August 2, 2016 By Preethy Soman 2 min read

Organizations around the world understand the importance and the challenges of cloud adoption, and they continue to adopt the technology at a fast pace. Gartner predicted that the cloud market in India will reach $3 billion by 2017, which represents an almost fivefold increase from 2012.

Challenges of Cloud Adoption

On one hand, while cloud promises to change the way businesses run, it also presents significant challenges relating to information security and privacy. Organizations need to understand that, in addition to cost reduction and the ability to move from one licensing model to another, the major drivers behind cloud adoption should be transformation and innovation.

The Asia Cloud Computing Association’s “Cloud Readiness Index (CRI) 2016” recognized Hong Kong, Singapore, New Zealand and Australia above markets such as Germany, the U.K. and the U.S., showing that Asian economies are leading the world in cloud readiness but are extremely cautious about making the jump.

Below are some contributing factors:

Data Security

The cloud is an off-premises system, with data centers most likely residing in the U.S. and Europe. A strong security strategy is necessary to protect data, prevent cyberattacks and comply with international regulations, but it should not impact performance. Encryption of data being sent to the cloud and decryption of files back from the cloud should not impact the user experience.

Lack of Standardization

A provider could have the latest security features, but due to the general lack of cloud standardization, there are no clear-cut guidelines unifying cloud providers. Given the increase of cloud providers in different sectors, this is a huge problem for clients in determining how safe their data really is.

Legal and Regulatory Requirements

IT governance and risk managers need to work closely with the business to understand key cloud computing principles and to help establish effective governance practices.

Integration and Portability

Onboarding to the cloud platform is one of the key challenges faced by organizations looking to adopt cloud. Onboarding requires portability of key components that can be moved to the cloud and determining their interoperability with components that remain on in-house systems.

Cloud Security Is a Shared Responsibility

The biggest challenge that needs to be addressed is the notion that security is in the hands of the cloud provider. Security is a shared responsibility, and experts stress that the customer actually bears most of it. The majority of cloud threats can be avoided by ensuring basic security practices, such as:

  • Know where your data resides.
  • Use encrypted cloud services.
  • Use strong passwords and change them frequently.
  • Employ endpoint control over all devices accessing the data.
  • Create a backup schedule.
  • Stay alert, never assume and don’t take shortcuts to security.

Read the IDC white paper: A CISO’s Guide to Enabling a Cloud Security Strategy

More from Cloud Security

AI-driven compliance: The key to cloud security

3 min read - The growth of cloud computing continues unabated, but it has also created security challenges. The acceleration of cloud adoption has created greater complexity, with limited cloud technical expertise available in the market, an explosion in connected and Internet of Things (IoT) devices and a growing need for multi-cloud environments. When organizations migrate to the cloud, there is a likelihood of data security problems given that many applications are not secure by design. When these applications migrate to cloud-native systems, mistakes in configuration…

New cybersecurity sheets from CISA and NSA: An overview

4 min read - The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) have recently released new CSI (Cybersecurity Information) sheets aimed at providing information and guidelines to organizations on how to effectively secure their cloud environments.This new release includes a total of five CSI sheets, covering various aspects of cloud security such as threat mitigation, identity and access management, network security and more. Here's our overview of the new CSI sheets, what they address and the key takeaways from each.Implementing…

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today