Welcome!

Cloud Security Authors: Liz McMillan, Elizabeth White, Lisa Calkins, Pat Romanski, Mamoon Yunus

Related Topics: Cloud Security

Cloud Security: Blog Feed Post

Is Your Organization Living Below the Information Security Poverty Line?

Have you turned down a security control because it was too expensive?

By Steven Wolford, Director of Information Security, 6fusion

During the season of politics here in the US, I would like to borrow shamelessly from topics in the political debate with a look towards the state of information security.

According to CNN (Poverty Rate Rises as Incomes Decline), the number of US citizens living below what is considered the bare essentials is on the increase. I believe we can say the same for information security programs. According to SANS, the top security controls can be boiled down to 20 Critical Controls (Top 20 Critical Controls). These are regarded as the “poverty line” for an Information Security Program. The bare essentials needed for a program to live at a level regarded as a minimum standard.

Have you turned down a security control because it was too expensive?

ENSIA (the European Network and Information Security Agency) has stated “the same amount of investment in security buys better protection” (Cloud Computing, Benefits, Risks, and Recommendations for Information Security). We have long understood that scale brings cost optimization. By spreading the cost of controls over a larger number of organizations, Cloud Service Providers (CSPs) are able to either deliver equivalent controls at a lower price or enhanced controls at a similar price.

Work with your CSP to understand the controls already implemented, those that are planned, and those that you require for the assets you are moving to the CSP.   The different cloud models (software/platform/infrastructure as a service) will each be able to deliver a different set of controls. You should expect to bring more controls to an IaaS provider than to a SaaS provider. However, you should still expect to see cost efficiencies with IaaS.

What if the chosen CSP doesn’t offer the controls you need? Reinvest the capital expenditure (CAPEX) or operating expenditure (OPEX) savings into providing your own controls or even better negotiate with the CSP to get the controls installed and leveraged across all of their customers. Security is moving from “build your own” to “assemble your own” (that sounds like a blog all on it’s own). There is even a growing industry in Security as a Service (SecaaS or SaaS), which is a cloud computing model that delivers managed security services over the Internet. Technopedia defines Secaas as “based on the Software as a Service (SaaS) model but limited to specialized information security services.” Engaging a SecaaS provider is yet another way to help lower the cost of living at the information security poverty line.

Have you not implemented a security control because your environment is too complex?

Your business does not have to be listed on the NYSE for you to have not implemented a security control because your existing IT feels too complicated to integrate with a control or for the cost of applying a control to become cost prohibitive due to IT sprawl.

Most security frameworks today recommend taking a risk-based approach to identifying the controls that are appropriate for any given environment. In order to first identify risk you must know ALL of the components that collectively create an information system. Often the cost of implementing a proper set of controls spirals out of control when attempting to apply them to a complex or spread out system.

Moving an information system into an IaaS CSP is the perfect opportunity to identify, consolidate, and simplify an information system. Identifying all the components of an information system is potentially the most significant step towards proper control selection; you cannot protect what you do not know about. It is still not uncommon to hear about a critical business system that relies on the spreadsheet saved on a folder on the hard drive in someone’s workstation. As an example, when you plan for the security of your current monthly billing do you in fact remember this critical component or do you go about happily installing the latest IDS on the accounting server; congratulating yourself along the way for protecting the companies financial systems.

Consolidating components is at the same time a risk and a benefit (what in life isn’t a dichotomy?). Personally, I see far more benefits and, with the concept of cloud brokering, there are ways to enjoy the benefits while minimizing the risks. Let’s get the scary stuff over first. The risk is that consolidation puts all your eggs in one basket, so to speak. The target becomes a higher value target because the reward of breeching (or the cost of loss) becomes higher. Enter the cloud broker – enjoy the benefits of consolidation by information system but spread the risk by sprinkling your information systems over different CSPs.

What are the benefits that outweigh the risks? Reduced complexity to install, manage, and monitor the controls used to protect the system. There is a reason why banks put valuables into a safe – same risks identified above but even bankers know it is far easier and less costly to put them into a central location.

That leads us to simplify. By moving your information system to a CSP you are able to simplify the implementation of appropriate security controls. One of the leading causes of delay in detecting and responding to a security incident is an overly complicated control implementation. Even if controls are properly implemented in a complicated system, gathering the control information in one place can be difficult (if your environment was such that getting data in one place was easy you would probably already have the information system simplified).

Craig Balding in his cloudsecurity.org blog even lists centralized data as the number one security benefit of “The Cloud”. I think this understates the real benefits. While Craig believes reduced data leakage and monitoring benefits as the winners, I would extend that to improved knowledge of how the system as a whole works and is architected. Move the financial system into an IaaS provider and you will quickly find that critical spreadsheet on that workstation.

Have you not implemented a security control because it was too difficult?

Many modern security controls require infrastructure just as complex as the information systems they protect. Network, application, data, access, logging, and much more all require technical solutions to be implemented, updated, managed, monitored for relevant information, and then responded to when an interesting event happens. It is not surprising at all that some have had to make the decision that applying all of this is just far too difficult. You make a decision that doing that one thing for security is just too hard to digest into your other business responsibilities.

CSPs can help ease that pain. Many security vendors offer solutions that take advantage of cloud architectures and make the implementation process much easier.

