Close Menu
    Facebook LinkedIn YouTube Instagram X (Twitter)
    Blue Tech Wave Media
    Facebook LinkedIn YouTube Instagram X (Twitter)
    • Home
    • Leadership Alliance
    • Exclusives
    • Internet Governance
      • Regulation
      • Governance Bodies
      • Emerging Tech
    • IT Infrastructure
      • Networking
      • Cloud
      • Data Centres
    • Company Stories
      • Profiles
      • Startups
      • Tech Titans
      • Partner Content
    • Others
      • Fintech
        • Blockchain
        • Payments
        • Regulation
      • Tech Trends
        • AI
        • AR/VR
        • IoT
      • Video / Podcast
    Blue Tech Wave Media
    Home » 3 key impacts of cloud computing on security operations
    Cloud
    Cloud
    Cloud

    3 key impacts of cloud computing on security operations

    By Jinny XuJune 6, 2024No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email
    • Cloud security encompasses procedures and technology to combat internal and external threats to business security.
    • Organisations require cloud security as they progress with their digital transformation strategy and integrate cloud-based tools and services into their infrastructure.
    • Cloud computing adoption broadens the attack surface, requiring a shared security responsibility model, and increased focus on data protection, privacy, and regulatory compliance.

    OUR TAKE
    By using advanced security technologies, collaborating with Cloud Service Providers (CSPs), and complying with data protection regulations, organisations can maximise the benefits of cloud computing while safeguarding their customer data from potential threats.

    –Jinny Xu, BTW reporter

    Cloud computing offers unparalleled advantages in scalability, flexibility, and cost efficiency, but it also introduces new security challenges. From expanding attack surfaces to Identity and data protection and privacy, the shift to the cloud necessitates a revaluation of traditional security strategies. In this blog, we delve into the key impacts of cloud computing on security operations.

    1. Expanded attack surface

    With cloud computing, data and applications are no longer confined to on-premises servers. Instead, they are distributed across multiple locations and accessed via the internet, which expands the attack surface. This means that security operations must account for a broader range of potential entry points, making threat detection and prevention more complex.

    For example, data stored in various global data centres introduces new risks, such as exposure to different regional threats and legal jurisdictions. Public-facing cloud services are accessible from anywhere, increasing the likelihood of external attacks like Distributed Denial of Service (DDoS) and phishing.

    Integrating cloud services with third-party applications can introduce vulnerabilities if not properly managed and secured. Companies must implement robust firewall protections, traffic monitoring, and secure integration practices to mitigate these risks.

    Also read: Amazon to invest $17 billion in cloud infrastructure in Spain

    Also read: How long does Verizon Cloud Backup take?

    2. Shared responsibility model

    In cloud environments, security responsibilities are divided between cloud service providers (CSPs) and customers. CSPs handle the security of the cloud infrastructure, ensuring physical security, infrastructure maintenance, and network controls. In contrast, customers are responsible for securing their data and applications within the cloud, which includes configuring proper access controls, data encryption, and ensuring that applications are free of vulnerabilities. This shared responsibility model requires clear delineation of responsibilities and vigilant oversight to ensure all security aspects are covered.

    AWS protects the infrastructure that runs its cloud services, but customers must secure their data and applications using tools like AWS, Identity and Access Management (IAM) and AWS Key Management Service (KMS). Misconfigurations, such as leaving S3 buckets publicly accessible, can lead to significant data breaches if not properly managed.

    3. Data protection and privacy

    Ensuring the privacy and integrity of data in the cloud is paramount. Security operations must implement robust encryption, access controls, and data governance policies. Compliance with data protection regulations, such as GDPR and CCPA, adds another layer of complexity, requiring continuous monitoring and adherence to legal standards. Data should be encrypted both in transit and at rest using strong encryption protocols, and stringent access controls must be implemented to ensure only authorised users can access sensitive data. Establishing data governance policies for data management, classification, and lifecycle is essential to ensure compliance and data integrity.

    Organisations storing data of EU citizens in the cloud must comply with GDPR, including data encryption, access logging, and the right to be forgotten. Similarly, healthcare providers using cloud services must ensure patient data is encrypted and access controls meet HIPAA standards to protect sensitive health information.

    cloud computing data security operrations
    Jinny Xu

    Jinny Xu is an intern reporter at Blue Tech Wave specialising in Fintech and AI. She graduated from Chongqing Institute of Foreign Studies.Send tips to j.xu@btw.media.

    Related Posts

    Interview with Sarath Babu Rayaprolu from Voxtera on dynamic and secure VoIP

    July 7, 2025

    Interview with Dr Nitinder Mohan: Edge, satellites, and the reality behind Internet performance

    July 7, 2025

    T‑Mobile delivers full-state 5G in Florida with $2B investment

    July 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    CATEGORIES
    Archives
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023

    Blue Tech Wave (BTW.Media) is a future-facing tech media brand delivering sharp insights, trendspotting, and bold storytelling across digital, social, and video. We translate complexity into clarity—so you’re always ahead of the curve.

    BTW
    • About BTW
    • Contact Us
    • Join Our Team
    TERMS
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    Facebook X (Twitter) Instagram YouTube LinkedIn

    Type above and press Enter to search. Press Esc to cancel.