|By Gilad Parann-Nissany||
|January 29, 2014 09:15 AM EST||
To say that cloud security for cloud computing is gaining traction would be the understatement of our era. Whether in public clouds, private clouds, or hybrid scenarios – it seems like everyone is in the cloud. Healthcare providers, eCommerce, disaster recovery services, data storage . . . the types of cloud services available seem to cover every base. What would Darwin think about his “Survival of the Fittest” evolving from animal species to businesses who take advantage of the flexibility, elasticity, and cost-effectiveness of cloud computing?
But, there are dangers in the cloud computing jungle and cloud security measures must be put in place to eliminate and resolve them. According to the Cloud Security Alliance, three types of threats have worsened between 2010 and today.
- Data Breaches
- Data Loss
- Account or Service Traffic Hijacking
Let’s explore how proper cloud security can protect you from these top threats.
1. Data Breaches
The attack can originate from many sources:
- Malevolent hackers
- Fierce competitors
- Insiders: employees, subcontractor, vendors, etc.
Regardless of the origin, the attack must be stopped before it causes damage.
Of course, you must put in place cloud security measures like anti-virus, firewalls, strict password policies, and accurate logs. But hackers can be deviously conniving. In November 2012, researchers from the University of North Carolina, the University of Wisconsin and RSA Corporation released a paper describing how a virtual machine could use side channel timing information to extract private cryptographic keys being used in other virtual machines on the same physical server. Whether your potential attackers are as sophisticated, there are ways to stop them from causing damage.
Encrypting your data, for example, is a security measure you MUST insist on. If you do it right, even if a breach does occur, your data will not be readable – and will therefore not be usable.
Encrypting data is relatively easy. Adhere to best practices like AES-256 and SHA-2. These techniques provide the best assurance that data has not been tampered with. SSL/TLS must always be enabled. IPsec communications should be allowed.
But once your data is encrypted, the cloud security challenge is to ensure the data cannot be decrypted. If your data is encrypted well, but the encryption keys are also accessible to attackers (stored in the same location or stored with a cloud provider, for example), the encryption does not matter.
The best practice here is to use split key management and homomorphic key encryption. The first splits your encryption key in parts. One part is handled by the cloud security application and one part is always handled only by you. BOTH parts are required to decrypt your data. This way, even if one part is used illicitly, your data cannot be breached. The second measure, homomorphic key encryption, is the only way to ensure that the key itself is encrypted, even while in use.
By using these two best practices, your cryptographic keys cannot be compromised.
2. Data Loss
Almost as terrifying as your data being accessed by outsiders (or insiders gone bad) is losing your data. Of course, losing data doesn’t allow anyone else to use it, but it also does not allow you to use it. Can your business perform without its data?
Data loss can occur as a result of virus or hacker attack, but it can also come from an accidental deletion by a cloud provider, a natural disaster like an earthquake, fire, flood, tornado…
Best practice here, of course, is backup. You could back up your data on physical devices outside of the cloud, but then you lose a lot of the benefits of using the cloud. Opting for an online backup and disaster recovery protocol is a great solution, but it opens another possible entry point for attackers (see the data breach section, above).
Solving this challenge does not have to be . . . well, challenging. The same best practices we dexcribed above apply here as well. Encrypt data before uploading or transferring it to a cloud backup or cloud disaster recovery platform. And always use split key management and homomorphic key encryption.
3. Account or Service Traffic Hijacking
Phishing, fraud, and exploitation of software vulnerabilities can cause your credentials to be stolen. With stolen credentials, attackers can often access critical areas of deployed cloud computing services, allowing them to compromise the confidentiality, integrity and availability of those services. In April 2010, Amazon experienced a Cross-Site Scripting (XSS) bug that allowed attackers to hijack credentials from the site. Even Amazon is a target!
How do you eliminate the risk of your credentials being stolen? Easy! Don’t trust anyone with them. Your encryption keys should always be under your own control. Do not allow your cloud provider to control your keys. Ever.
Another important factor to consider here is not avoiding such hijacking, but also mitigating the damages in case it occurs. A way to do this is to segment your encryption. Each encryption project can contain as much (or as little) data as required, across multiple disks, databases, file servers and object storage.
Conclusion: Top Threats and Top Solutions
Yes, there are threats to operating in the cloud (let’s face it: there are threats to operating any business), but with current technologies offering ways to thwart the top threats of data breaches, data loss, and hijacking, the benefits of cloud computing far outweigh the risks.
The time to institute strong cloud security and encryption is now – before an attack. Don’t think that it cannot (or will not) happen to you because you are too powerful or too big (or too small). It happened to Amazon. It happens to businesses every day. And these types of catastrophes have the ability to exhaust budgets, destroy reputations, and in some cases – eradicate a business.
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Sep. 25, 2016 09:30 PM EDT Reads: 2,461
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Sep. 25, 2016 09:00 PM EDT Reads: 906
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Sep. 25, 2016 07:30 PM EDT Reads: 2,582
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Sep. 25, 2016 07:15 PM EDT Reads: 1,235
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
Sep. 25, 2016 06:30 PM EDT Reads: 1,808
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Sep. 25, 2016 05:30 PM EDT Reads: 1,550
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Sep. 25, 2016 03:00 PM EDT Reads: 1,582
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
Sep. 25, 2016 02:30 PM EDT Reads: 1,524
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Sep. 25, 2016 02:00 PM EDT Reads: 1,522
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
Sep. 25, 2016 01:00 PM EDT Reads: 837
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
Sep. 25, 2016 12:45 PM EDT Reads: 2,469
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Sep. 25, 2016 12:15 PM EDT Reads: 3,385
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Sep. 25, 2016 12:15 PM EDT Reads: 1,124
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
Sep. 25, 2016 11:45 AM EDT Reads: 1,652
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Sep. 25, 2016 11:30 AM EDT Reads: 1,520
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Sep. 25, 2016 11:00 AM EDT Reads: 1,579
SYS-CON Events announced today that China Unicom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE F...
Sep. 25, 2016 10:30 AM EDT Reads: 1,704
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, will discuss how VPaaS enables you to move fast, creating scalable video experiences that reach your...
Sep. 25, 2016 10:00 AM EDT Reads: 946
Big Data has been changing the world. IoT fuels the further transformation recently. How are Big Data and IoT related? In his session at @BigDataExpo, Tony Shan, a renowned visionary and thought leader, will explore the interplay of Big Data and IoT. He will anatomize Big Data and IoT separately in terms of what, which, why, where, when, who, how and how much. He will then analyze the relationship between IoT and Big Data, specifically the drilldown of how the 4Vs of Big Data (Volume, Variety,...
Sep. 25, 2016 10:00 AM EDT Reads: 984
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 25, 2016 09:00 AM EDT Reads: 1,574