Cloud Security: What You Need To Know To Lock It Down 74
Nerval's Lobster writes "IT security writer Steve Ragan writes: 'The word "cloud" is sometimes overused in IT—and lately, it's been tossed around more than a football during a tailgating party. Be that as it may, organizations still want to implement cloud-based initiatives. But securing assets once they're in the cloud is often easier said than done.' He then walks through some of the core concepts of cloud security, along with the companies operating in the space."
Lock it down (Score:5, Interesting)
the only safe cloud is a dead cloud.
Re: (Score:2)
But every cloud has a silver lining and silver is a good conductor of electricity
Re: (Score:2)
But how do you stop the silver from conducting your data to unauthorized parties?
Re: (Score:2)
client side encryption. i don't stop them from sending it to unauthorized parties but it sure as hell won't let them read it
Re: (Score:1)
Liberal amounts of arsenic.
Re: (Score:2)
i can encrypt my database and querie it without having to decrypt it.* so yes i can.
*(http://www.forbes.com/sites/andygreenberg/2011/12/19/an-mit-magic-trick-computing-on-encrypted-databases-without-ever-decrypting-them/)
Easy (Score:2, Interesting)
Easy solution: Don't do it. There, I saved you having to RTFA which is just spam to drive hits to Slashdot's Cloud page.
You can't have it all. (Score:2, Informative)
There is no guarantee that once you put it out on "the cloud" that someone else won't reach for it.
Re: (Score:2)
Or encrypt it before you put it out on "the cloud". AES-128 ought to provide at least three or four years of protection.
Re: (Score:1)
ROT-13 encryption should be good enough for anyone. ROT-26 if you absolutely NEED the extra security...
Re: (Score:2)
If you want something to be secure, you have to store it in house.
There is no guarantee that once you put it out on "the cloud" that someone else won't reach for it.
But don't you already encrypt your sensitive data at rest? If that's the case, is the cloud really any less secure than having it in-house? Your secret data is more likely to leave your facility through your internet connection than from someone taking a hard drive from your server.
Cloud = server (Score:1)
In the "beginning" was the text terminal connected to a server through a cable. Fast forward half a century. Now its the mobile smartphone connected to a server cluster via radiowaves. What's the big deal?
Re: (Score:2)
Re: (Score:1)
Did you really think your data couldn't walk out the door before? Nothing has changed...
its the 10/10 security problem (Score:2)
If you run a server room (or rooms) then you can put a couple "retired" Marines at the door and have them SHOOT anyone not authorized to enter.
with THE CLOUD you don't know exactly which door (or even which BUILDING currently has your data.
(hint 10/10 is the Marine Corp Birthday)
Re: (Score:2)
Re: (Score:2)
With "the cloud", you don't own the server. So you don't decide how your data is secured.
Re: (Score:3)
http://xkcd.com/908/ [xkcd.com]
Re: (Score:2)
How many people could access that server?
Insecure, and the cloud providers know it. (Score:5, Insightful)
From the article:
"When you sign a Business Associate agreement, there's a level of liability that the business associate accepts. They openly acknowledge they have to operate within the HIPAA security rule like any covered entity. Understandably, none of the current cloud providers are willing to do that."
That says it all. The major cloud providers won't accept responsibility for security in their own systems.
Re:Insecure, and the cloud providers know it. (Score:4, Insightful)
Did you actually read that whitepaper? Amazon says you should encrypt the data BEFORE uploading it to S3. Doesn't that tell you everything you need to know about S3's security? And to top it all off, at the end:
Disclaimer
This white paper is not intended to constitute legal advice. You are advised to seek the advice
of counsel regarding compliance with HIPAA and other laws that may be applicable to you
and your business. Amazon Web Services LLC. and its affiliated entities make no
representations or warranties that your use of Amazon Web Services will assure compliance
with applicable laws, including but not limited to HIPAA.
Re: (Score:2)
Did you actually read that whitepaper? Amazon says you should encrypt the data BEFORE uploading it to S3
You should always encrypt your data before it's stored on any disk media, not just "cloud storage".
Re: (Score:1)
That's the thing: amazon can encrypt your data with aes256.. but they are saying you should encrypt it yourself before uploading it.
In other worse, their encryption is not good enough to comply with HIPPA
Re: (Score:1)
WHAT? (Score:1)
'it's been tossed around more than a football during a tailgating party'
The hell does that even mean? I need a car analogy, STAT.
Car analogy Re:WHAT? (Score:1)
In-house computing is like having a corporate car or fleet of cars owned or leased by your company, dedicated to its use.
Shared-cloud (vs. intranet-cloud, managed in-house) computing is as if you paid a car-rental company $X/year for the right to have any of your employees walk up to the rental counter and be issued a car at any time day or night, without any additional payment and without any lack of availability beyond what was negotiated in the master contract.
Re: (Score:3)
It's been tossed around more than a Fiesta in a Ken Block video.
Re: (Score:2)
'it's been tossed around more than a football during a tailgating party'
The hell does that even mean? I need a car analogy, STAT.
It's an alogy to help you in case you couldn't understand the previous line: 'The word "cloud" is sometimes overused in IT'. And quite frankly, anyone who doesn't already know the term is overused, and after upon being informed of that fact needs an analogy to help them understand it, really shouldn't be directly in charge of anything IT related.
