0% found this document useful (0 votes)
15 views

cc,IAM design challengs

Uploaded by

SUJITHA M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

cc,IAM design challengs

Uploaded by

SUJITHA M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cloud Computing Challenges:

1. Service Availability and Data Lock-in Problem:


o Single points of failure and reliance on a single provider pose risks.
o Multi-cloud strategies can enhance high availability (HA).
o DoS attacks threaten SaaS providers, mitigated by rapid scale-ups.
o Proprietary APIs hinder data portability; standardized APIs enable
cross-cloud operability and "surge computing."
2. Data Privacy and Security concerns:
o Public networks expose data to attacks (e.g., malware, rootkits,
VM hijacking).
o Mitigation includes encryption, firewalls, and adherence to data
sovereignty laws.
o Newer attacks target cloud-specific vulnerabilities like VM
migrations.
3. Unpredictable Performance and Bottlenecks:
o Shared I/O resources cause unpredictable performance.
o Solutions include better I/O virtualization and optimized data
placement to minimize costs.
o Internet bandwidth constraints need addressing to avoid
bottlenecks.
4. Distributed Storage and Wide spread softwareBugs:
o Scalable and durable storage systems are essential for growing
databases.
o Debugging at scale in production is challenging; virtualization and
simulation may help.
5. Cloud Scalability, Interoperability, and Standardization:
o Dynamic scaling saves costs but must meet SLAs.
o Open Virtualization Format (OVF) promotes VM portability across
platforms.
o Hypervisor-agnostic VMs and cross-platform migration are areas
for improvement.
6. Software Licensing and Reputation Sharing:
o Licensing models need to adapt to cloud usage.
o Reputation management services can protect against blacklisting.
o SLAs must clarify liability between providers and customers.
IAM challenges
1. Identity Provisioning and Deprovisioning

 Provisioning: This is about creating user accounts and giving them the right
permissions when someone joins an organization.
o Challenge: If this process isn’t automated or well-organized, some users
might not get the access they need, slowing them down.
 Deprovisioning: This is about removing access when someone leaves.
o Challenge: If accounts aren’t deactivated properly, former employees could
retain access to sensitive systems, posing a security risk.

Why it’s hard? Managing this for many users across multiple cloud platforms can get messy
without the right tools.

2. Maintaining a Single ID Across Platforms and Organizations

 Many businesses use multiple cloud services (like AWS, Azure, and Google Cloud)
or work with partner organizations.
 Challenge: It’s hard to maintain a single user ID for the same person across these
systems. Without this, users might need multiple logins, and managing these can be
error-prone.
 Why it’s a problem? Inconsistent IDs make it difficult to track user actions or revoke
access.

3. Security When Using Third-Party or Vendor Networks

 Businesses often work with external vendors or use third-party applications integrated
with their cloud systems.
 Challenge: Giving these third parties access increases the risk of a security breach if
they misuse their permissions or their accounts get compromised.
 Example Risk: A poorly secured vendor account could be exploited by hackers to
access your cloud resources.
 Solution? Strict controls, limited permissions, and regular monitoring.

4. Compliance and Visibility: Who Has Access to What?

 Companies must follow regulations like GDPR or HIPAA, which require them to
know who has access to sensitive data.
 Challenge: As organizations grow, tracking and auditing access becomes complex.
o Example: A developer might be given temporary access for a project, but no
one removes it afterward.
 Why it’s critical? Lack of visibility can lead to non-compliance with regulations or
undetected insider threats.

You might also like