The Year of the Cloud

Vendors unite to address security issues

Nearly every day, a new report or headline touts the latest cloud computing security scare. Take these recent news bits: only 47 percent of respondents believe cloud services are evaluated for security before deployment; 60 percent of 1,600 senior executives in 56 countries perceive an increase in risk from the use of cloud computing and 48.1 percent said they are not confident a compliance audit of their cloud-based apps would show that all user access is appropriate.

The hype about cloud computing is hard to ignore, as industry analysts, pundits, bloggers, IT departments and CIOs all try to figure it out while being told to leverage its agility and cost-effectiveness, yet given little guidance about how to do so.

First, it is necessary to clarify an important point that cloud computing is nothing more than a new consumption model for technology. This point gets lost in all the hype, and people often talk about the cloud as if, by itself, it will create world peace, or at least eliminate all technology woes. While it’s not a panacea, a cloudbased consumption model does have clear, measurable benefits, such as faster time-to-implementation, less infrastructure burden, more affordable pay-as-yougo pricing and easy scalability up or down.

As with any solution, cloud-based products bring risk. Because putting your infrastructure, Web development environment or application in the cloud takes away IT control, the fears around data protection and overall security are understandable.

However, evaluating cloud security should be no different than evaluating any other solution. A good cloud vendor should be able to withstand a security review, produce security audit reports, prove compliance adherence and document access control rules, among a number of other security-related best practices.

Not so long ago, network administrators thought putting an SSL VPN in the DMZ was absolute foolishness, and there was no way they were going to allow a “hole” in their firewall to let mobile workers access data on the corporate network.

The cloud is today’s deperimiterization argument.

Just as there are differences among products in any category, all clouds are not created equal. There is not yet a standard by which to judge clouds; however, the people in the cloud industry are moving in that direction.

The industry is responding to IT concerns about cloud security and lack of standardization or criteria around cloud computing, and we are seeing the formation of industry groups, forums and associations across vendors and standards bodies. In 2011, this cooperation will accelerate, as much of the groundwork has already been put in place in the last year.

Even the government is trying to help. For example, the National Institute of Standards and Technology -- the folks who brought you the Federal Information Processing Standards known as FIPS -- recently hosted a cloud computing forum and workshop on next steps in developing cloud computing standards.

In Asia, 11 companies representing the computing, software, hardware and service provider communities, including Cisco, Microsoft and Verizon, have pooled their resources to form a nonprofit organization called the Asia Cloud Computing Association or “Asia Cloud.”

One of the first organizations to create a unified recommendation for cloud security was the Cloud Security Alliance. Born in 2008 from an idea and discussion during a security practitioners’ conference, the ISSA CISO Forum in Las Vegas, the founders have brought together academics, enterprises, vendors and experts to develop guidance and promote best practices for security assurance within cloud computing. CSA’s mission is to promote a common level of understanding between the consumers and providers of cloud.

This might sound very “kumbaya,” but in two short years, the CSA has grown into a strong organization that has successfully shifted the discussion on cloud security. Today, it has more than 10,000 members and a myriad of resources. In November 2010, the CSA hosted its annual Congress, and its published “Security Guidance for Critical Areas of Focus in Cloud Computing” is in version 2.1.

The Open Web Application Security Project (OWASP) is another nonprofit organiza

tion and open community dedicated to improving the security of application software. It draws its spirit from the open-source community and is focused on the element of trust on the Web. The OWASP Top 10 identifies the 10 most critical Web application security risks and also provides guidance on how to avoid or avert these risks. Remember, a cloud solution is built on the Internet.

The PCI DSS compliance mandate, which is a must-have for the credit card industry, includes the OWASP Top 10 as part of its framework. We also will see regulations such as PCI DSS start to apply specific cloud security mandates to its requirements.

While anxiety over cloud security is not likely to go away anytime soon, we will see heightened cooperation and focus by cloud vendors and the industry at large to help companies increase confidence and understand when leveraging the cloud is appropriate and safe.

In addition, as more companies employ cloud solutions, best practices will emerge on the enterprise side from which we can all learn.

And we are already seeing a shift in attitude. In a recent survey we conducted, 84 percent of respondents said they believe sensitive data can be secure in the cloud, while nearly half said they believe cloud solutions are as secure as on-premise solutions.

Survey results aside, you need to decide what is right for your organization. If the business needs to move quickly to address customer needs, you most likely will be looking to the cloud to solve the challenge. When you do, approach the cloud solution with the same security requirements and criteria as you would any solution in your own data center. And a reminder to my cloud vendor brethren: The onus is on us to continue to raise the bar on best practices, be compliant and develop SLAs that provide the most secure environment possible to our customers.

This article originally appeared in the January 2011 issue of Security Today.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.