Welcome!

Cloud Security Authors: Pat Romanski, Ambuj Kumar, Shelly Palmer, XebiaLabs Blog, Liz McMillan

Related Topics: @CloudExpo, Open Source Cloud, Containers Expo Blog, Cloud Security, SDN Journal, @DevOpsSummit

@CloudExpo: Blog Feed Post

Top Cloud Security Threats

To say that cloud security for cloud computing is gaining traction would be the understatement of our era

To say that cloud security for cloud computing is gaining traction would be the understatement of our era.  Whether in public clouds, private clouds, or hybrid scenarios – it seems like everyone is in the cloud.  Healthcare providers, eCommerce, disaster recovery services, data storage . . . the types of cloud services available seem to cover every base.  What would Darwin think about his “Survival of the Fittest” evolving from animal species to businesses who take advantage of the flexibility, elasticity, and cost-effectiveness of cloud computing?

cloud security threats cloud security breaches Cloud Security  cloud security threats Top Cloud Security ThreatsBut, there are dangers in the cloud computing jungle and cloud security measures must be put in place to eliminate and resolve them.  According to the Cloud Security Alliance, three types of threats have worsened between 2010 and today.

  1. Data Breaches
  2. Data Loss
  3. Account or Service Traffic Hijacking

Let’s explore how proper cloud security can protect you from these top threats.

1. Data Breaches

The attack can originate from many sources:

  • Malevolent hackers
  • Fierce competitors
  • Insiders: employees, subcontractor, vendors, etc.

Regardless of the origin, the attack must be stopped before it causes damage.

Of course, you must put in place cloud security measures like anti-virus, firewalls, strict password policies, and accurate logs.  But hackers can be deviously conniving.  In November 2012, researchers from the University of North Carolina, the University of Wisconsin and RSA Corporation released a paper describing how a virtual machine could use side channel timing information to extract private cryptographic keys being used in other virtual machines on the same physical server. Whether your potential attackers are as sophisticated, there are ways to stop them from causing damage.

Encrypting your data, for example, is a security measure you MUST insist on.  If you do it right, even if a breach does occur, your data will not be readable – and will therefore not be usable.

Encrypting data is relatively easy.  Adhere to best practices like AES-256 and SHA-2. These techniques provide the best assurance that data has not been tampered with.  SSL/TLS must always be enabled.  IPsec communications should be allowed.

But once your data is encrypted, the cloud security challenge is to ensure the data cannot be decrypted.  If your data is encrypted well, but the encryption keys are also accessible to attackers (stored in the same location or stored with a cloud provider, for example), the encryption does not matter.

The best practice here is to use split key management and homomorphic key encryption.  The first splits your encryption key in parts.  One part is handled by the cloud security application and one part is always handled only by you.  BOTH parts are required to decrypt your data.  This way, even if one part is used illicitly, your data cannot be breached.  The second measure, homomorphic key encryption, is the only way to ensure that the key itself is encrypted, even while in use.

By using these two best practices, your cryptographic keys cannot be compromised.

2. Data Loss

Almost as terrifying as your data being accessed by outsiders (or insiders gone bad) is losing your data.  Of course, losing data doesn’t allow anyone else to use it, but it also does not allow you to use it.  Can your business perform without its data?

Data loss can occur as a result of virus or hacker attack, but it can also come from an accidental deletion by a cloud provider, a natural disaster like an earthquake, fire, flood, tornado…

Best practice here, of course, is backup.  You could back up your data on physical devices outside of the cloud, but then you lose a lot of the benefits of using the cloud.  Opting for an online backup and disaster recovery protocol is a great solution, but it opens another possible entry point for attackers (see the data breach section, above).

Solving this challenge does not have to be . . . well, challenging.  The same best practices we dexcribed above apply here as well.  Encrypt data before uploading or transferring it to a cloud backup or cloud disaster recovery platform.  And always use split key management and homomorphic key encryption.

3. Account or Service Traffic Hijacking

Phishing, fraud, and exploitation of software vulnerabilities can cause your credentials to be stolen.  With stolen credentials, attackers can often access critical areas of deployed cloud computing services, allowing them to compromise the confidentiality, integrity and availability of those services.  In April 2010, Amazon experienced a Cross-Site Scripting (XSS) bug that allowed attackers to hijack credentials from the site. Even Amazon is a target!

