|By Gilad Parann-Nissany||
|January 29, 2014 09:15 AM EST||
To say that cloud security for cloud computing is gaining traction would be the understatement of our era. Whether in public clouds, private clouds, or hybrid scenarios – it seems like everyone is in the cloud. Healthcare providers, eCommerce, disaster recovery services, data storage . . . the types of cloud services available seem to cover every base. What would Darwin think about his “Survival of the Fittest” evolving from animal species to businesses who take advantage of the flexibility, elasticity, and cost-effectiveness of cloud computing?
But, there are dangers in the cloud computing jungle and cloud security measures must be put in place to eliminate and resolve them. According to the Cloud Security Alliance, three types of threats have worsened between 2010 and today.
- Data Breaches
- Data Loss
- Account or Service Traffic Hijacking
Let’s explore how proper cloud security can protect you from these top threats.
1. Data Breaches
The attack can originate from many sources:
- Malevolent hackers
- Fierce competitors
- Insiders: employees, subcontractor, vendors, etc.
Regardless of the origin, the attack must be stopped before it causes damage.
Of course, you must put in place cloud security measures like anti-virus, firewalls, strict password policies, and accurate logs. But hackers can be deviously conniving. In November 2012, researchers from the University of North Carolina, the University of Wisconsin and RSA Corporation released a paper describing how a virtual machine could use side channel timing information to extract private cryptographic keys being used in other virtual machines on the same physical server. Whether your potential attackers are as sophisticated, there are ways to stop them from causing damage.
Encrypting your data, for example, is a security measure you MUST insist on. If you do it right, even if a breach does occur, your data will not be readable – and will therefore not be usable.
Encrypting data is relatively easy. Adhere to best practices like AES-256 and SHA-2. These techniques provide the best assurance that data has not been tampered with. SSL/TLS must always be enabled. IPsec communications should be allowed.
But once your data is encrypted, the cloud security challenge is to ensure the data cannot be decrypted. If your data is encrypted well, but the encryption keys are also accessible to attackers (stored in the same location or stored with a cloud provider, for example), the encryption does not matter.
The best practice here is to use split key management and homomorphic key encryption. The first splits your encryption key in parts. One part is handled by the cloud security application and one part is always handled only by you. BOTH parts are required to decrypt your data. This way, even if one part is used illicitly, your data cannot be breached. The second measure, homomorphic key encryption, is the only way to ensure that the key itself is encrypted, even while in use.
By using these two best practices, your cryptographic keys cannot be compromised.
2. Data Loss
Almost as terrifying as your data being accessed by outsiders (or insiders gone bad) is losing your data. Of course, losing data doesn’t allow anyone else to use it, but it also does not allow you to use it. Can your business perform without its data?
Data loss can occur as a result of virus or hacker attack, but it can also come from an accidental deletion by a cloud provider, a natural disaster like an earthquake, fire, flood, tornado…
Best practice here, of course, is backup. You could back up your data on physical devices outside of the cloud, but then you lose a lot of the benefits of using the cloud. Opting for an online backup and disaster recovery protocol is a great solution, but it opens another possible entry point for attackers (see the data breach section, above).
Solving this challenge does not have to be . . . well, challenging. The same best practices we dexcribed above apply here as well. Encrypt data before uploading or transferring it to a cloud backup or cloud disaster recovery platform. And always use split key management and homomorphic key encryption.
3. Account or Service Traffic Hijacking
Phishing, fraud, and exploitation of software vulnerabilities can cause your credentials to be stolen. With stolen credentials, attackers can often access critical areas of deployed cloud computing services, allowing them to compromise the confidentiality, integrity and availability of those services. In April 2010, Amazon experienced a Cross-Site Scripting (XSS) bug that allowed attackers to hijack credentials from the site. Even Amazon is a target!
How do you eliminate the risk of your credentials being stolen? Easy! Don’t trust anyone with them. Your encryption keys should always be under your own control. Do not allow your cloud provider to control your keys. Ever.
Another important factor to consider here is not avoiding such hijacking, but also mitigating the damages in case it occurs. A way to do this is to segment your encryption. Each encryption project can contain as much (or as little) data as required, across multiple disks, databases, file servers and object storage.
