In Brief: Cloud computing is defined as "a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction" (Mell and Grance, 2009). Applications of cloud computing broadly span three areas known as "cloud service delivery models": (a) Infrastructure as a Service (IaaS), (b) Platform as a Service (PaaS), and (c) Software as a Service (SaaS).
The purpose of this study is to describe and identify key public cloud computing IT-related risks as reported in selected literature. IT-related risk is defined in this study as "the net mission/business impact considering . . . the likelihood that a particular threat source will exploit, or trigger, a particular information system vulnerability" (Stoneburner, et al., 2004, p. A-2).
Cloud computing frees organizations from the need to buy and maintain their own hardware and software infrastructure.
This review focuses on a presentation of the primary IT-related risks of cloud computing and suggested mitigation strategies. IT-related risks are classified into three risk categories:
(1) Policy and organizational risks, which are business-related IT risks that organizations may face when considering cloud computing service providers. Such risks include lock-in, loss of governance, compliance challenges, loss of business reputation, and cloud service termination or failure;
(2) Technical risks, which are IT-related risks that have a direct, technological impact on the cloud computing systems that host customer programs and/or data. Such risks include availability of service, resource exhaustion, intercepting data in transit, data transfer bottlenecks, and distributed denial of service; and
(3) Legal risks, which include the IT-related risks that are legal in nature and can also have a negative impact on an organization using cloud computing services. Legal risks include subpoena and e-discovery, changes of jurisdiction, data privacy, and licensing.
Mitigation strategies include: (a) audit controls, (b) policies and procedures, (c) service level agreements, and (d) other forms of governance.
Figure 1 presents an overview of fourteen key IT-related cloud computing risks, which represent the most frequently cited concerns for security practitioners to consider. Each risk is reviewed within three major risk categories as defined by ENISA (2009, p. 23). Three aspects of each risk category are summarized, including the risk level, probability, and impact.
|Risk Category||Risk||Risk Level||Probability||Impact|
|Loss of governance||High||Very High||Very High (IaaS Very High, Saas Low)|
|Compliance challenges||High||Very High (depends on PCI, SOX)||High|
|Loss of business reputation||Medium||Low||High|
|Cloud service termination or failure||Medium||N/A (not rated by ENISA)||Very High|
|Technical||Availability of service||N/AAlthough not listed as a specific risk by ENISA (2009), this risk was frequently cited by other experts, including Armbrust, et al. (2009), who listed it as the top obstacle to cloud computing acceptance.|
Medium (Additional Capacity)
Low (Current Capacity)
Low/Medium (Additional Capacity)
High (Current Capacity)
|Intercepting data in transit||Medium||Medium||High|
|Data transfer bottlenecks||High||Medium||Very High|
|Distributed denial of service||Medium||
Very High (Provider)
|Legal||Subpoena and e-discovery||High||High||Medium|
|Changes of jurisdiction||High||Very High||High|
Figure 1Key IT-Related Cloud Computing Risks.
Research Paper Author: Thomas J. Betcher2010 AIM Graduate
Abstract: Although the benefits of cloud computing are well known, safety concerns have received less attention. This review of selected literature, published between 2007 and 2009, identifies key IT-related cloud computing risks that should be considered by security practitioners. Three types of cloud computing risks are examined: policy and organizational, technical, and legal. Risk mitigation strategies are also explored, and include audit controls, policies and procedures, service level agreements, and other forms of governance.