The Status of Cloud Security

Click through to see key finding from a survey from the Ponemon Institute, sponsored by CA Technologies.

Are Cloud Computing Resources Evaluated for Security Prior to Deployment?

Roughly half the time they are not.

Attributions about Cloud Security

Faith in cloud security practices appears to be lacking as well.

Five Attributes of Cloud Security

IT security people are theoretically responsible for cloud computing providers.

Job Function Most Responsible for Ensuring a Secure Cloud Computing Environment

In fact, it looks like internal IT is not accepting responsibility for actions of business users.

The Cloud Computing Provider is Most Responsible for Security

But there seems to be a disconnect over just who really is responsible for security.

Job Function Most Responsible for Ensuring a Secure Cloud Computing Environment

In fact, it looks like internal IT is not accepting responsibility for actions of business users.

Percentage of Business-Critical Applications or Services in the Cloud

Adoption may be moving faster than security people can keep up.

Reasons for Migrating Corporate IT to Cloud Computing Environments

Cost is the single biggest driver.

How Confident Are You that Your Organization Knows All the Cloud Computing Resources in Use?

About half appear to not have as much control over IT as needed.

Most Significant Differences between On Premise and Cloud Computing Security

Clearly most feel that on-premise security is superior.

Technologies Most Important for Securing Cloud Computing Environments

Top three are neck-and-neck.

Seven Known Security Risks in Cloud Computing Environments.

The risks grow as the amount of data in the cloud increases.

Types of Information Too Sensitive to Put in the Cloud

All that’s left is data that’s of little to no use.

Top Five Critical Areas of Focus for Organizations Migrating to Cloud Computing

Identity and access management is always the biggest problem.

Source: CTO Edge