Conclusion: Top Threats and Top Solutions
Yes, there are threats to operating in the cloud (let’s face it: there are threats to operating any business), but with current technologies offering ways to thwart the top threats of data breaches, data loss, and hijacking, the benefits of cloud computing far outweigh the risks.
The time to institute strong cloud security and encryption is now – before an attack. Don’t think that it cannot (or will not) happen to you because you are too powerful or too big (or too small). It happened to Amazon. It happens to businesses every day. And these types of catastrophes have the ability to exhaust budgets, destroy reputations, and in some cases – eradicate a business.
The only place to be June 9-11 is Cloud Expo & @ThingsExpo 2015 East at the Javits Center in New York City. Join us there as delegates from all over the world come to listen to and engage with speakers & sponsors from the leading Cloud Computing, IoT & Big Data companies. Cloud Expo & @ThingsExpo are the leading events covering the booming market of Cloud Computing, IoT & Big Data for the enterprise. Speakers from all over the world will be hand-picked for their ability to explore the economic strategies that utility/cloud computing provides. Whether public, private, or in a hybrid form, clo...
Apr. 28, 2015 10:00 AM EDT Reads: 4,197
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of robomq.io, and Fred Yatzeck, principal architect leading product development at robomq.io, will discuss how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at the same time reduce Time to Market (TTM) by using plug and play capabilities offered by a robust I...
Apr. 28, 2015 10:00 AM EDT Reads: 1,985
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what the future may hold. Mike Kavis is Vice President & Principal Cloud Architect at Cloud Technology Pa...
Apr. 28, 2015 10:00 AM EDT Reads: 6,223
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? Join this panel of experts as they peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you’ll have no problem filling in your buzzword bingo cards.
Apr. 28, 2015 10:00 AM EDT Reads: 2,227
SYS-CON Events announced today that CodeFutures, a leading supplier of database performance tools, has been named a “Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. CodeFutures is an independent software vendor focused on providing tools that deliver database performance tools that increase productivity during database development and increase database performance and scalability during production.
Apr. 28, 2015 10:00 AM EDT Reads: 3,264
SYS-CON Events announced today the IoT Bootcamp – Jumpstart Your IoT Strategy, being held June 9–10, 2015, in conjunction with 16th Cloud Expo and Internet of @ThingsExpo at the Javits Center in New York City. This is your chance to jumpstart your IoT strategy. Combined with real-world scenarios and use cases, the IoT Bootcamp is not just based on presentations but includes hands-on demos and walkthroughs. We will introduce you to a variety of Do-It-Yourself IoT platforms including Arduino, Raspberry Pi, BeagleBone, Spark and Intel Edison. You will also get an overview of cloud technologies s...
Apr. 28, 2015 10:00 AM EDT Reads: 3,045
SYS-CON Events announced today that Creative Business Solutions will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Creative Business Solutions is the top stocking authorized HP Renew Distributor in the U.S. Based out of Long Island, NY, Creative Business Solutions offers a one-stop shop for a diverse range of products including Proliant, Blade and Industry Standard Servers, Networking, Server Options and Care Packs. As a trusted supplier, CBS guarantees quality controlled stock levels thanks to an Auto...
Apr. 28, 2015 09:15 AM EDT Reads: 4,367
SOA Software has changed its name to Akana. With roots in Web Services and SOA Governance, Akana has established itself as a leader in API Management and is expanding into cloud integration as an alternative to the traditional heavyweight enterprise service bus (ESB). The company recently announced that it achieved more than 90% year-over-year growth. As Akana, the company now addresses the evolution and diversification of SOA, unifying security, management, and DevOps across SOA, APIs, microservices, and more.
Apr. 28, 2015 09:15 AM EDT Reads: 2,440
After making a doctor’s appointment via your mobile device, you receive a calendar invite. The day of your appointment, you get a reminder with the doctor’s location and contact information. As you enter the doctor’s exam room, the medical team is equipped with the latest tablet containing your medical history – he or she makes real time updates to your medical file. At the end of your visit, you receive an electronic prescription to your preferred pharmacy and can schedule your next appointment.
