以下詳細解釋了這些公司最近感到的一些主要問題。在當前充滿活力的環境中，每個公司都面臨著許多問題。然而，在這個分析中，公司所面臨的主要問題已經得到了詳細的解釋。重點放在三個主要問題上。雲環境被用來面對傳統系統的許多威脅。雲服務器中存儲著大量的信息。服務的提供者通常成為目標(Mosher, 2011)。雖然存在洩露個人財務信息的風險，但這些違規行為也可能涉及一系列其他活動(Ahmed & Hossain, 2014)。當數據洩露確實發生時，這些公司會被發現處以罰款。然後，雲提供商部署了許多更新的安全控制，以防止攻擊發生。雲提供商被發現部署安全控制來保護他們的環境(Mosher, 2011)。這些組織負責保護雲上的數據。這些公司使用許多身份驗證系統和加密技術來防止數據洩露。
這些數據的洩露導致了主要人員的憑證被破壞的情況。由於這些數據洩露，這些組織被發現與身份管理鬥爭(Mosher, 2011)。他們有時忘記刪除對用戶的訪問權限，這導致了許多問題。企業需要多因素認證系統。使用一次性密碼和智能卡是雲服務的一部分(Mosher, 2011)。通常，特定軟件的開發人員會錯誤地將憑證和加密密鑰嵌入源代碼。這樣就剩下面向公眾的存儲庫，如Github。公司的密鑰需要得到適當的保護，並且有一個保護憑證的基礎設施。在現代，計劃與雲提供商集成身份的組織應該理解系統的細微差別(Mosher, 2011)。當人們的身份集中時，就會有更高的風險。存儲庫本身的風險成為公司攻擊者的一個極端高目標區域。
Some of the main issues that have been felt by the companies in the recent times have been explained in detail in the following. There are many issues that each companies face when it comes to sustaining in the current dynamic environment. However, in this analysis, the major issues that the companies face have been explained in detail. There is focus given to the three major issues. The cloud environment is used to face many of the threats of the conventional system. There are lots of information stored in the cloud servers. The providers of the services usually become the targets (Mosher, 2011). There is the risk of exposing personal financial information but the breaches could also involve a range of other activities (Ahmed & Hossain, 2014). When the data breaches actually occur, the companies are found to occur fines. The cloud provider then deploys a number of newer security controls to prevent the breaches from occurring. The cloud providers are found to deploy the security controls to protect their environment (Mosher, 2011). The organizations are responsible for the protection of the data on the cloud. There are number of authentication system that the companies use and encryptions that they use to protect against the data breaches.
These data breach leads to the situation of the credentials of the main people being broken. The organizations are found to struggle against the identity management owing to these data breaches (Mosher, 2011). They sometimes forget to remove the access to the users, and this leads to a number of issues. There is a need for the multifactor authenticated system in the companies. There is the use of the one-time passwords and the smart cards that are a part of the cloud services (Mosher, 2011). More often than not, the developers of the particular software make the mistake of embedding the credentials and the cryptographic keys with the source code. This leaves then with the public-facing the repositories such as the Github. The keys of the company need to be appropriately protected and there is an infrastructure in place to protect the credentials. In the modern times, the organizations that are planning to integrate identity with a cloud provider, they should understand the nuances of the system (Mosher, 2011). There is the issue of higher risk when there is centralizing of the identity of the people. The risk of the repository in itself become an area of extreme high-target for the attackers of the company.