Malicious insiders could hurt cloud computing

The future will see many businesses asking questions about how their data is secured in the cloud.

A Symantec security expert has warned companies offering services in the cloud that malicious insiders could render security controls useless.

Guy Bunker, chief scientist at Symantec, said that cloud service administrators had "god-like status" when it came to accessing confidential data.

He said that there were already low-key legal cases being taken against cloud service providers, where administrators had access to data.

Bunker said: "This isn't just cases in the cloud we've seen this in enterprises where somebody within the organisation who has access to the data has decided to take it and sell it on to somebody else."

Bunker was speaking at a Symantec-held event about how businesses should cope with cloud computing in terms of security.

The Symantec expert also said that enterprises often didn't know what their sensitive information was or even where it was, and that the cloud compounded the issue.

He said: "The reality moving forward in two to three years is that there will be a much shorter relationship [between businesses and cloud computing vendors]."

He added: "What happens to the data that you put out there and process? Apparently there's no assured delete has the data actually been deleted from the cloud?"

Other speakers suggested that there was no possible international regulatory solution when it came to securing cloud computing, and that the best hope was for businesses to organise a technical standards body.

John Carr, secretary of the UK's Children Charity Coalition for Internet Safety, suggested that there should be a kitemark' - a technical standard for cloud computing.

He said: "Only the businesses can do that. I seriously doubt there is any governmental institution that can get even close."

Featured Resources

Four cyber security essentials that your board of directors wants to know

The insights to help you deliver what they need

Download now

Data: A resource much too valuable to leave unprotected

Protect your data to protect your company

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

Recommended

DeviceSHIELD combats rising cyber attacks and online fraud amid COVID-19
Security

DeviceSHIELD combats rising cyber attacks and online fraud amid COVID-19

24 Nov 2020
350,000 Spotify users hacked in credential stuffing attack
Security

350,000 Spotify users hacked in credential stuffing attack

24 Nov 2020
WAPDropper malware hooks you up to premium telecoms services
Security

WAPDropper malware hooks you up to premium telecoms services

24 Nov 2020
VMware sounds alarm over zero-day flaws in multiple products
Security

VMware sounds alarm over zero-day flaws in multiple products

24 Nov 2020

Most Popular

macOS Big Sur is bricking some older MacBooks
operating systems

macOS Big Sur is bricking some older MacBooks

16 Nov 2020
46 million Animal Jam accounts leaked after comms software breach
Security

46 million Animal Jam accounts leaked after comms software breach

13 Nov 2020
How computing has revolutionised Formula 1
Sponsored

How computing has revolutionised Formula 1

11 Nov 2020