Take antivirus (AV) for example. Most major vendors today offer a cloud ready solution where AV can be offered as a SecaaS or in cloud optimized versions to let you maintain total control over the AV solution. Either way, actually implementing the AV solution can be as easy as install the client in a base image and deploy that client with each and every server turned on. EASY.

As we hear the political messages of the day, I encourage your to consider the “Information Security Poverty Line.” Take a look at your security posture and tolerance for risk. Are you forcing the information security program to live below the poverty line? If so, is there something that you can do about that?

I would say YES! The first step, to paraphrase James Carville, is to remember, “It’s the risk, stupid.” Stay tuned for more on that politically inspired theme.

Read the original blog entry...

More Stories By John Cowan

John Cowan is co-founder and CEO of 6fusion. John is credited as 6fusion's business model visionary, bridging concepts and services behind cloud computing to the IT Service channel. In 2008, he along with his 6fusion collaborators successfully launched the industry's first single unit of meausurement for x86 computing, known as the Workload Allocation Cube (WAC). John is a 12 year veteran of business and product development within the IT and Telecommunications sectors and a graduate of Queen's University at Kingston.

@ThingsExpo Stories
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, shared examples from a wide range of industries – including en...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. Jack Norris reviews best practices to show how companies develop, deploy, and dynamically update these applications and how this data-first...
Intelligent Automation is now one of the key business imperatives for CIOs and CISOs impacting all areas of business today. In his session at 21st Cloud Expo, Brian Boeggeman, VP Alliances & Partnerships at Ayehu, will talk about how business value is created and delivered through intelligent automation to today’s enterprises. The open ecosystem platform approach toward Intelligent Automation that Ayehu delivers to the market is core to enabling the creation of the self-driving enterprise.
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, will provide a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to ...
SYS-CON Events announced today that Massive Networks will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Massive Networks mission is simple. To help your business operate seamlessly with fast, reliable, and secure internet and network solutions. Improve your customer's experience with outstanding connections to your cloud.
SYS-CON Events announced today that Datera, that offers a radically new data management architecture, has been named "Exhibitor" of SYS-CON's 21st International Cloud Expo ®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datera is transforming the traditional datacenter model through modern cloud simplicity. The technology industry is at another major inflection point. The rise of mobile, the Internet of Things, data storage and Big...
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution and join Akvelon expert and IoT industry leader, Sergey Grebnov, in his session at @ThingsExpo, for an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.
Because IoT devices are deployed in mission-critical environments more than ever before, it’s increasingly imperative they be truly smart. IoT sensors simply stockpiling data isn’t useful. IoT must be artificially and naturally intelligent in order to provide more value In his session at @ThingsExpo, John Crupi, Vice President and Engineering System Architect at Greenwave Systems, will discuss how IoT artificial intelligence (AI) can be carried out via edge analytics and machine learning techn...
In his session at @ThingsExpo, Arvind Radhakrishnen discussed how IoT offers new business models in banking and financial services organizations with the capability to revolutionize products, payments, channels, business processes and asset management built on strong architectural foundation. The following topics were covered: How IoT stands to impact various business parameters including customer experience, cost and risk management within BFS organizations.
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business - from apparel to energy - is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
From 2013, NTT Communications has been providing cPaaS service, SkyWay. Its customer’s expectations for leveraging WebRTC technology are not only typical real-time communication use cases such as Web conference, remote education, but also IoT use cases such as remote camera monitoring, smart-glass, and robotic. Because of this, NTT Communications has numerous IoT business use-cases that its customers are developing on top of PaaS. WebRTC will lead IoT businesses to be more innovative and address...
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
Internet of @ThingsExpo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devic...
WebRTC is great technology to build your own communication tools. It will be even more exciting experience it with advanced devices, such as a 360 Camera, 360 microphone, and a depth sensor camera. In his session at @ThingsExpo, Masashi Ganeko, a manager at INFOCOM Corporation, will introduce two experimental projects from his team and what they learned from them. "Shotoku Tamago" uses the robot audition software HARK to track speakers in 360 video of a remote party. "Virtual Teleport" uses a...
SYS-CON Events announced today that Calligo has been named “Bronze Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Calligo is an innovative cloud service provider offering mid-sized companies the highest levels of data privacy. Calligo offers unparalleled application performance guarantees, commercial flexibility and a personalized support service from its globally located cloud platform...
SYS-CON Events announced today that Elastifile will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Elastifile Cloud File System (ECFS) is software-defined data infrastructure designed for seamless and efficient management of dynamic workloads across heterogeneous environments. Elastifile provides the architecture needed to optimize your hybrid cloud environment, by facilitating efficient...
SYS-CON Events announced today that Cloudistics, an on-premises cloud computing company, has been named “Bronze Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Launched in 2016, Cloudistics helps anyone bring the power of the cloud to the data center in an easy-to-use, on- premises cloud platform that automatically provides high performance resources for all types of applications: Docke...
SYS-CON Events announced today that Golden Gate University will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Since 1901, non-profit Golden Gate University (GGU) has been helping adults achieve their professional goals by providing high quality, practice-based undergraduate and graduate educational programs in law, taxation, business and related professions. Many of its courses are taug...