Gartner's state of Cloud security: Outages are bigger risk than breaches
- 14 November, 2012 20:48
Security remains a chief inhibitor to enterprise adoption of Cloud computing resources and one Gartner analyst says the biggest concern should not be that data could be compromised in the Cloud, but rather that there may be a Cloud outage that could lead to data loss.
There's a perception, says Gartner Cloud security analyst Jay Heiser, that the most significant risk in using the Cloud is that sensitive data can be leaked. But there's been little evidence of that, he says. Sony suffered a compromise of potentially tens of millions of customers in 2011 related to its Cloud, and there have been a handful of other breaches of personally identifiable information being leaked from the Cloud.
But more common nowadays are Cloud outages and data loss, and Heiser says many enterprises are ill-prepared for those incidents.
MORE CLOUD: 12 Free Cloud storage services
Just look at some of the major outages from the past few years. Amazon Web Services, the market-leading Cloud provider, has experienced three major outages in the past two years. After an April 2011 Elastic Compute Cloud (EC2) outage, some level of data was irrecoverable, Heisler says. Evernote lost the data of 6,000 customers in 2010 and Carbonite lost a portion of its customer's backups in 2009, he says.
Many of these events are caused by errors following upgrades of systems, he points out. Amazon, for example, credited its most recent outage on a new piece of hardware being installed in its data center.
The outage led to Reddit, Imgur and other popular sites being down, and AWS issued credits following the incident.
These issues have happened over and over, so they're likely to happen again, Hieser said during a webinar hosted by Gartner this week. Despite this being one of the biggest concerns for Cloud users, Heiser says only half of companies recently surveyed by Gartner had a process to evaluate their business continuity processes. He adds that security breaches should not be ignored, but the more pressing concern is around business continuity.
The Cloud industry is slowly addressing these concerns, but vendors, users and third-party bodies that are attempting to push Cloud security improvements could all be doing more, he says.
Vendors have been reluctant to address security recoverability from data loss in service-level agreements (SLA), he says. "It remains a common complaint that Cloud service providers are being ambiguous around what they're specifically doing to protect customers," he says. Some providers may not divulge information because doing so could represent a security threat, they say. Providers many times claim a high level of availability and confidentiality of users' data, but Heiser says they provide little evidence for customers to verify those statements.
Buyers could do more too though, he says. One of the first things users need to do is classify which data really needs to be protected. Incomplete or nonexistent data classification is a common problem. "If the buyer doesn't know what the security requirements are for a specific piece of data compared to other data, it's difficult to assess whether the provider can meet provide adequate security," he says.
Third-party organizations are working to create standards and certifications for this area, but Heiser says those are still weak at this point. The Cloud Security Alliance, for example, has undertaken broad measures to address a variety of topics, but he questions how in depth those efforts have been at drilling down into specific areas.
FedRAMP is a program by the federal government that seeks to have a common set of security criteria for each provider the federal government uses for Cloud computing, but it's in the early stages and may not be operational until 2014, he says. "We're beginning to get glimpse of what we need," Heiser says, but more work is needed to have standard controls, evaluation practices and global consensus. Buyers are in the best position to put pressure on vendors to be as transparent as possible on these issues, he adds.
So what's an enterprise Cloud user supposed to do? "Choose your battles over data control," Heiser says. The macro trend is that more data is going to more end-user devices, which makes controlling the data more difficult and creating more vulnerabilities. With a data classification scheme, organizations can prioritize which data needs to be heavily secured. For most organizations that extremely sensitive data will be less than 20% of data, and could be as little as 5% or less. That data should be given "heroic efforts" to protect it - encryption, tokenization, data loss prevention systems or keeping it on site and not in a public Cloud. Anti-virus, anti-malware and other security protections and controls should be in place to ensure the rest of data is not egregiously vulnerable. Ultimately, in today's world, the reality is, Hesier says that "most data will have to protect itself."
Network World staff writer Brandon Butler covers Cloud computing and social collaboration. He can be reached at BButler@nww.com and found on Twitter at @BButlerNWW.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
The enlightened CIO’s guide to running projects
Why IT projects really fail
Queensland government to provide 200 services online by 2015
Call Centers Suffer From Big Data Overload
CIO 100: Carsales wins top gong for innovation
Virtualisation and Cloud Computing: Optimised Power, Cooling and Management Maximises Benefits
IT virtualisation, the engine behind cloud computing, can have significant consequences on the data centre physical infrastructure. The particular effects of virtualisation are discussed and possible solutions or methods for dealing with them are offered. Download to learn more.
Power of Three: Building Mobile Initiatives Guided by Business Goals, Technology and Governance
The use of powerful mobile devices has become so widespread, industry leaders in almost every sector have embraced mobility solutions as central elements of their IT and business operations. As mobile budgets grow, so does the influence of business units on mobility strategy. However, without a comprehensive strategy that encompass business goals, policies and processes, then initiatives into mobility will struggle to deliver the expected benefits. Click to download!
Deliver Enterprise Mobility with Security and Performance
Mobility and the consumerisation of IT pose key challenges for IT around scalability, security and application visibility. In this whitepaper, we look at complete, integrated and scalable solutions that deliver apps and data to any device with full security and a high-performance user experience. Learn more!