The Financial Express (Delhi Edition)

Cloud security risks are rising

-

WHAT do Apple, Amazon and Microsoft have in common? The answer: All three technology giants, considered the gold standard among cloud computing providers, have suffered the ignominy of being breached by hackers.

Apple’s “celebgate” incident exposed personal photos of its celebrity iCloud users and made unwelcome news headlines last year. UK technology provider Code Spaces was forced out of business last year after hackers tried to blackmail it and subsequent­ly deleted crucial data from its Amazon Web Services-hosted cloud storage. In 2013, an expired SSL certificat­e in Microsoft’s Azure cloud service gave hackers the chance to bring down the Xbox Live and a raft of other cloud-hosted services.

Cloud security risks are rising, with attacks growing at 45% year-on-year globally, according to cloud security fir m Alert Logic. In the next five years, $2 billion will be spent by enterprise­s to shore up their cloud defences, according to Forrester Research. First time cloud users can be most at risk, simply because of unfamiliar­ity with the new environmen­t and the added burden of having to grapple with a new way of managing users, data and security.

Here are five security must-do’s before taking the plunge. Know the cloudy areas: There are three main segments in any cloud deployment—the cloud vendor, network service provider and enterprise. Given that the cloud should be treated like an extension of the enterprise data centre, the question to ask is therefore: can a common set of security services and policies be applied across the three segments? What are the security gaps?

During vendor selection, ask the cloud vendor what security services it provides and which security vendors it works with. Also find out where the boundaries are in the shared security models that come with the cloud service.

RAJESH MAURYA

Understand the extent of your cloud provider’s responsibi­lities—and your own. In some cloud services, such as IaaS, it is the responsibi­lity of the enterprise to secure its applicatio­ns and data in the cloud. It is vital to know what security appliances and vendors the cloud provider offers/allows the enterprise to deploy in the cloud to do just that.

New apps, new fortificat­ions: Ready to move an app into the cloud? Before you do, consider adding new fortificat­ions to the existing security measures you have built around your app’s authentica­tion and log-in processes.

To fortify the access to your cloud applicatio­n, you should have a granular data access scheme. You can do so by tying access privileges to roles, company positions and projects. This will add an additional layer of protection when attackers steal your staff ’s login credential­s. Account hijacking may sound basic but this age old breach has been flagged by Cloud Security Alliance as a continuing top threat for cloud users. To fortify your login process, consider implementi­ng two-factor authentica­tion, posture checking and the use of onetime passwords.

Embrace encryption: Data encryption is one of your biggest security ally in the cloud, and it should be non-negotiable when it comes to file transfers and emails. While it may not prevent hacking attempts or data theft, it can protect your business and save an organisati­on from incurring hefty regulatory fines when the dreaded event happens.

Ask your cloud vendor about their data encryption schemes. Find out how it encrypts data that is at rest, in use, and on the move.

Wrestling with the virtual: Moving into the cloud lets businesses reap the benefits of virtualisa­tion, but a virtualise­d environmen­t can present challenges to data protection. The main issue has to do with managing the secu- rity and traffic in the realm of multi-tenancy and virtual machines.

Physical security appliances are typically not designed to handle the data that is in the cloud. This is where virtual security appliances come in—to secure traffic as it flows from virtual machine to virtual machine. Such appliances are built to handle the complexiti­es of running multiple instances of applicatio­ns, or multi-tenancy.

Ask your cloud provider how it safeguards its virtual environmen­t and find out what virtual security appliances it is using.

Don’t be in the dark: There is no shortage of anecdotes and reports out there that point to how the unauthoris­ed use of applicatio­ns and cloud services, or shadow IT, is on the rise among businesses. Your new cloud applicatio­n will be at risk because of this.

Preventing access to shadow IT is unlikely to stop its growth in any given organisati­on. It is more effective to educate your users and use technology to manage the issue. Encryption, network monitoring and security management tools can help defend your first cloud app against the risks of the shadow IT. The writer is country manager,

India & SAARC, Fortinet

 ??  ??

Newspapers in English

Newspapers from India