Security Focus Africa June 2022 Vol 40 No 6

Page 14

CLOUD SECURITY

Top threats to cloud computing:

a ‘marked change’ in traditional security concerns Traditional security concerns around the cloud – including data loss and denial of service – are being over-shadowed by fears of inadequate security controls as consumers become increasingly cloud-savvy.

T

hat’s according to the recentlyreleased Top Threats to Cloud Computing: The Pandemic 11 by the global Cloud Security Alliance (CSA). The report, the sixth in its Top Threats to Cloud Computing series, found that many of the more than 700 respondents’ major fears had moved from data loss and denial of service (DoS) to concerns around control plane weaknesses, metastructure and applistructure, and limited cloud visibility. Debuting cloud threats A weak cloud control plane refers to inadequate or insufficient security controls, explains the CSA, such as a lack

14

SECURITY FOCUS AFRICA JUNE 2022

of two-factor authentication and the ability to enforce its usage. Metastructure refers to the mechanisms that provide the interface between the infrastructure and other layers; applistructure describes applications deployed in the cloud and the services used to build them. “Collectively, these security issues are a call-to-action for developing and enhancing cloud security awareness, configuration, and identity management,” says Jon-Michael C. Brook, co-chair Top Threats Working Group, and one of the paper’s lead authors. “As cloud business models and security tactics evolve, there is an even greater need to address security issues that are situated higher up the technology stack and are the result of senior management decisions.”

Andrew Cruise.

securityfocusafrica.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.