Skip to main content

How to avoid security pitfalls of Cloud Computing?

Steve, CTO at Secerno has written a neat article on security around CC.

Demystifying cloud computing

The realities of cloud computing are that it is driven by economics; and reducing cost does not always mean an improvement in security. Securing data isn't an easy task and exposing services and moving data outside an organisation does not automatically make data security easier, it can actually make it more complex. Those adopting cloud computing must remember it is the responsibility of the data owner, not the service provider to secure valuable data.

There are many myths surrounding the security of cloud computing, which need to be addressed to enable businesses to get the full benefits of this technology. Design and implementation of access controls is just as important and easy to get wrong in-the-cloud as it is in any IT system, but exposure to remote attackers is higher in-the-cloud, accentuating the risks. There is a perception that cloud computing removes data compliance pains, however it should be clear that the data owner is still fully responsible for compliance. Furthermore, concentrating several companies' mission critical data in a single location provides an enriched target that will inevitably attract the forces of e-crime. Hackers only have to get lucky once – the cloud must defend the data from all misuse – a tough job!

Cloud computing is not necessarily more secure; applications with years of expert development still contain undiscovered vulnerabilities that can be a risk to data security. There is insufficient evidence that cloud computing providers have got it right yet; nor for that matter, have the organisations in determining and enforcing which users have access to what.

Cloud applications undergo constant feature additions and users must keep up to date with the application improvements to ensure they are protected. This means that users have to constantly upgrade as an older version will not function, or protect the data.


Source

Comments

  1. Wow, where to start...

    Not for nothing, but I'm not sure this article demystified anything other than the fact that re-hashing the same privacy arguments brought forward by SaaS years ago is certainly a new trend.

    I do take argument with this statement however:

    "Those adopting cloud computing must remember it is the responsibility of the data owner, not the service provider to secure valuable data."

    ...actually it's the responsibility of BOTH parties. If it isn't, the folks negotiating your partner contracts ought to look for other work. BOTH parties are stewards of the information and should exercise due care in protecting it.

    Further, it's really odd that somehow the "cloud" means "massively distributed." That's not really the case with most SaaS offerings re-branded as "cloud offerings." There are LOTS of clouds, but that doesn't mean they are interconnected, federated or widely distributed outside of the datacenters serving them.

    OK, I sense a blog post coming...

    /Hoff

    ReplyDelete
  2. Wow, where to start...

    Not for nothing, but I'm not sure this article demystified anything other than the fact that re-hashing the same privacy arguments brought forward by SaaS years ago is certainly a new trend.

    I do take argument with this statement however:

    "Those adopting cloud computing must remember it is the responsibility of the data owner, not the service provider to secure valuable data."

    ...actually it's the responsibility of BOTH parties. If it isn't, the folks negotiating your partner contracts ought to look for other work. BOTH parties are stewards of the information and should exercise due care in protecting it.

    Further, it's really odd that somehow the "cloud" means "massively distributed." That's not really the case with most SaaS offerings re-branded as "cloud offerings." There are LOTS of clouds, but that doesn't mean they are interconnected, federated or widely distributed outside of the datacenters serving them.

    OK, I sense a blog post coming...

    /Hoff

    ReplyDelete

Post a Comment

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op

Virtualization is hot and sexy!

If this does not convince you to virtualize, believe me, nothing will :-) As you will hear these gorgeous women mention VMware, Akkori, Pano Logic, Microsoft and VKernel. They forgot to mention rackspace ;-) virtualization girl video I'm convinced, aren't you? Check out their site as well!