c. Threat #3: Malicious Insider: For our kind of
implementation this is a strong weakness, because the
impact malicious insiders can have on an organization
is considerable. Once you can get access an
authenticated within the network, you can have access
to the cloud services. This brings in the human factor,
which will bring a big limitation of this system.
d. Threat #4: Shared Technology Issues: Our
implementation will have to share the same
authentication technology to work, so this makes it
strong from any issues concerning technology
interoperability. Kerberos we used is well
implemented to support different Operating systems,
and IPsec works with the used technologies available
as long as they are installed on the systems.
e. Threat #5: Data Loss or Leakage: This problem exist
in most systems not only cloud services. Data loss can
have a devastating impact on a business. That is why
back up is initiated in a lot of big business now. Our
implementation helps to reduce this by providing
encrypting and protecting integrity of data while in
transit. With the on premises KDC, we have strong
keys that are generated, stored and managed. But with
cloud Service other than IaaS that can provide a
private cloud, other categories will fall to threats such
as data lost and leakage.
f. Threat #6: Account or Service Hijacking: This remains
one of the top threats. With stolen credentials, an
attacker can access critical areas of deployed cloud
services. In the Kerberos and IPsec implementation,
security policies have been incorporated to detect and
limit the threat. Audit logs for service accessing are
kept for user usage information.
g. Threat #7: Unknown Risk Profile: Usually when cloud
services are advertised, features and functionalities are
talked about, but what about details or compliance of
internal security procedures and so forth. This
Kerberos and IPsec implementation will help the
consumer have a safer addition to security since from
the network not relying on the cloud provider totally
for security.