One of the risks that an organization can transfer by adopting the cloud is data breach due to a break-in at the facility. This is because the cloud service provider (CSP) is responsible for the physical security of the data center where the data is stored and processed. The CSP should have adequate measures to prevent unauthorized access, theft, or damage to the hardware and infrastructure. By outsourcing the data storage and processing to the CSP, the organization transfers the risk of physical breach to the CSP. However, the organization still retains the risk of data breach due to other factors, such as network attacks, misconfiguration, or human error. Therefore, the organization should also implement appropriate controls to protect the data in transit and at rest, such as encryption, authentication, and monitoring. References: CompTIA Cloud Essentials+ CLO-002 Study Guide, Chapter 5: Risk Management, page 1661 and page 1692. The Top Cloud Computing Risk Treatment Options | CSA3.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit