Over a million developers have joined DZone.

Black Hat 2016: Could a Single Breach in the Cloud Affect All Customers? [Video]

Watch as one industry specialist outlines a potential risk as businesses and developers come to rely more and more on the cloud.

· Cloud Zone

Download the Essential Cloud Buyer’s Guide to learn important factors to consider before selecting a provider as well as buying criteria to help you make the best decision for your infrastructure needs, brought to you in partnership with Internap.

“When you put all your data in one spot there’s this aggregation going on. There’s a potential that one issue could lead to lots of problems for organizations. We’ll call that a systemic risk,” said Jake Kouns (@jkouns), CISO for Risk Based Security, in our conversation at the 2016 Black Hat conference in Las Vegas. “Companies are a little concerned that now a problem with your neighbor in the cloud could lead to problems with your data.”

A traditional data breach would have to happen 1,000 times to infect 1,000 companies, said Kouns. But now there’s a possibility that one authorized access could infect 1,000 companies.

Kouns, like many others, advises to ask lots of questions of one’s cloud provider when making the move the cloud. Given the potential for systemic cloud risk, ask what the cloud provider is doing to prevent cross-contamination from one client to another. What’s being shared? Ultimately, you want to know your potential exposure.

Much of cloud security isn’t necessarily about what hardening techniques one has in place, but rather what legal agreements a company has with its cloud provider, outlining who’s responsible for what security measures.

This is important because so often Kouns’ clients don’t realize their responsibilities. They just assumed it’s all being handled in the cloud.

The Cloud Zone is brought to you in partnership with Internap. Read Bare-Metal Cloud 101 to learn about bare-metal cloud and how it has emerged as a way to complement virtualized services.

cloud security,data,risk

Published at DZone with permission of David Spark. See the original article here.

Opinions expressed by DZone contributors are their own.

The best of DZone straight to your inbox.

Please provide a valid email address.

Thanks for subscribing!

Awesome! Check your inbox to verify your email so you can start receiving the latest in tech news and resources.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}