{"id":2806,"date":"2016-04-19T14:18:39","date_gmt":"2016-04-19T14:18:39","guid":{"rendered":"https:\/\/devbloglavaprotocols.nityo.in\/cloud-security-so-are-we-secured-or-not\/"},"modified":"2016-04-19T14:18:39","modified_gmt":"2016-04-19T14:18:39","slug":"cloud-security-so-are-we-secured-or-not","status":"publish","type":"post","link":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/cloud-security-so-are-we-secured-or-not\/","title":{"rendered":"Cloud Security: So Are We Secured (or Not)?"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><span style=\"color: #ff6600;\"><strong>The recent Panama Paper scandal has left many organisations wondering if their level of security is adequate<\/strong><\/span><\/p>\n<p><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">During Lava\u2019s early days, a good three to four of the initial meetings were spent educating prospects about cloud technology before we could delve further into the product offerings itself. This was partly due to the lack of clarity on how the cloud operates but more importantly because the security and safety of data on cloud had to be addressed in great lengths.<\/span><span style=\"font-weight: 400;\"><br \/> <\/span><span style=\"font-weight: 400;\"><br \/> <\/span><span style=\"font-weight: 400;\">Today, whilst questions are still raised, it is seen more as a required checklist to be crossed-out by the vendor versus genuine worry or doubt in the security capabilities of trusted cloud providers. <\/span><\/p>\n<p><span style=\"color: #ff6600;\"><br \/> <strong>Related<\/strong><\/span>:\u00a0<a href=\"https:\/\/lavaprotocols.com\/2016\/04\/19\/60-second-data-security-checklist\/\" target=\"_blank\" rel=\"noopener\">The 60 Second Data Security Checklist<\/a><\/p>\n<p><span style=\"font-weight: 400;\"><br \/> <\/span><span style=\"font-weight: 400;\">A personal opinion on this is that cloud security is one which is being confidently overlooked unless you\u2019re in the financial sector, government sector (where sensitive and confidential data is involved) as well as GLCs (government-linked companies) from certain fields where cloud is only just being explored (largely adopting a wait-and-see approach to its GLC counterparts).<\/span><span style=\"font-weight: 400;\"><br \/> <\/span><span style=\"font-weight: 400;\"><br \/> <\/span><span style=\"font-weight: 400;\">It is interesting to note some of the concerns that have been raised with regards to cloud security. Here are<strong> two of the most frequently asked questions<\/strong> that have been raised across customer meetings, marketing events, and inbound query calls:<\/span><\/p>\n<p><span style=\"color: #ff6600;\"><em><strong>\u00a01. External<\/strong><\/em><b><i><b><i> threats via the internet are a bigger threat on the cloud vs the IT infrastructure located within your own backyard.<\/i><\/b><\/i><\/b><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security threats are certainly a concern with the Cloud Security Alliance quoting data breaches, account hijacking, insecure APIs and denial of services being some of the issues. These are known threats which require continuous up-to-date prevention initiatives. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, whilst the threats on the cloud are real, the level of scrutiny for detection and protection that needs to be taken by a hosting provider or on one\u2019s own infrastructure is similar to that which is required for a cloud infrastructure. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Considering the volume, experience and coverage of true cloud infrastructure providers such as Google and Amazon, simple <\/span><strong><i>cost + effort &#038; benefit<\/i><\/strong><span style=\"font-weight: 400;\"> comparisons should easily drive security choices in favour of the cloud.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Google for example shares that it protects customer data in-transit over the internet with SSL encryption. Its admin and security controls passed a ISAE 3402 Type II audit and they are the first cloud-based messaging and collaboration suite to achieve US FISMA (Federal Information Security Management Act) certification.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Two years ago, Google raised their bar even higher in their efforts to step up on security. Besides creating new security teams, their engineers discovered and helped fix vulnerabilities like Heartbleed and Poodle, and took a series of concrete steps to \u00a0increase the security of their customers\u2019 information by:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">making sure every single email sent or received is encrypted while moving internally between their data centers.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">releasing End-to-End, a Chrome extension that encrypts information between your browser and the intended recipient.