Cloud computing presents a new model for IT service delivery and it typically involves over-a-network, on-demand, self-service access, which is dynamically scalable and elastic, utilising pools of often virtualized resources. Through these features, cloud computing has the potential to improve the way businesses and IT operate by offering fast start-up, flexibility, scalability and cost efficiency. Even though cloud computing provides compelling benefits and cost-effective options for IT hosting and expansion, new risks and opportunities for security exploits are introduced. Standards, policies and controls are therefore of the essence to assist management in protecting and safeguarding systems and data. Management should understand and analyse cloud computing risks in order to protect systems and data from security exploits. The focus of this paper is on mitigation for cloud computing security risks as a fundamental step towards ensuring secure cloud computing environments
Reference:
Carroll, M, Van der Merwe, A, and Kotzé, P. 2011. Secure cloud computing: benefits, risks and controls. ISSA 2011. Hayatt Regency Hotel, Rosebank, 15-17, August 2011, pp 9
Carroll, M., Van der Merwe, A., & Kotzé, P. (2011). Secure cloud computing: benefits, risks and controls. http://hdl.handle.net/10204/5184
Carroll, M, A Van der Merwe, and Paula Kotzé "Secure cloud computing: benefits, risks and controls." (2011) http://hdl.handle.net/10204/5184
Carroll M, Van der Merwe A, Kotzé P. Secure cloud computing: benefits, risks and controls. 2011; http://hdl.handle.net/10204/5184.