Re: (Score:1)
On a side note, that's a very relevant sig you have there.
Can't be done. (Score:5, Informative)
The cloud provider effectively has physical access to your machine, which is game over for any sort of security. Even if you use full disk encryption, you're going to have to decrypt it, and that means your key will be in RAM. A motivated spy in the cloud provider would have little trouble dumping your VM's RAM and decrypting everything.
You might be able to get away with running machines locally, and using the cloud for storage, if you encrypt everything locally and only store encrypted data in the cloud. But that removes most of the benefits of using the cloud in the first place.
Re: (Score:2, Insightful)
There's always someone who can compromise your secret data. In a typical non-cloud in-house datacenter who is it? The 7 guys in the IT department, the 4 other guys in the network department, 5 or 6 key developers who have privileges to debug realtime production problems, a few high-level VPs and Execs. Oh and let's not forget all of the hardware vendors you're trusting not to plant hardware backdoors in the servers and network gear they ship you (it has happened before!). You're already putting a lot of
Re: (Score:2)
Not all the benefits (Score:5, Informative)
Locally-encrypted backup-to-the-cloud is a viable, marketable service. This works both on an "intranet" basis for departments that don't, or for legal reasons can't,* trust IT with access to their data but who want the physical security of their backups managed by IT as well as on the "internet" as an outsourced-backup arrangement.
* Human Resources and departments that have certain external contractual obligations may not want to allow anyone outside of their department to have access to un-encrypted data or encryption keys. In certain industries like defense or medical care, the entire business may function like this.
Re: (Score:1)
Too bad you couldn't have made first post, that's all that needs to be said on the subject.
Re: (Score:2)
The cloud provider effectively has physical access to your machine, which is game over for any sort of security. Even if you use full disk encryption, you're going to have to decrypt it, and that means your key will be in RAM. A motivated spy in the cloud provider would have little trouble dumping your VM's RAM and decrypting everything.
You might be able to get away with running machines locally, and using the cloud for storage, if you encrypt everything locally and only store encrypted data in the cloud. But that removes most of the benefits of using the cloud in the first place.
You could still 'cloud' anything not sensitive, and keep anything considered sensitive local -
Re: (Score:1)
Re: (Score:1)
There are plenty of things you can do to take advantage of computational resources in the cloud while remaining secure i.e. private information retrieval, secure multiparty computation, homomorphic encryption, etc.
I think fully homomorphic encryption is still in the PoC stage and is too resource-intensive to be practical.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
I thought people ate bad food and drank bad drinks at these so-called tailgating parties. Do they really also throw a ball around?
No. They'd like to, but they are too drunk from drinking bud light and too fat from eating chili dogs to be capable of that sort of strenous physical exercise.
Whose cloud is it anyway? (Score:2)
Is it my intranet-cloud managed by my IT department?
Is it a dedicated cloud that my company out-sources, but which is not used by anyone else? If the servers in this dedicated cloud are virtual, are the real servers also dedicated to just my company? To the extend that there is un-encrypted communication between virtual or real servers, is the physical network the traffic travels on dedicated only to me, as it might be if all the equipment was on the same rack?
If the servers are outside of my physical con
Step #1 (Score:4, Insightful)
Don't use the cloud.
Step #2
We don't need no stinking step #2.
Re: (Score:2)
Step 1: put Step 1 in the body of your message, so people can find it.
I use cloud services and so do you (Score:1)
I outsource my tech-news aggregation services to a trusted outside vendor [tinyurl.com] and I suspect you do too.
Re: (Score:2)
Re: (Score:2)
Ultimate responsibility (Score:2)
This is a resounding vote for private cloud. At the very least, i
CumuloNumbnuts (Score:2)
Re: (Score:2)
You do know this article is talking about "public cloud" services ? What you describe is called "private cloud".
Relevance of responses (Score:4, Interesting)
(Go ahead and mod this flamebait. I just need to rant)
When I read the replies that always come up in these cloud discussions, I often wonder how many people on this forum are real IT professionals and how many are just people with opinions that were formed in a vacuum. When I read these cloud articles, I think about them in the context of large corporations with many divisions that are consolidating IT operations. I think of application silos, and business continuity/disaster recovery. I think of internal IT provisioning resources to departments and using technology like hardware and storage virtualization to be smarter about how they allocate resources. I think about rapid provisioning of test/dev and QA environments, or rapidly spinning up new servers to meet unanticipated growth or to address seasonal growth trends.
So many of the comments seem to be coming from people whose entire concept of IT revolves around their home music collections, or working in a very small company that handles everything in house. The idea of giving up control to a cloud provider in that context seems reasonable. But there are large uses for "cloud" technologies that far surpass the tiny use cases in the SMB market. Denouncing everything to do with "cloud" shows a really immature understanding of how the technology is being deployed in the real world.
If you are not up to speed on how virtualization and distributed computing environments can improve IT operations, your skills are probably stagnant and you either need to sharpen your skills, or pick another field. Whining about cloud being a buzzword is not doing you any good. It just making you look irrelevant and out of touch. Having said that, I will be the first to admit that it is an annoying buzzword. But pointing it out is lame at this point. Even a broken clock tells the right time twice a day. If you cannot see how cloud technologies are relevant to IT, you are probably in the wrong discipline.