Is Cloud Security Possible?
Is Cloud Security Possible?
After all, the cloud really is just somebody else's computer. So, can it really be secured? The answer is yes, though the process isn't easy.
Join the DZone community and get the full member experience.Join For Free
Is cloud security possible? In a word yes, although it will take a little longer to explain. Possibly a lot longer for everyone involved in acquiring and configuring cloud to get it right.
When we move to cloud services it is possible to secure that environment as well as secure our business’s and data centers, seriously it is. It requires a well flushed out contract with the proper service level agreements (SLA) and privacy level agreements (PLA) from the start. In order for that to happen care must be put into moving to the cloud. I believe that it is very important that everyone that is involved with cloud service establishment to become as knowledgeable about how today’s cloud functions as possible. This includes security professionals, application developers, IT professionals, server administrators to name a few. We are already behind the curve on learning how the cloud works before putting any of our valuable data into the cloud. A good (bad) example would be the Emory Healthcare Data breach reported on www.PrivacyRights.org. Emory Healthcare stored patient information on Google Cloud and a MongoDB which was compromised by a hacker who removed patient information and then held it for ransom. The total number of records breached is thought to be 80,000.
It is becoming increasingly important for organizations to maintain positive control over the data and to safeguard that data in a way that protects not just the company, but more importantly the customers whom that data is about. New laws and regulations are being created at an increasing rate requiring organizations to do so and if they fail to properly protect the data, these laws come with hefty fines and penalties. Consider the General Data Protection Regulation (GDPR) from the European Parliament. This new and updated regulation becomes enforceable in May of 2018. If Emory Healthcare had been subject to GDPR the fine could have been up to €20 million or 4% of global turnover, whichever is greater. With fines like that all of us need to pay attention.
It is a big challenge for organizations to properly protect data when it is in their own possession. The challenge becomes exponential when the cloud is used to store and process that data. To help you address that challenge I offer these key points to consider.
Education and Understanding
The cloud is this nebulous concept that everybody wants to use (due to considerable cost savings and ease) yet few understand. Before one can begin to safeguard data in the cloud, there needs to be a basic level of knowledge such as knowing the different deployment models and architectures. Public/Private/Community/Hybrid and Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). You can find more about that here. Understanding the language of cloud and then interpreting what cloud providers are offering is a critical start.
Fundamentally, security does not change when the cloud is involved. At the same time, it is very different regarding where the controls are and who configures them. In all solutions, the cloud provider is responsible for the security of the physical environment including the real network infrastructure and security devices.
In IaaS, the cloud customer is responsible for configuring their own virtual network and security appliances. This would be in addition to any virtual device configuration that the cloud provider has to create the customer’s virtual environment.
In PaaS, the cloud customer is responsible for the security applications that are added to the cloud provider supplied server of some kind. This means that the cloud provider has the responsibility for the virtual network and security devices.
In SaaS, the cloud customer is responsible for the security configurations and user accounts within the provided application. Everything else is the responsibility of the cloud provider.
Cloud Access Security Broker
When a customer needs assistance to negotiate their contract or if they require help to configure their portion of the virtual security environment, there is a solution that is growing in popularity and strength. It is the Cloud Access Security Broker (CASB). The CASB, as described in Gartner’s Magic Quadrant report number G00318532 from November 2017, has “become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud.”
Garnet predicts that “by 2020, 60% of large enterprises will use a CASB to govern cloud services, up from less than 10% today. Through 2020, at least 99% of cloud security failures will be the customer's fault.”
The CASB can assist with the security of data, threat protection, and compliance with policy or law. Check out my next post for more details on CASBs.
Published at DZone with permission of Gwen Bettwy , DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.