virtual servers have an intrinsic capability to create snapshots of memory and disk space at any given point in time. This creates a frozen image that can lead to an undetectable compromise of the virtual servers. The image can be examined, and when it includes all the in-operation encryption keys for Secure Sockets Layer (SSL), Secure Shell (SSH) , Internet Protocol Security (IPSec), etc., a hacker can gain control of a hosted server without leaving a footprint.
Related Q&A from Mooney Sherman
Cloud providers must cover security, access control and restoration time when negotiating DRaaS SLAs with customers, says cloud expert Mooney Sherman.continue reading
Crafting an SLA for DR in the cloud requires providers to address several issues up front with customers, according to cloud expert Mooney Sherman.continue reading
Cloud expert Mooney Sherman offers tips on how to evaluate various security architectures to provide optimal sensitive data protection in the cloud.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.