In today's digital age, businesses use cloud services to boost their operations exponentially. While this trend presents excellent potential, it is marred by significant concerns over the safety of data stored in the cloud. As the demand for cloud computing increases, businesses face issues ranging from data breaches and provider security to service availability and regulatory compliance. It becomes crucial for organizations to enact stringent security protocols not only to protect user information but also to smoothen operational processes, enforce regulatory compliance, and delineate user behavior norms. To fortify cloud assets, businesses must adhere to foundational security guidelines covering confidentiality, risk analysis, e-discovery, business resilience, and third-party contract obligations. Therefore, while the cloud's advantages are manifold, they have intricate challenges. Businesses must prioritize impenetrable security, craft meticulous risk strategies, and fortify against potential threats to harness the full potential of cloud services while preserving their assets and reputation. These results show that most respondents have a confidence level of 7, indicating a relatively high level of trust in the current cloud security measures. Organizations must continuously assess and adapt their cloud security strategies to keep up with the dynamic digital environment and evolving threats for long-term security and operational efficacy.
CITATION STYLE
Oladoyinbo, T. O., Adebiyi, O. O., Ugonnia, J. C., Olaniyi, O. O., & Okunleye, O. J. (2023). Evaluating and Establishing Baseline Security Requirements in Cloud Computing: An Enterprise Risk Management Approach. Asian Journal of Economics, Business and Accounting, 23(21), 222–231. https://doi.org/10.9734/ajeba/2023/v23i211129
Mendeley helps you to discover research relevant for your work.