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">ensuring all files uploaded to Google Drive are encrypted on Google servers \u2014 in addition to files which are in-transit, as they are being shared on the web.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">launching a physical security key that provides second-factor authentication through your computer\u2019s USB port. They are also working on admin tools to let you deploy this within a smaller scale in your organization.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">giving business users control to share responsibility with IT, providing a wizard to secure your account and a new dashboard to monitor device activity.<\/span><\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">Thorough security assurance is definitely wanted by many organisations but the question is would your own team or local hosting provider be able to invest in the same efforts to achieve such control?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Gartner analysts, the common cloud computing myth is that \u201c<\/span><i><span style=\"font-weight: 400;\">it is perceived as less secure. This is more of a trust issue than based on any reasonable analysis of actual security capabilities. To date, there have been very few security breaches in the<a href=\"https:\/\/lavaprotocols.com\/2014\/10\/24\/public-cloud-inherently-secure\/\" target=\"_blank\" rel=\"noopener\"> public cloud<\/a> \u2014 most breaches continue to involve on-premises data center environments. While cloud providers should have to demonstrate their capabilities, once they have done so there is no reason to believe their offerings cannot be secure.\u201d<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">During a conversation I had over coffee with the Head of IT of a large manufacturing group in Malaysia that has gone cloud, she shared that she would rather trust the security of her data with world class players over having it in her own backyard. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to this, the burden of having resources to manage and monitor such storage systems in lieu of them contributing to their value added roles is removed. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whilst security is an important part in each of our businesses, security and uptime is the heartbeat and survival point for cloud providers as it determines their long term survival in the business (hence the added effort by cloud providers to be at the top of their game to deal with the latest threats).<\/span><\/p>\n<p><span style=\"color: #ff6600;\"><br \/> <b><i><b><i>\u00a0 2. Cloud security is a new challenge<\/i><\/b><\/i><\/b><\/span><\/p>\n<p><span style=\"font-weight: 400;\">The truth is that cloud security is not new; it\u2019s not even unique. The underlying concern of security in relation to protection of the infrastructure and data is still prevalent regardless of whether it\u2019s with a hosting provider or having it in servers in your own office.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cloud technology provides the opportunity of virtualization which allows more security in comparison to having it stored in one physical environment. <a href=\"https:\/\/searchcloudcomputing.techtarget.com\/definition\/sharding\" target=\"_blank\" rel=\"noopener\">Sharding<\/a> (no, not sharing) of data provides better opportunity for encryption and makes it much tougher for potential hackers to hack. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is because data will be likely stored as fragments across a range of machines that are logically linked and reassembled on demand rather than as a single contiguous data set.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/lavaprotocols.com\/2015\/10\/28\/why-public-cloud-is-inherently-more-secure\/\" target=\"_blank\" rel=\"noopener\">Public clouds<\/a> are fundamentally multi-tenant to justify the scale and economics of the cloud so justifiably security is a common concern. Whilst traditional security perimeter is a network firewall, the cloud security perimeter now becomes the hypervisor and\/or underlying cloud application. To date, cloud security has been commendable, but it is dependent on the cloud service provider and requires a solid design and operational rigor that prioritizes security. <\/span><span style=\"font-weight: 400;\"><br \/> <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Data and systems control sharing to a 3rd party requires proper internal control to ensure that not every Tom, Dick &#038; Harry has access. It is crucial to work with your cloud service provider and\/or partners and understand about security from technical, operational, and control perspectives. The provider\u2019s experience and testimonials as stewards of customer systems and data should provide you the assurance (or lack of it) in making your call on their security reliability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Views shared are based on typical misconceptions or hearsay that tend to influence opinions on cloud security. It is important for organisations to examine and establish the security requirements relevant to its nature. Considerations may be done based on sensitivity of information, criticality of application and various other factors. