Untitled document edited 4
Many businesses being run in the world are shifting most of their efforts and workloads to the
cloud because they want to make their efficiency move higher and increase from the initial level
they are to another better level. Moreover, those businesses want to streamline their workloads
since there is a lot of workload under operation. However, some risks come along as a result of
cloud adoption, and therefore, businesses should not rush into adopting its strategy without
having a better understanding. There are five common security risks of cloud computing: limited
visibility into network operations, malware, compliance, loss of data, and inadequate
diligence(Chaves, 2011). Nonetheless, since every challenge has a solution, there are ways in
which an organization makes efforts to ensure that security is maintained, which includes risk
assessment, users control tool, automation, and continuous monitoring. Ideally, with all that,
firms have the power and ability to test their cloud security infrastructure is well maintained.
There are five basic risks that organizations should consider when moving to adopt cloud
computing. Ideally, these risks include, first and foremost, the visibility network operations
whereby the organization should forfeit given level visibility that is mostly involved with
network operations when the organization is moving assets and workloads to the cloud. Ideally,
considerations on this are important because some responsibilities of ensuring maintenance of
some systems and policies move to cloud service providers. Moreover, the shift of the service
may be in scope depending on the service model used. Therefore, as a result, firms should be
frontline to ensure that they monitor their infrastructure networks, not relying upon most
loggings and network-based monitoring.
Moreover, through organizations shifting most of their data and information to an internetconnected cloud environment, the organization is increasing additional cyber threats chances to
themselves, hence malware. Malware attacks are the most known types of threats to most
organizations’ cloud security. Most organizational data become unsecured hence making the
organization experience data breaches. Also, it’s well known that cybercriminal is increasing day
by day, making a lot of organization lose trust in their clients; hence the rate of their profits goes
down, which may cause a business to collapse.
Furthermore, data privacy is increasing in many organizations making compliance regulations
more stringent. Ideally, organizations face the risk of their clients moving from their companies
and going to other companies where informational data is highly secured from loss, theft, and
information security. Also, proper security measures are significant for any growing
organization, and therefore, cloud security ensures that all this is maintained.
In addition, another form of risk involved in cloud computing is the loss of data. Many
organizations face the challenge of data leakage after the cloud service providers undergo some
issues of attack or breach. As a result, the organization will be held responsible for any chance of
damages alongside losing its data. Therefore, its evident data loss is an issue that is commonly
involved with cloud computing, and organizations may lose their clients and capital.
What’smore, inadequate due diligence is another form of risk involved in cloud computing.
Many organizations lack adequate knowledge of how much work is involved in the transition.
In light of every challenge facing the organization, there are alternative ways of solving the
That said, there are ways of bolstering security in cloud computing, including a risk assessment
to identify any potential gaps so that the organization can make informed decisions and ensure
security improvement. Also, users should have access control whereby the organization
considers various methods such as zero-trust security. Another key factor is continuous
monitoring to ensure cyber hygiene and determine security posters (Garg and Rathi, 2019)s. That
said, it’s evident that the article provided has proposed viable solutions to cloud-based risk
management since it ensures that there is maintenance monitoring and management application,
report services, transport partners who ensure data security, and a confidential reporting service.
In conclusion, organizations should have adequate knowledge of cloud security to move towards
achieving their goals. That said, organizations should have adequate knowledge of the basic
security needs, including malware, limited visibility into network operations, compliance, loss of
data, and inadequate diligence. With that in mind, organizations can avoid issues leading to their
downfall. However, there are some guidelines that organizations should consider to ensure that
they avoid the downfall that comes as a result of cloud computing which includes risk
management, user access controls, and continuous monitoring.
Chaves, S., 2011. The Risks Issue in Cloud Computing. SSRN Electronic Journal,
Garg, A. and Rathi, R., 2019. A Survey on Cloud Computing Risks and Remedies. International
Journal of Computer Applications, 178(29), pp.35-37.