{"id":7060,"date":"2012-06-13T09:20:00","date_gmt":"2012-06-13T09:20:00","guid":{"rendered":"http:\/\/www.smartdatacollective.com\/index.php\/post\/top-financial-risks-doing-business-cloud\/"},"modified":"2012-06-13T09:20:00","modified_gmt":"2012-06-13T09:20:00","slug":"top-financial-risks-doing-business-cloud","status":"publish","type":"post","link":"https:\/\/www.smartdatacollective.com\/top-financial-risks-doing-business-cloud\/","title":{"rendered":"Top Financial Risks of Doing Business in the Cloud"},"content":{"rendered":"<p>Cloud computing definitely has <a href=\"http:\/\/web2.sys-con.com\/node\/640237\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">upside<\/a> as adopters can speed delivery of analytics, gain flexibility in deployments and costs, and transfer IT headaches to another company.<br \/>\n<!--more--><\/p>\n<p>Cloud computing definitely has <a href=\"http:\/\/web2.sys-con.com\/node\/640237\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">upside<\/a> as adopters can speed delivery of analytics, gain flexibility in deployments and costs, and transfer IT headaches to another company. However, with all the advantages of cloud, it\u2019s important to keep in mind there are <a href=\"http:\/\/agimo.govspace.gov.au\/files\/2011\/11\/Cloud-Financial-Draft-Better-Practice-Guide-AGIMO-Blog.pdf\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">financial risks to cloud computing<\/a> including potential costs from lawsuits and reputational damage from cloud provider security\/privacy data breaches, and possible revenue losses from cloud provider downtime\/outages.<\/p>\n<p>For any type of business decision, there are various risks that should be considered\u2013 strategic, operational, financial, compliance and reputational (brand).&nbsp; These risks should also be criteria for any decision to move workloads to cloud computing. However, for sake of discussion, let\u2019s focus on financial risk.<\/p>\n<p>First, for cloud computing there are financial risks in terms of potential data or privacy loss, <a href=\"http:\/\/www.zdnet.com\/blog\/saas\/security-risks-of-multi-tenancy\/1007\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">especially in complex multi-tenant environments<\/a>.&nbsp; If there are data breaches of unencrypted <a href=\"http:\/\/en.wikipedia.org\/wiki\/Personally_identifiable_information\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">personally identifiable information<\/a> (PII), many US states have <a href=\"http:\/\/info.sen.ca.gov\/pub\/01-02\/bill\/sen\/sb_1351-1400\/sb_1386_bill_20020926_chaptered.html\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">laws<\/a> that require consumer notification. Companies accused of data breach also typically provide consumer credit monitoring services for up to one year. One <a href=\"http:\/\/www.symantec.com\/about\/news\/release\/article.jsp?prid=20110308_01\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">research firm<\/a> estimates total costs due to a data breach average $7.2 million (USD).&nbsp; In addition, such breaches may open up companies to class action lawsuits that could total millions more in damages.&nbsp;<\/p>\n<p>To mitigate risks of data loss or privacy breach, cloud providers do everything in their power to safeguard data including: server hardening, user provisioning and access controls, enforcement of policies for passwords and data privacy, monitoring\/logging for intrusion detection, self-auditing, third party security audits (when specified), mandatory training for personnel and in some cases encryption of tables and\/or columns.<\/p>\n<p>And while in many cases the above practices are more robust in public cloud computing environments than in most corporate data centers, there are still lagging trust concerns of possible cloud data loss or privacy breach. Perhaps this is why, at least for the next 2-3 years, companies will <a href=\"http:\/\/www.pwc.com\/en_GX\/gx\/technology\/cloud-computing\/methodology.jhtml\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">increasingly choose private cloud<\/a> over public cloud environments.<\/p>\n<p>To mitigate financial risks some companies seek <a href=\"http:\/\/blog.techcontracts.com\/2011\/11\/06\/who-should-indemnify-whom-and-for-what\/\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">indemnification<\/a> where the cloud provider agrees to take on or share liability of security breach including costs associated a breach. However, cloud financial indemnifications are <a href=\"http:\/\/www.infolawgroup.com\/2010\/05\/articles\/cloud-computing-1\/whats-in-googles-saas-contract-with-the-city-of-los-angeles-part-one\/\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">extremely rare<\/a>, and even if offered, the risk associated with such breaches is often <a href=\"https:\/\/casro.haysaffinity.com\/_file\/JLT%20-%20Cyber%20Risk%20in%20the%20Cloud.pdf\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">transferred to insurance companies<\/a> via purchase of cyber insurance. And of course, such insurance costs will be baked into cloud service fees.<\/p>\n<p>Other financial risks for companies doing business in the cloud include loss of revenues if there are significant availability issues. If cloud environments are down for hours or days, this could adversely impact a business\u2019 ability to perform analytics or reporting and thus may affect revenue opportunities. To offset possible lost revenues, most cloud providers will sign up for availability SLAs and associated penalties (usually redeemable as <a href=\"http:\/\/aws.amazon.com\/ec2-sla\/\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">service credits<\/a>).<\/p>\n<p>Cloud computing has so much upside, that it\u2019s very easy for business managers to declare \u201call things must be cloud\u201d.&nbsp; That\u2019s well and good, but one must also carefully consider cloud risks. And while risk cannot be eliminated, it can surely be mitigated with proper planning and execution when <a href=\"http:\/\/www.newyorker.com\/online\/blogs\/newsdesk\/2012\/06\/atul-gawande-failure-and-rescue.html\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">things go wrong<\/a>.<\/p>\n<p>Companies considering cloud computing must remember that just like in outsourcing, there\u2019s no such thing as <a href=\"http:\/\/www.zdnet.com\/blog\/btl\/cloud-cant-outsource-responsibility-or-managers\/48480\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">transference of responsibility<\/a>. In moving workloads to the cloud, carefully document upsides and downsides, examine your decisions in terms of risk (including financial ones), and then make the best decision possible for your particular organization.<\/p>\n<p>Questions:<\/p>\n<ul>\n<li>This article speaks to financial risks for cloud computing in terms of access and availability. There are certainly more including project cost overruns for cloud deployment and data quality (completeness\/accuracy).&nbsp; What others can you think of?<\/li>\n<\/ul>\n<p><strong>&nbsp;<\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud computing definitely has upside as adopters can speed delivery of analytics, gain flexibility in deployments and costs, and transfer IT headaches to another company.<\/p>\n","protected":false},"author":90,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[24,31,5,7,9,35,13],"tags":[624,975,446,969],"class_list":{"0":"post-7060","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-cloud-computing","7":"category-commentary","8":"category-data-quality","9":"category-data-warehousing","10":"category-smartdata-collective-exclusive","11":"category-risk-management","12":"category-security","13":"tag-cloud","14":"tag-cloud-security","15":"tag-risk-management","16":"tag-security-and-privacy"},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/posts\/7060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/comments?post=7060"}],"version-history":[{"count":0,"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/posts\/7060\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/media?parent=7060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/categories?post=7060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/tags?post=7060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}