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Decisions ultimately need to be done with appropriate matching of their application and system requirements to the right cloud solution that meets not only their functionality requirements but importantly the level of security and SLA standards. However setting of such security standards need to be done with proper consideration as to what is reasonable and sensibly required for their nature of business and operations.<\/span><\/p>\n<p><em><strong>Bibliography<\/strong><\/em><b><br \/> <\/b><span style=\"text-decoration: underline;\"><a href=\"http:\/\/www.csc.com\/cloud\/publications\/91578\/104057-5_cloud_security_myths_debunked\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">5 Cloud Security Myths Debunked<br \/> <\/span><\/a><a href=\"https:\/\/www.vmware.com\/files\/pdf\/VMware-Cloud-Security-Myths-Strategies-Uncovered-White-Paper.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Cloud Security Myths and Strategies Uncovered<br \/> <\/span><\/a><span style=\"font-weight: 400;\"><a href=\"https:\/\/books.google.com.my\/books?id=GjNjvJCIGIAC&#038;pg=PA47&#038;lpg=PA47&#038;dq=what+does+sharding+of+data+mean+for+cloud+security&#038;source=bl&#038;ots=MqUbsDnXUH&#038;sig=uLkpUTQLjrzoycKmGxGo-30A0w8&#038;hl=en&#038;sa=X&#038;ei=QzujVJGvBNTmuQTen4HQCQ&#038;sqi=2&#038;ved=0CDsQ6AEwAw#v=onepage&#038;q=what%20does%20sharding%20of%20data%20mean%20for%20cloud%20security&#038;f=false\" target=\"_blank\" rel=\"noopener\">What does sharding of data mean for cloud security?<\/a><a href=\"https:\/\/books.google.com.my\/books?id=GjNjvJCIGIAC&#038;pg=PA47&#038;lpg=PA47&#038;dq=what+does+sharding+of+data+mean+for+cloud+security&#038;source=bl&#038;ots=MqUbsDnXUH&#038;sig=uLkpUTQLjrzoycKmGxGo-30A0w8&#038;hl=en&#038;sa=X&#038;ei=QzujVJGvBNTmuQTen4HQCQ&#038;sqi=2&#038;ved=0CDsQ6AEwAw#v=onepage&#038;q=what%20does%20sharding%20of%20data%20mean%20for%20cloud%20security&#038;f=false\"><br \/> <\/a><\/span><a href=\"http:\/\/thoughtsoncloud.com\/2013\/11\/three-myths-about-cloud-security\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Three myths about cloud security<br \/> <\/span><\/a><a href=\"http:\/\/static.ziftsolutions.com\/files\/8ac631d23e64ffb1013e659d3fd8401d.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">5 Myths about Security in the Cloud<br \/> <\/span><\/a><a href=\"http:\/\/www.rackspace.com\/cloud\/cloud_computing_myths\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Rackspace<br \/> <\/span><\/a><a href=\"http:\/\/www.gartner.com\/newsroom\/id\/2889217\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Gartner Highlights the Top 10 Cloud Myths<br \/> <\/span><\/a><span style=\"font-weight: 400;\"><a href=\"http:\/\/googleforwork.blogspot.my\/2014\/12\/data-security-in-2014-make-it-more.html?utm_campaign=entblog&#038;utm_source=EOYTrust12182014&#038;utm_medium=g-plus\" target=\"_blank\" rel=\"noopener\">Data Security in 2014<\/a><\/span><br \/> <\/span><\/p>\n<p><strong><em>By Mithran Balakrishnan, Commercial &#038; Corporate Strategy Director of Lava Protocols.<\/em><\/strong><\/p>\n<p><i>Lava is an authorised Cloud Partner of Google and is a <\/i><a href=\"https:\/\/lavaprotocols.com\/email-and-collaboration\/\"><i>reseller of G Suite <\/i><\/a><i>(previously known as Google Apps, Google Maps for Work, and Google Cloud Platform) in Malaysia. With more than a decade of experience in the industry, we\u2019re proud to say we\u2019re one of the leading cloud consultants and service providers in the Asia Pacific region.<\/i><\/p>\n<p><span class=\"et_bloom_bottom_trigger\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During Lava\u2019s early days, a good three to four of the initial meetings were spent educating prospects about cloud technology before we could delve further<\/p>\n","protected":false},"author":1,"featured_media":2807,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[18],"class_list":["post-2806","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-blog"],"jetpack_featured_media_url":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-content\/uploads\/2024\/10\/privacy-policy-934426_640.jpg","_links":{"self":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/comments?post=2806"}],"version-history":[{"count":0,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2806\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media\/2807"}],"wp:attachment":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media?parent=2806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/categories?post=2806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/tags?post=2806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}