Welcome!

Cloud Security Authors: Zakia Bouachraoui, Elizabeth White, Liz McMillan, Pat Romanski, Yeshim Deniz

Related Topics: Cloud Security

Cloud Security: Blog Post

Snowden Gone, Ripples Remain!

Essentially, these government programs are creating nervous times for my Canadian, European and APAC customers

[Original version of this blog appeared on PandoDaily magazine.]

Though Snowden is long gone now, the ripple effects that he created are going to remain for a long time to come. If you haven’t done so already, I suggest you read about the NSA surveillance programs PRISM and XKeyscoe before you continue with this article.

Essentially, these government programs are creating nervous times for my Canadian, European and APAC customers who are using US cloud providers. Given the very strict data residency and data privacy requirements to protect their citizens’ sensitive data in these parts of the world, through “guilt by association” alone, the latest incidents have implicated most corporations that move their data across boundaries. One thing is certain: these programs that are exposed because someone came out in the public. Just because a specific country’s cloud provider hasn’t been accused yet (or not found guilty) doesn’t necessarily mean that they are not doing the same thing. There is a chance that they might be doing it and have not been caught yet.

Unfortunately, the cloud community spent years alleviating the fear of moving data to the cloud by entities. Those days, the fear was about hackers and disgruntled employees/partners accidentally or willfully exposing their data. Now they need to fight an uphill battle of convincing the entities not about hackers, but about legal entities and governments.

Foreign governments are magnifying these concerns even further. Here is some classic news from Germany about setting policies and sanctioning US firms. (http://www.industryweek.com/public-policy/germany-demands-sanctions-us-firms-over-privacy-0). Though the intent might be good, the goals and net effect of such actions might be dubious at best. The cost associated with sanctioning cloud providers coupled with damage to the brands’ reputations is far greater than any benefit that might be derived from the compensation obtained.

There are reports suggesting that US cloud computing industry could lose as much as $35 billion over the next three years. (http://www.itif.org/publications/how-much-will-prism-cost-us-cloud-computing-industry.) A recent CSA survey provides an early indication of this (https://cloudsecurityalliance.org/download/government-access-to-information-survey-results/).About half of the surveys non-US respondents say they are going to move away from US clouds. But where would they go? And how can they ensure that they would be moving to is better and not from the proverbial “frying pan to the fire”?

For foreign entities, such as European corporations, choosing a cloud provider in the US can rank high on their preferred list. This is because there is a higher number of cloud providers in USA, who provide very mature solutions with very competitive pricing.  Until now, all you had to worry about was the data residency (or privacy) issue, but recent events have led everyone to worry about whether a US government agency is covertly inspecting their data.

Looking for a viable solution?  Don’t send sensitive data to the cloud. Send either encrypted garble or tokens that look like the original data.

When you encrypt the data before it leaves your perimeter, you control the fate of your data. You get to choose the encryption key, the specific algorithm, and key management. This means that you get to control “who gets to see what, when and how much.” This is really important. If anyone needs to see your sensitive information, they have to come to you rather than going to your data sitter. You control the “keys to your kingdom.”

The second option that is gaining momentum recently is “Tokenization” (or Tokenisation as it is known everywhere else). In this case you take the original sensitive data out, store it in a secure vault, and replace it with a random token that looks, feels, and acts like original data. The premise of tokenization is that “what is not there cannot be stolen.” Let hackers and governments have fun with it without knowing they have fake data.

This is where solutions such as Intel Tokenization Broker (ETB) can help. It intercepts any message that goes out, in any enterprise messaging format (structured or unstructured data), and scans for the sensitive data that is in the message, removes the sensitive data (such as credit card, personal info, health records, financial records, etc.), stores them in a safe place, and replaces them with random data that is formatted exactly as the original data. The only entity that can correlate the token to the original is you and no one else.

The solution is “touchless.” This means you don’t have to touch or modify any of your existing applications. You drop these tokenization/data protection gateways in the line of traffic, regardless of the type of traffic or type of message/data, and it will automagically sense the data based on pre-defined policies and work its magic.

Caveat Emptor: You still have to be ready when the government agency comes knocking on your door asking for this information!

The post Snowden gone, ripples remain! appeared first on Application Security.

Read the original blog entry...

More Stories By Andy Thurai

Andy Thurai is Program Director for API, IoT and Connected Cloud with IBM, where he is responsible for solutionizing, strategizing, evangelizing, and providing thought leadership for those technologies. Prior to this role, he has held technology, architecture leadership and executive positions with Intel, Nortel, BMC, CSC, and L-1 Identity Solutions.

You can find more of his thoughts at www.thurai.net/blog or follow him on Twitter @AndyThurai.

IoT & Smart Cities Stories
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...