Cloud computing is one of the main architectures in which most applications are being designed today. Cloud services are on the rise and traditional software is observed to being redesigned to operate in the cloud. Cloud computing technologies make it possible for companies to create measurable, on-demand self service, rapidly elastic, inter-operable and portable systems and software applications that have broad access and connectivity to a pool of shared infrastructure and resources. Cloud computing architecture is a multi-tenant architecture, meaning that more than one consumer (or tenant as they are referred to in cloud computing), can leverage software and services that are made available by a Cloud service provider. Top Major challenges Cloud computing does brings with its benefits and threats as well, some challenges that are pertinent to information security as well. Once of the primary challenges with the adoption of cloud computing has to do with the enforce-ability of governance, regulations, compliance and privacy (GRC+P) in the cloud. The uncertainty in enforcing security policies at the service provider's site and the inability to support compliance audits in the cloud are important security considerations that must be addressed. The assurance responsibilities are shared between the tenant and the service provider, but with minimal to no governance or regulatory frameworks, the liability lies for that most part on the tenants side.The tenant is responsible to ensure that appropriate levels of protections (controls) are in place and effectively operating to protect against cloud computing threats. Another challenge that is evident in the cloud is related to cyberforensics. The collection of physical evidence from the cloud virtual environment, using static and live forensic tools is a challenge. This is mainly due to the rapid elasticity characteristic of the cloud. The resources like disk space, memory that are provisioned to your company today may be provisioned to someone other tenant in the future which makes it infeasible to retain audit records that are an important in cyberforensic investigations. Also not having a full understanding of the underlying infrastructure in the IaaS service model can make it extermely difficult for a cyberforensic investigator to collect evidence after a security breach. The content and IDS logs on both the tenant and service provider's side must be taken into account when conducting forensic analysis in the cloud. To effectively handle security incidents, visualization of physical and logical data locations is necessary. It might be worth mentioning that since the cloud influences both the government and private industry, a partnership between these two sectors, may be necessary to effectively address challenges and security concerns in the cloud. It is likely that cloud computing is the way IT services will be offered in the future and if appropriate security considerations is not given when designing cloud computing architectures and solutions, the benefits that cloud computing brings could quickly be overturned and be detrimental to the continuity of business operations.