<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Cloud computing &#8211; Security Implications: Compliance</title>
	<atom:link href="http://www.gfi.com/blog/cloud-computing-security-implications-compliance/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/cloud-computing-security-implications-compliance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cloud-computing-security-implications-compliance</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/cloud-computing-security-implications-compliance/comment-page-1/#comment-9252</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Wed, 18 Aug 2010 10:24:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2372#comment-9252</guid>
		<description><![CDATA[I have no idea what will happen obviously. I would imagine either compliance will adapt and allow the service provider to take care of the compliance for their customers or the cloud environment will evolve into a better system that is more enclosed and allows complete access to the customer.

If I had to hazard a guess I think cloud service providers will try to push for compliance to adapt to their business model because if the customer is given more power on his cloud set up this will result in added complexity for the customer and there is the risk that most of the allure that people have for cloud computing will be lost.]]></description>
		<content:encoded><![CDATA[<p>I have no idea what will happen obviously. I would imagine either compliance will adapt and allow the service provider to take care of the compliance for their customers or the cloud environment will evolve into a better system that is more enclosed and allows complete access to the customer.</p>
<p>If I had to hazard a guess I think cloud service providers will try to push for compliance to adapt to their business model because if the customer is given more power on his cloud set up this will result in added complexity for the customer and there is the risk that most of the allure that people have for cloud computing will be lost.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: David Moore</title>
		<link>http://www.gfi.com/blog/cloud-computing-security-implications-compliance/comment-page-1/#comment-9042</link>
		<dc:creator>David Moore</dc:creator>
		<pubDate>Thu, 12 Aug 2010 17:32:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2372#comment-9042</guid>
		<description><![CDATA[“Even worse some compliances involve auditing as part of the compliance processes but if you do not have access to the low level logs you are unable to actually do those audits which are essential for compliance.”

I think this sort of article uncovers the Catch-22 nature of cloud computing, most especially with regards to compliance. “This damned if you, damned if you don’t” mentality surely doesn’t benefit anyone on the short or long run. I definitely agree that this kind of system needs revising, if not a complete overhaul.]]></description>
		<content:encoded><![CDATA[<p>“Even worse some compliances involve auditing as part of the compliance processes but if you do not have access to the low level logs you are unable to actually do those audits which are essential for compliance.”</p>
<p>I think this sort of article uncovers the Catch-22 nature of cloud computing, most especially with regards to compliance. “This damned if you, damned if you don’t” mentality surely doesn’t benefit anyone on the short or long run. I definitely agree that this kind of system needs revising, if not a complete overhaul.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/cloud-computing-security-implications-compliance/comment-page-1/#comment-8975</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Wed, 11 Aug 2010 10:58:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2372#comment-8975</guid>
		<description><![CDATA[Hi Jeremy,

You&#039;re right obviously, as things mature they will become better at securing themselves; however, the main point of the article was not about the security of cloud computing but rather how that will affect one&#039;s compliance obligations.

For example  PCI prohibits the storing of Credit card numbers on business systems. Now logically cloud computing is effectively a huge system shared between parties, so if one party were to break this rule what would that mean to your compliance? Technically the system you&#039;re using is non-compliant even though your business might not be the culprit.

Even worse some compliances involve auditing as part of the compliance processes but if you do not have access to the low level logs you are unable to actually do those audits which are essential for compliance. 

In short some compliances might need revising to deal with the cloud computing reality or maybe cloud computing might need to open up more and give low level access to its customers to help them achieve their desired compliance. It&#039;s a subject that requires some thought.]]></description>
		<content:encoded><![CDATA[<p>Hi Jeremy,</p>
<p>You&#8217;re right obviously, as things mature they will become better at securing themselves; however, the main point of the article was not about the security of cloud computing but rather how that will affect one&#8217;s compliance obligations.</p>
<p>For example  PCI prohibits the storing of Credit card numbers on business systems. Now logically cloud computing is effectively a huge system shared between parties, so if one party were to break this rule what would that mean to your compliance? Technically the system you&#8217;re using is non-compliant even though your business might not be the culprit.</p>
<p>Even worse some compliances involve auditing as part of the compliance processes but if you do not have access to the low level logs you are unable to actually do those audits which are essential for compliance. </p>
<p>In short some compliances might need revising to deal with the cloud computing reality or maybe cloud computing might need to open up more and give low level access to its customers to help them achieve their desired compliance. It&#8217;s a subject that requires some thought.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jeremy</title>
		<link>http://www.gfi.com/blog/cloud-computing-security-implications-compliance/comment-page-1/#comment-8938</link>
		<dc:creator>Jeremy</dc:creator>
		<pubDate>Tue, 10 Aug 2010 18:21:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2372#comment-8938</guid>
		<description><![CDATA[I agree with cloud computing still being in its development stages, but with the internet aging at an exponential rate, we’ll definitely be seeing some substantial progress within the field in the next five years or so. I wouldn’t be surprised if, by then, the security of cloud computing has jumped leaps and bounds ahead from where we are now. But then again, the ways to exploit it won&#039;t be too far behind.  

Definitely good points to think about with regards to security and computer compliance.]]></description>
		<content:encoded><![CDATA[<p>I agree with cloud computing still being in its development stages, but with the internet aging at an exponential rate, we’ll definitely be seeing some substantial progress within the field in the next five years or so. I wouldn’t be surprised if, by then, the security of cloud computing has jumped leaps and bounds ahead from where we are now. But then again, the ways to exploit it won&#8217;t be too far behind.  </p>
<p>Definitely good points to think about with regards to security and computer compliance.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/cloud-computing-security-implications-compliance/comment-page-1/#comment-8640</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Mon, 02 Aug 2010 09:33:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2372#comment-8640</guid>
		<description><![CDATA[Hi Sue, 

I guess there will never be a common answer between cloud providers; I mean most likely everyone of them will approach each aspect in their own way. Still as cloud services become more popular I think we can expect that some things get standardized across providers.  

In any event even when that happens I would still recommend that anyone switching over to a cloud solution discusses these points with their prospective provider before making any commitments.]]></description>
		<content:encoded><![CDATA[<p>Hi Sue, </p>
<p>I guess there will never be a common answer between cloud providers; I mean most likely everyone of them will approach each aspect in their own way. Still as cloud services become more popular I think we can expect that some things get standardized across providers.  </p>
<p>In any event even when that happens I would still recommend that anyone switching over to a cloud solution discusses these points with their prospective provider before making any commitments.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sue Walsh</title>
		<link>http://www.gfi.com/blog/cloud-computing-security-implications-compliance/comment-page-1/#comment-8444</link>
		<dc:creator>Sue Walsh</dc:creator>
		<pubDate>Thu, 29 Jul 2010 06:45:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2372#comment-8444</guid>
		<description><![CDATA[You pose some EXCELLENT questions. I hope they will be investigated because I as a business owner (albeit a very small one) am very interested in the answers!]]></description>
		<content:encoded><![CDATA[<p>You pose some EXCELLENT questions. I hope they will be investigated because I as a business owner (albeit a very small one) am very interested in the answers!</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 06:24:01 by W3 Total Cache --