Page 181 - How Cloud Computing Is Transforming Business and Why You Cant Afford to Be Left Behind
P. 181

D ANGERS ABOUND: SECURITY IN THE C L O UD



                 users—there would be far less interest in cloud computing
                 today than it currently enjoys.
                     Software as a service has many integration points with ap-
                 plications back in the corporate infrastructure and offers the
                 option of customers building custom objects that work with
                 the supplier’s application set. A customer of SaaS must be aware

                 of what security precautions his vendor has built into the SaaS
                 services. He needs to establish for himself that the data gen-
                 erated in SaaS applications is securely stored in the SaaS en-
                 vironment and remains transferable to him on demand. In
                 extending SaaS applications with custom objects, the customer
                 must adhere to the programming and security conventions
                 demanded by the vendor’s computing platform or risk dis-

                 rupting the vendor’s cloud.
                     When Salesforce.com scrutinizes a customer submission,
                 it is with an eye to strict adherence to its stated allowances. The
                 customer must be “especially concerned about the software
                 development lifecycle” of its SaaS supplier, says the Cloud
                 Security Alliance. That is, is the supplier acting in a timely
                 manner to deal with new threats and staying abreast of the
                 state of the art in protecting the service from hackers?
                     As we have seen, each form of cloud computing carries its

                 own risks, options, and rewards. In this young industry, it’s still
                 caveat emptor, but at the same time early adopters will be re-
                 warded with experience in how cloud computing works and
                 where competitive advantage might flow from its cost struc-
                 ture. The current shallow trust boundaries within the cloud
                 are going to be pushed back to allow more and more trusted
                 interactions.



                                                                     161
   176   177   178   179   180   181   182   183   184   185   186