Bitglass, the Total Data Protection company, in partnership with the Cloud Security Alliance, today released their report Mitigating Cloud Risks, based on a survey of 176 information security professionals.
Bitglass and CSA found that more than one in three IT pros believe cloud providers should turn over encrypted data to government when asked. Government intervention aside, many organizations have experienced cloud security incidents, though these aren’t the widespread breaches many anticipated - the majority of incidents stem from inappropriate use of the cloud, led by unwanted external sharing and access from unmanaged devices.
“While hotly contested issues like government intervention remain open, several years of experience with major public cloud apps has demonstrated that the cloud can be more secure than on-premises applications,” said Nat Kausik, CEO of Bitglass. “The primary open concern is whether enterprises can put policies and controls in place to use the cloud securely.”
Mitigating Cloud Risks explores how organizations are securing cloud applications, their plans to improve visibility in the cloud, and top security threats, including unsanctioned apps and external sharing.
35 percent believe cloud app vendors should be forced to provide government access to encrypted data while 55 percent are opposed. 64 percent of US-based infosec professionals are opposed to government cooperation, compared to only 42 percent of EMEA respondents.
Most organizations have experienced some cloud security incident, with 59 percent related to unwanted external sharing and 47 percent involving access from unauthorized devices.
Cloud visibility is lacking - less than half (49 percent) of organizations know even the basics, such as where and when sensitive data is being downloaded from the cloud.
Cloud Access Security Brokers (CASBs) are on the rise. 60 percent of organizations have deployed or plan to deploy a CASB, with data leakage prevention cited as the most important capability.
Few have taken action to mitigate Shadow IT threats, with 62 percent relying on written policies rather than technical controls.