NOTE! This site uses cookies and similar technologies.

If you do not change browser settings, you agree to it. Learn more

I understand

The EU cookie law (e-Privacy Directive)

The law which applies to how you use cookies and similar technologies for storing information on a user’s equipment such as their computer or mobile device changed on 26 May 2011.

Please visit ICO website for more information. http://ico.org.uk/

Who Owns Security In The Cloud?

Jim Reavis Dave Asprey Issue: Asia-Pacific II 2012
Article no.: 6
Topic: Who Owns Security In The Cloud?
Author: Jim Reavis & Dave Asprey
Title: Founder & Exec. Director & Vice President of Cloud Security
Organisation: Cloud Security Alliance & Trend Micro
PDF size: 266KB

About author

Jim Reavis is Founder & Executive Director of the Cloud Security Alliance. He is also the President of Reavis Consulting Group, LLC, where he advises security companies, large enterprises and other organisations on the implications of new trends such as Cloud. He is also a partner with the MetroSITE Group.Previously,hehas been a board member and anexecutive director of the ISSA, a global not-for-profit association of information security professionals. He was also a co-founder of the Alliance for Enterprise Security Risk Management, a partnership between the ISSA, ISACA and ASIS that was formed to address enterprise risk issues associated with the convergence of logical and traditional security.

Jim Reavisis widely quoted in the press and has worked with hundreds of corporations on their information security strategy and technology roadmap.His innovative thinking about emerging security trends have been published and presented widely throughout the industry. He was recently named as one of the Top ten cloud computing leaders by SearchCloudComputing.com. He has a background in networking technologies, marketing, product management and systems integration. He received a B.A. in Business Administration / Computer Science from Western Washington University in 1987 and serves on WWU's alumni board.

___________________________________________________________________

Dave Asprey is Vice President of Cloud Security in Trend Micro. He is responsible for thought leadership and technology evangelism for Trend Micro’s cloud computing and virtualization businesses. He created and launched two early cloud computing service offerings. His writing on the cloud has been published by the New York Times, GigaOm, Fortune and CNNmoney. PriceWaterhouseCoopers published his book-length piece on systems management. He co-chairs the Cloud Security Alliance Virtualization Working Group and sits on RSA China’s Program Committee. He is a sought-after speaker and panel moderator who has presented at more than 100 cloud, virtualization, and security conferences globally.

MrAsprey joined Trend Micro after a spending most of 2010 as an Entrepreneur in Residence at venture capital firm Trinity Ventures, co-founding a cloud startup and selling a web-based virtual desktop startup. He was previously VP of Technology and VP of Business & Corporate Development at Blue Coat Systems. He spent two years as VP Technology & Marketing at cloud networking vendor Zeus Technologies. Earlier, he ran strategic planning for Citrix’s Virtualization Business Unit and began his career in the cloud as a co-founder of the professional services group at Exodus Communications, then as seniordirector of product management at Speedera, now part of Akamai. He also ran the Web & Internet Systems Engineering Program for UC Santa Cruz for five years.

 

Article abstract

In the case of public cloud, enterprise security perimeter simply doesn’t exist.One option is to extend the perimeter into the cloud. This allows using existing management tools, but the link with the cloud must be closely monitored.The second option is to extend the cloud into the enterprise perimeter by installing security servers within the enterprise, which are managed by Managed Security Service Providers (MSSP). They must be highly trusted, since they are given full access to the enterprise internal systems. In both cases the enterprise must still protect its data by all the available security tools. IT managersshould demand visibility of data access logs and seek to establish better access control. It is important to use encryption for data ‘at rest’ as well as ‘in motion’, and negotiate strict SLAs with standard compliance.

 

Full Article

I. Who owns security in the Cloud?
Cloud computing is the technology buzzword of the moment. The provision of on-demand IT software and infrastructure services via the internet can provide IT teams with unparalleled benefits in efficiencies, cost savings and scalability. However, with these game-changing benefits come a whole new set of challenges which invalidate most traditional approaches to security. While the cloud offers a vision of simplified, pay-per-use IT, in which much of the heavy lifting is outsourced, it also introduces numerous new compliance headaches and potential areas of data security risk. Here we attempt to address these issues in the context of the Infrastructure as a Service (IaaS) – that which allows IT managers to rent networking, storage, servers and other operational elements. It also offers enterprises greater autonomy to put more security controls in place than in other models, such as SaaS.
II. Why the Cloud?