Apr. 28, 2015 09:00 AM EDT Reads: 1,450
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of WebRTC adoption today, but the potential is limitless when powered by IoT.
Apr. 28, 2015 09:00 AM EDT Reads: 5,301
SYS-CON Events announced today that Optimal Design, an Internet of Things solution provider, will exhibit at SYS-CON's Internet of @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Optimal Design is an award winning product development firm offering industrial design and engineering services to the consumer, medical, and defense markets.
Apr. 28, 2015 09:00 AM EDT Reads: 1,699
Chuck Piluso will present a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Speaker Bio: Prior to Data Storage Corporation (DSC), Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of International Telecommunications Corporation, a facilities-based international carrier licensed by t...
Apr. 28, 2015 09:00 AM EDT
There are lots of challenges in IoT around secure, scalable and business friendly infrastructure for enterprises. For large corporations, IoT implementations are one of the top priorities of the decade. All industries are seeing a competitive need to sustain by investing in IoT initiatives. The value addition comes from improved customer service, innovative product and additional revenue streams. The data from these IP-connected devices can be leveraged for a variety of business applications as well as responsive action controls. The various architectural building blocks of an IoT ...
Apr. 28, 2015 09:00 AM EDT
GENBAND introduced its Real Time Communications (RTC) Client for Lync* to seamlessly combine real-time communications with Lync Instant Messaging (IM) and Presence. “We’re shaking up the economics of delivering Unified Communications (UC) and offering a compelling way to integrate previously bespoke communications technologies,” said Carl Baptiste, GENBAND’s Senior Vice President, Enterprise Solutions. “We’re offering enterprises the best of both worlds by combining our own high availability voice, video and collaboration with Lync’s IM and Presence; creating a single, web centric, client. O...
Apr. 28, 2015 09:00 AM EDT Reads: 1,740
The list of ‘new paradigm’ technologies that now surrounds us appears to be at an all time high. From cloud computing and Big Data analytics to Bring Your Own Device (BYOD) and the Internet of Things (IoT), today we have to deal with what the industry likes to call ‘paradigm shifts’ at every level of IT. This is disruption; of course, we understand that – change is almost always disruptive.
Apr. 28, 2015 09:00 AM EDT Reads: 1,533
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the M2M space. This really allows some room for influential individuals to create more high value inter...
Apr. 28, 2015 08:45 AM EDT Reads: 5,133
The WebRTC Summit 2015 New York, to be held June 9-11, 2015, at the Javits Center in New York, NY, announces that its Call for Papers is open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 16th International Cloud Expo, @ThingsExpo, Big Data Expo, and DevOps Summit.
Apr. 28, 2015 08:45 AM EDT Reads: 2,469
SYS-CON Events announced today that Liaison Technologies, a leading provider of data management and integration cloud services and solutions, has been named "Silver Sponsor" of SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York, NY. Liaison Technologies is a recognized market leader in providing cloud-enabled data integration and data management solutions to break down complex information barriers, enabling enterprises to make smarter decisions, faster.
Apr. 28, 2015 08:15 AM EDT Reads: 3,903
Participants will reach the final if their IoT solution is liked. A community vote will determine the best solutions submitted in each country, after which an expert jury will select the national winners and the best international IoT solution. Each country's best solution can win a national marketing campaign worth up to €30,000 and become a partner in Deutsche Telekom's participating markets. The winning international solution can become partner of Deutsche Telekom Group across all eight countries and reach out to a potential of 10,8 million business customers. Deutsche Telekom Group has a...
Apr. 28, 2015 08:00 AM EDT Reads: 1,253
Recent technology advances in miniaturization has positioned the wearables as the pinnacle of technology convergence with the human body. We inquire if wearables are mere standard miniaturized devices extended with the connectivity and present our views on considerations like design, applications, performance, efficiency, interoperability, usage scenarios, human device interaction and consequent trade-offs enabling wearables to impart optimal value.
Apr. 28, 2015 08:00 AM EDT Reads: 1,174