The Wayback Machine - https://web.archive.org/web/20120602233935/http://cloudcomputing.sys-con.com:80/node/2287517

Welcome!

Cloud Expo Authors: Maureen O'Gara, Larry Carvalho, Ignacio M. Llorente, Liz McMillan, Elizabeth White

Related Topics: Cloud Expo, SOA & WOA, Virtualization, Security

Cloud Expo: Blog Feed Post

Cloud Security: Technology, Processes, Responsibility

Security is one of (if not THE) top concern companies and users have with cloud computing

Takeaway: Thoran Rodrigues discusses cloud security concerns and breaks down the three primary elements that must all work together to provide a comprehensive security approach.

Security is one of (if not THE) top concern companies and users have with cloud computing. The issue of cloud security, however, is much more complex than simply “is the cloud secure or not”. A cloud-based application can be hosted in a secure environment, with properly encrypted data and everything, and an attacker can still get access to your information through social engineering. On the other hand, you can have the most secure password policies in the world, but if the hosting environment gets hacked, you are still going to lose your data.Any proper solution that tries to address the cloud security issues that exist today must take into account the three sides of the security issue: technology, processes, and responsibility. Another important factor to take into account is that the details and the importance of each one of these, relative to the others, change according to where in the cloud stack we are. Building secure cloud software is very different from security at the cloud platform level, and from secure infrastructure as well.

Technology
The first step is to employ the proper technology to secure applications and data. “Proper technology” varies widely depending on what layer of the cloud we are talking about. For cloud applications, security can be as simple as deploying proper security certificates and encryption. All sensitive information needs to be properly encrypted, so that even if an attacker gains access to your systems, any data that gets stolen will still need to be decrypted to be gotten at. And it’s not enough to simply encrypt passwords: if you know that people commonly employ their birthdays as passwords, encrypt that as well. As much as possible, technology should protect users from themselves without inconveniencing them.

A very interesting solution in this space is Porticor’s Virtual Private Data. It’s basically an encryption layer that sits transparently on top of any cloud data store, performing dynamic data encryption/decryption as data gets accessed. I recommend that anyone interested in securing cloud applications take a look at their solution.

On the lower layers of the cloud stack, security is much the same as it was before the cloud. Cloud platforms need to be secure just as operating systems are secured, avoiding malicious code from taking over other execution sessions or stealing data, and so on. In the infrastructure layer, security is both about maintaining a secure virtualization environment and about physical security. Fortunately, most top-tier cloud infrastructure providers already are very security minded, reducing risks on this side.

Process
All the technology in the world can’t save you if an attacker can call your receptionist and get her to install malware on your corporate network using her network administrator password. This is as true for the cloud as it is for private networks, and while something like this probably wouldn’t happen at a large enterprise, there is a surprisingly large number of small- and medium-size businesses where it just might.

If a company is deploying a Windows cloud server from Rackspace, for instance, it will come with a pretty complex password, automatic updates enabled, firewall-activated, and so on. Many times, though, the first step that people take is to change the password to something easier to remember – usually “password”, or “Pass1234” because a secure password must always include capital letters and numbers – and create an unprotected FTP tunnel to that server, “just to copy a few things”. What started as a reasonably secure server is now a security breach waiting to happen. It’s not enough to have the proper security tools. Companies need to build processes that actually put those tools to use.

Companies also underestimate the power of having proper information security policies communicated to all employees. When everyone in the company is security conscious, proper security comes much easier. The process side of security doesn’t start with technical processes, but with people, so proper and constant communication is fundamental.

Responsibility
So far, the two aspects we explored are pretty standard. While cloud applications need to be much more security conscious than traditional in-house applications, the technology needed to deploy the extra security is pretty standard. The same thing goes for securing cloud servers. The greatest differences between cloud security and traditional security lie in the matter of responsibility.

When a company deploys traditional software, IT knows its responsibilities. The software is inside the data centers it operates and controls, and anything that happens – data being stolen, servers being hacked, and so on – is their responsibility. Since IT has full control over the environment, they are comfortable with taking on the burdens that come with this control.