On the public cloud side it comes down to scaling and the ability to use OPEX (Operating Expense) instead of CAPEX (Capital Expense). On-demand provision of resources also allows firms to scale dynamically, vastly improving business agility. On the private cloud front, it is all about increased flexibility and responsiveness to internal customers’ needs. With these kinds of benefits it’s unsurprising to see such interest in the new computing paradigm. A poll from security body the ISACA (March 2010) found that a third of European organisations are already using cloud computing systems, while global consultancy Accenture revealed (July 2010) that half of its clients are running some mission critical apps in the cloud.
III. Perimeter security isn’t dead- two approaches to securing the Cloud
Much has been made of the fact that when it comes to the public cloud model, the traditional enterprise security perimeter simply doesn’t exist anymore. Firewalls and other standard security functionality can’t extend to the cloud and instead firms have to rely on the basic level of perimeter protection offered by their cloud provider. From another perspective the perimeter-based security model has become a useful part of the security architecture, but not the only part. When dealing with the cloud, enterprises still have the notion of a perimeter. The choice is whether they extend that perimeter into the cloud or extend the cloud inside their perimeter, or both. In either case, additional security layers are necessary. However, both scenarios have similar drawbacks concerning the potential lack of visibility and control. CISOs (Chief Information Security Officers) must be vigilant, conduct due diligence and be aware of the risks involved.
Extending enterprise perimeter to the cloud
This scenario involves setting up an IPSec (IP Security protocol) VPN (Virtual Private Network) tunnel to your public cloud provider’s servers, and putting enterprise-grade security on the public cloud server, usually in the form of security software and virtual appliances. The benefitof this set-up is that you won’t have to reconfigure Active Directory and most other existing management tools should work with your cloud set-up, as your cloud severs are effectively inside your “perimeter”. On the disadvantageside, depending on how well you secured your cloud server, you may have introduced the risks associated with the cloud to your architecture, as outlined below. To help mitigate these risks, it is important that the link between cloud and internal server is monitored for suspicious traffic. Another option is to add an extra DMZ (Data Management Zone) and firewall, although that creates another perimeter that needs securing.
Many firms forget or ignore this step in their rush to the cloud, especially those in smaller organizations without the time and IT resources to architect in these safety barriers. It’s also essential to put enough security on those cloud servers so you can trust them, to protect them from malicious attacks etc.CIOs must be aware that their cloud servers will be subject to different threats from thosethat threaten internal systems. A major concern is that firms are not likely to be given their cloud provider’s physical or admin access logs. How will they know if an IT admin working for their cloud provider has accessed their data? This lack of visibility in the cloud should necessitate widespread adoption of data encryption as standard.
Shared storage also presents an area of risk to firms anxious that their data is not safe if stored alongside a competitor’s data. Some public cloud providers simply aren’t as transparent as they should be. As a starting point, if you’re putting mission critical data into the cloud you need to look for strict adherence to security best practices, like ISO 27001 and SAS70 II, and rigorously examine your provider’s SLAs (Service Level Agreements) and security policy.
Another risk is that most cloud providers are likely only to reimburse in the case of a breach up to the cost of the service they provide, even if it was their fault. A data breach which leads to untold reputational damage, fines and financial loss will have to be absorbed by the customer.
Extending the cloud into the enterprise

This scenario allows the cloud to effectively extend inside the enterprise perimeter, and involves agreeing to an IaaS public cloud provider or cloud-based MSSP (Managed Security Service Provider) installing a cloud node on site.The benefit of this set-up is that it is a relatively well understood model. MSSPs such as Integralis have been providing remote firewall management services “from the cloud” for years. Other examples include the Trend Micro Smart Protection Network, which links security servers inside an enterprise network to a security network of thousands of servers in the cloud.
However, for all the simplicity of having one of these boxes located in the data centre or branch office and managed or updated centrally by the cloud provider, the main disadvantage is that it is still essentially a cloud service and as such could present the IT manager with many of the same risks of the first set-up. This includesrisks presented by lack of visibility into physical and/or admin access logs. Liability for negligence leading to loss of mission critical data will still only go as far as reimbursement for the cost of the service. Although can be turned on and off, when the cloud extending to the enterprise is‘on’- the cloud provider is given full access to your network and to the application data, so the cloud provider must be trusted. If that provider is focused on security and is transparent with its SLAs, this should be less worrying.
It’s about differentiating between ‘good enough’ security and ‘optimal’ security. A cloud-based email service set up in your perimeter by a managed security service provider, for example, is likely to be more trustworthy than one provided by a typical public cloud vendor.

IV. Who owns security in the Cloud and where are the gaps?
The unpalatable truth here is that if you’re looking for help from the cloud provider you’re likely to be disappointed. You should secure your cloud servers as you secure your internal servers. This includes; IDS (Intrusion Detection System) /IPS (Intrusion Prevention System), DLP (Data Loss Prevention) tools, bi-directional firewall, and encryption.
You could run into problems on the network security front in the cloud environment, as few public cloud providers are likely to allow you to monitor network traffic as closely as you’d like. This may rule out the cloud from a compliance point of view, so it’s vital you find out how much network monitoring and access your provider will allow. Encryption of data ‘at rest’ (stored) and in transit (transmitted) becomes extremely important because of the lack of visibility into network traffic and your provider’s admin access logs.
Many cloud providers also offer a worrying lack of role-based access controls at an admin level. In the private cloud, ownership of security by the IT department is being challenged thanks to the speed at which servers can be created. All the business needs today is to know it can cover the cost of a license, and in a private cloud environment a business unit could have a server up and running in one or two days, rather than six weeks. However, each request for a new server has to be properly managed because the security risks will increase as the number of boxes to manage increases. It’s important that IT managers put in place a central authorising process which ensures any requests must pass through IT first.
V. Calltoaction
Enterprises:
- Encrypt data at rest and in motion and be careful to store encryption keys in a location separate from the data, i.e. not where they are easily accessible to the cloud provider.
- Deploy every security tool you deploy on your physical servers in the cloud as well because all the cloud providers will give you is a naked OS without adequate security.
Cloud providers:
- Be more open and transparent about security policies and procedures around access controls and network traffic. Customers need to know who did what and when, and they need to be allowed to see the logs.
- Clarify SLAs so customers are clear what security features you offer and what they will need to do to ensure their data is secured to their own and their regulators’ standards.
Private cloud environments:
- Create a central authorisation process, if there is not one there already, for all new cloud server requests from the business. You need to know why they need a server, what will be running on the server, how long it will exist and how much traffic will flow through it. You also need to have regular check-ups on these requirements.
- Be prepared....IT is being forced to accelerate the speed at which it works. For the good of the business, you must be prepared to support these requirements in a timely manner without compromising thesecurity.

Bingo sites http://gbetting.co.uk/bingo with sign up bonuses