Welcome!

Cloud Security Authors: Elizabeth White, Zakia Bouachraoui, Pat Romanski, Yeshim Deniz, Liz McMillan

Related Topics: Cloud Security

Cloud Security: Blog Post

Snowden Gone, Ripples Remain!

Essentially, these government programs are creating nervous times for my Canadian, European and APAC customers

[Original version of this blog appeared on PandoDaily magazine.]

Though Snowden is long gone now, the ripple effects that he created are going to remain for a long time to come. If you haven’t done so already, I suggest you read about the NSA surveillance programs PRISM and XKeyscoe before you continue with this article.

Essentially, these government programs are creating nervous times for my Canadian, European and APAC customers who are using US cloud providers. Given the very strict data residency and data privacy requirements to protect their citizens’ sensitive data in these parts of the world, through “guilt by association” alone, the latest incidents have implicated most corporations that move their data across boundaries. One thing is certain: these programs that are exposed because someone came out in the public. Just because a specific country’s cloud provider hasn’t been accused yet (or not found guilty) doesn’t necessarily mean that they are not doing the same thing. There is a chance that they might be doing it and have not been caught yet.

Unfortunately, the cloud community spent years alleviating the fear of moving data to the cloud by entities. Those days, the fear was about hackers and disgruntled employees/partners accidentally or willfully exposing their data. Now they need to fight an uphill battle of convincing the entities not about hackers, but about legal entities and governments.

Foreign governments are magnifying these concerns even further. Here is some classic news from Germany about setting policies and sanctioning US firms. (http://www.industryweek.com/public-policy/germany-demands-sanctions-us-firms-over-privacy-0). Though the intent might be good, the goals and net effect of such actions might be dubious at best. The cost associated with sanctioning cloud providers coupled with damage to the brands’ reputations is far greater than any benefit that might be derived from the compensation obtained.

There are reports suggesting that US cloud computing industry could lose as much as $35 billion over the next three years. (http://www.itif.org/publications/how-much-will-prism-cost-us-cloud-computing-industry.) A recent CSA survey provides an early indication of this (https://cloudsecurityalliance.org/download/government-access-to-information-survey-results/).About half of the surveys non-US respondents say they are going to move away from US clouds. But where would they go? And how can they ensure that they would be moving to is better and not from the proverbial “frying pan to the fire”?

For foreign entities, such as European corporations, choosing a cloud provider in the US can rank high on their preferred list. This is because there is a higher number of cloud providers in USA, who provide very mature solutions with very competitive pricing.  Until now, all you had to worry about was the data residency (or privacy) issue, but recent events have led everyone to worry about whether a US government agency is covertly inspecting their data.

Looking for a viable solution?  Don’t send sensitive data to the cloud. Send either encrypted garble or tokens that look like the original data.

When you encrypt the data before it leaves your perimeter, you control the fate of your data. You get to choose the encryption key, the specific algorithm, and key management. This means that you get to control “who gets to see what, when and how much.” This is really important. If anyone needs to see your sensitive information, they have to come to you rather than going to your data sitter. You control the “keys to your kingdom.”

The second option that is gaining momentum recently is “Tokenization” (or Tokenisation as it is known everywhere else). In this case you take the original sensitive data out, store it in a secure vault, and replace it with a random token that looks, feels, and acts like original data. The premise of tokenization is that “what is not there cannot be stolen.” Let hackers and governments have fun with it without knowing they have fake data.

This is where solutions such as Intel Tokenization Broker (ETB) can help. It intercepts any message that goes out, in any enterprise messaging format (structured or unstructured data), and scans for the sensitive data that is in the message, removes the sensitive data (such as credit card, personal info, health records, financial records, etc.), stores them in a safe place, and replaces them with random data that is formatted exactly as the original data. The only entity that can correlate the token to the original is you and no one else.

The solution is “touchless.” This means you don’t have to touch or modify any of your existing applications. You drop these tokenization/data protection gateways in the line of traffic, regardless of the type of traffic or type of message/data, and it will automagically sense the data based on pre-defined policies and work its magic.

Caveat Emptor: You still have to be ready when the government agency comes knocking on your door asking for this information!

The post Snowden gone, ripples remain! appeared first on Application Security.

Read the original blog entry...

More Stories By Andy Thurai

Andy Thurai is Program Director for API, IoT and Connected Cloud with IBM, where he is responsible for solutionizing, strategizing, evangelizing, and providing thought leadership for those technologies. Prior to this role, he has held technology, architecture leadership and executive positions with Intel, Nortel, BMC, CSC, and L-1 Identity Solutions.

You can find more of his thoughts at www.thurai.net/blog or follow him on Twitter @AndyThurai.

IoT & Smart Cities Stories
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...