When things are moved to the cloud, however, IT departments lose control over the environment. It is understandable, then, that they are unwilling to take responsibility for problems that might happen. Having clearly separated responsibilities helps: hosting providers need to ensure the security of the underlying platform (virtualization layer, physical security, and so on). The rest would fall to the customers. But it is not enough. Providers need to offer guarantees in case something happens, and understand where internal IT departments are coming from, to improve relations and reduce their concerns.

All together
These three perspectives need to be taken into account together, or we run the risk of creating an even more complex environment than what already exists. In some ways, the cloud has the potential to make things more secure, by providing incentives or automating the management of common security tasks that many small businesses forget about. On the other hand, the concentration of data in the hands of a few service providers can make for very attractive targets, increasing the responsibility of these companies. No technology, process, or contract can, alone, remove the security concerns over the cloud; and everyone that has concerns about the cloud should look at the whole security package, and not technology or processes alone.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products including BusinessByDesign and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

Cloud Expo Breaking News
Users and administrators alike have come to rely on standard NAS functions to create, manage, share and protect file-based data throughout its lifetime. However, this functionality is limited to a single site. Globally distributed enterprises must deploy islands of storage across sites, inhibiting optimization, centralized management, and load balancing. Ideally, administrators should be able to install a single cloud-integrated, file-based storage system that grants visibility of all files to a...
Many organizations have embraced, or are considering, the benefits of cloud computing – speed, flexibility, increased expertise, shared workload, reduced costs, etc. The benefits are many – but so are the risks. What are the threats to Cloud security? Which parties assume responsibility for securing the environment? What about the data? Which type of cloud deployment offers superior security benefits? In his session at the 10th International Cloud Expo, Dr. Nataraj (Raj) Nagaratnam, IBM Distin...
With Cloud Expo 2012 New York (10th Cloud Expo) now under ten days away, what better time to remind you in greater detail of the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference...?
With Cloud Expo 2012 New York (10th Cloud Expo) now less than ten days away, what better time to remind you in greater detail of the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference...?
With Cloud Expo 2012 New York (10th Cloud Expo) now less than ten days away, what better time to remind you in greater detail of the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference... We have technical and strategy sessions for you every day from June 11 through June 14 dealing with every nook and cranny of Cloud Computing and Big Data, but what of those who are presenting? Who are they, where do they work, what else have t...
I am the track chair of the CloudExpo Bootcamp this year at Jacob Javits Center in NYC from June 11-14. You can check the agenda here. As an invitee of the track chair, you can register for free (with the bootcamp option) at www.cloudcomputingexpo.com with "robustcloud" as the promotion code.
With Cloud Expo 2012 New York (10th Cloud Expo) now under ten days away, what better time to remind you about the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference...? We have technical and strategy sessions for you every day from June 11 through June 14 dealing with every nook and cranny of Cloud Computing and Big Data, but what of those who are presenting? Who are they, where do they work, what else have they written and/or...
As an exhibitor at Cloud Expo New York, EMC Corporation is offering special passes to SYS-CON's 10th International Cloud Expo, which will take place on June 11–14, 2012, at the Javits Center in New York City, New York. EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computi...
Cut through the cloud Computing clutter and make business sense of Big Data. Join us in New York in 10 days' time and attend the largest Cloud Computing and Big Data event in the world - the 10th International Cloud Expo at the Jacob Javits Center on June 11-14, 2012. As the volume of digital content grows to 2.7 ZB‚ up 48% from 2011, Cloud Expo has been extended to focus additionally on Big Data. There are also Special Events galore, from Cloud Computing Bootcamp (all 4 days) and "Cloud Essen...
One of the most widely asked questions about Big Data today is, “How do we get valuable analytics from Big Data?” Or, how do we get the prize? As data continues to grow exponentially, so does the variety of data (structured and unstructured) coming from humans, machines and applications. In order to pull valuable information from it all, proper data gathering is critical, and the output of that data needs to be timely and accurate, with a flexible method of delivery. Unfortunately, it’s not easy...