Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Building a fortress in the cloud for your critical data

Businesses are in the crosshairs as military and spy organizations around the world step up their cyber-snooping techniques, and the shift to cloud is only exacerbating the risks. How can you be sure your cloud partner is capable of protecting your data from cyberattacks?

Most cloud providers agree that security is the paramount, but in reality many do not possess the fundamentals to protect your data. Just because a cloud provider has performed a baseline security assessment does not mean the vendor is truly capable of protecting your data.

ROUNDUP: The worst data breach incidents of 2012

By asking the following questions of potential cloud providers, organizations looking to move some or all of their enterprise data and applications to the cloud can eliminate about half of the cloud vendors and find comfort in knowing their selected partner will be well-equipped to protect their information.

1. What encryption methods will be employed for my data?

Asking what encryption methods are employed is essential in defining the level of security or protection used. To fully protect data, it needs to be encrypted at rest and in transit.

There are built-in capabilities within the traditional databases that take advantage of Transparent Data Encryption (TDE) functionality. TDE is a technology employed by both Microsoft and Oracle to encrypt database content, offering encryption at a column, table and tablespace level. TDE solves the problem of protecting data at rest, encrypting databases both on the hard drive and consequently on backup media. Enterprises typically employ TDE to solve compliance issues such as PCI DSS. Encryption can also be applied via third-party software.

If encryption is applied, you need to ask what functionality is used. Determine if it is inherent capability or third-party software. Ask if they are using a specific PKI strategy and whether they are using data loss prevention (DLP) tools. All of the answers to these questions define how your data is protected and the "security maturity level" of your potential cloud provider.

Another element of this question is organization-specific. Based on what industry you are in, there will be some minimum requirements in place that will tell you whether or not you can store your information in a cloud provider's facility. Government organizations, for example, require that data is protected by token-based encryption. If your potential partner cannot come up with that answer, then you will not be moving into that facility.

2. What compliance regulations do you subscribe to?

Given your organization, there may be specific compliance regulations for housing and managing your data. By choosing a cloud provider that already adheres to PCI security standards for credit card transactions or to HIPPA for storing medical records, for example, you are able to ensure that, without question, auditors will find this data to be properly secured.

To be certain you are meeting these regulations, you should be able to request to test these security standards. Any trustworthy cloud provider will gladly allow you set up a vulnerability test on the facility to prove they meet your compliance needs.

You must also, however, be sure to ask whether all of a provider's data centers are meeting these compliance standards. Just because one of the vendor's data centers meets these regulations, doesn't mean that is the case across the board, and you must be certain your data always remains in compliant facilities.

3. How are you storing my data?

Many do not view this as a security question, but understanding the architecture of a virtual or dedicated physical environment and knowing how a provider is going to "build the fortress" is key to knowing that your data is truly secure and ensuring that there is a trusted level of accountability.

In building a secure cloud environment, many believe a private cloud with data residing on dedicated hardware is the safest option. However, there have been many advances in that address the concerns. In particular, VMware with specific third-party solutions, has embedded a holistic approach to security and the network to better segregate and secure the virtual environment.

Virtualization does not mean the same thing to every provider, and "cloud" means different things to different people. Understanding the various models and tech strategies for creating a virtual environment will empower IT decision-makers to weed through the cloud partners to find those that will meet your unique organizational needs. For example, with leading-edge technology from VMware, it is possible to segregate virtual environments on the same hardware, creating a secure, virtual "private cloud" in a mutli-tenant environment. This does not fit the private cloud definition in a traditional sense, but still provides the utmost in security and dedicated resources, ensuring the uptime and availability of their data and applications.

4. Who are the people protecting the fortress?

Even if the brick-and-mortar facilities and elements of logical security are up to standards, it's important to know who will be handling the daily "care and feeding" of your data and applications. You should understand the hiring practices that your cloud partner has in place and what experience the staff has in terms of managing complex IT operations. If a provider's organization and staff has experience both as a consumer and vendor of cloud services, you can be further assured that they can share your perspective and understand what their offering should entail to serve your business needs.

Furthermore, a cloud provider should be able to tell you how often they are testing their staff, to both certify and re-certify the team to ensure best practices are maintained and a sufficient level of technological competence is achieved.

Your cloud partner should be seen as an extension of your IT operations, and you should be able to put a face to this team of skilled professionals protecting your data. Understand the process by which security matters are escalated, and a trustworthy cloud provider will ensure you that in the off chance the cloud were to go down or your data were to be compromised, one of your dedicated team members would have the experience and capability to manage the situation.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: DLP, Microsoft, Oracle, VMware
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: cybersecurity, cloud security, PCI data security standards, Cyberattack, internet, cloud computing, IT management, private cloud, PCI DSS, virtualization, Transparent Data Encryption, Cloud, security, data encryption, legal, cyber-espionage, cybercrime, regulatory compliance, compliance, TDE
Latest Blog Posts
Whitepapers
  • VDI Solutions Guide
    The IT industry has been abuzz promoting the idea of virtual desktop infrastructure. But despite its advantages, adoption has been slow, and many organizations have abandoned their VDI initiatives. This paper explores how a new flash-based approach can overcome the key VDI pitfalls, and deliver a solution that both end-users and IT administrators will love.
    Learn more »
  • ERP Selection: Finding the Right Fit
    Finding a needle in a hay stack is hard, but the task pales in comparison to finding a specific needle in a pile of needles. Selecting the ideal Enterprise Resource Planning (ERP) solution can feel just as daunting. ERP represents a serious investment for any organisation and is vital to future success. This report explores the strategies organisations are employing to find the right ERP fit that will give them the tools they need to thrive.
    Learn more »
  • The CIO Paradox
    As there are timeless leadership principles underlying IT value, there are unfortunately also timeless challenges that thwart the IT organisations efforts and make for a rocky path to CIO success. These are the inherent contradictions we call the CIO Paradox.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index


Computerworld
ARN
Techworld
CMO