How do you eliminate the risk of your credentials being stolen?  Easy!  Don’t trust anyone with them.  Your encryption keys should always be under your own control.  Do not allow your cloud provider to control your keys.  Ever.

Another important factor to consider here is not avoiding such hijacking, but also mitigating the damages in case it occurs.  A way to do this is to segment your encryption.  Each encryption project can contain as much (or as little) data as required, across multiple disks, databases, file servers and object storage.

Conclusion: Top Threats and Top Solutions

Yes, there are threats to operating in the cloud (let’s face it: there are threats to operating any business), but with current technologies offering ways to thwart the top threats of data breaches, data loss, and hijacking, the benefits of cloud computing far outweigh the risks.

The time to institute strong cloud security and encryption is now – before an attack.  Don’t think that it cannot (or will not) happen to you because you are too powerful or too big (or too small).  It happened to Amazon.  It happens to businesses every day.  And these types of catastrophes have the ability to exhaust budgets, destroy reputations, and in some cases – eradicate a business.


The post Top Cloud Security Threats appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

@ThingsExpo Stories
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
SYS-CON Events announced today that Yuasa System will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Yuasa System is introducing a multi-purpose endurance testing system for flexible displays, OLED devices, flexible substrates, flat cables, and films in smartphones, wearables, automobiles, and healthcare.
SYS-CON Events announced today that CAST Software will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CAST was founded more than 25 years ago to make the invisible visible. Built around the idea that even the best analytics on the market still leave blind spots for technical teams looking to deliver better software and prevent outages, CAST provides the software intelligence that matter ...
SYS-CON Events announced today that Daiya Industry will exhibit at the Japanese Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Ruby Development Inc. builds new services in short period of time and provides a continuous support of those services based on Ruby on Rails. For more information, please visit https://github.com/RubyDevInc.
SYS-CON Events announced today that Evatronix will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Evatronix SA offers comprehensive solutions in the design and implementation of electronic systems, in CAD / CAM deployment, and also is a designer and manufacturer of advanced 3D scanners for professional applications.
As businesses evolve, they need technology that is simple to help them succeed today and flexible enough to help them build for tomorrow. Chrome is fit for the workplace of the future — providing a secure, consistent user experience across a range of devices that can be used anywhere. In her session at 21st Cloud Expo, Vidya Nagarajan, a Senior Product Manager at Google, will take a look at various options as to how ChromeOS can be leveraged to interact with people on the devices, and formats th...
SYS-CON Events announced today that Taica will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Taica manufacturers Alpha-GEL brand silicone components and materials, which maintain outstanding performance over a wide temperature range -40C to +200C. For more information, visit http://www.taica.co.jp/english/.
Organizations do not need a Big Data strategy; they need a business strategy that incorporates Big Data. Most organizations lack a road map for using Big Data to optimize key business processes, deliver a differentiated customer experience, or uncover new business opportunities. They do not understand what’s possible with respect to integrating Big Data into the business model.
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities – ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups. As a result, many firms employ new business models that place enormous impor...
Amazon is pursuing new markets and disrupting industries at an incredible pace. Almost every industry seems to be in its crosshairs. Companies and industries that once thought they were safe are now worried about being “Amazoned.”. The new watch word should be “Be afraid. Be very afraid.” In his session 21st Cloud Expo, Chris Kocher, a co-founder of Grey Heron, will address questions such as: What new areas is Amazon disrupting? How are they doing this? Where are they likely to go? What are th...
SYS-CON Events announced today that MIRAI Inc. will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MIRAI Inc. are IT consultants from the public sector whose mission is to solve social issues by technology and innovation and to create a meaningful future for people.
SYS-CON Events announced today that Dasher Technologies will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Dasher Technologies, Inc. ® is a premier IT solution provider that delivers expert technical resources along with trusted account executives to architect and deliver complete IT solutions and services to help our clients execute their goals, plans and objectives. Since 1999, we'v...
SYS-CON Events announced today that NetApp has been named “Bronze Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. NetApp is the data authority for hybrid cloud. NetApp provides a full range of hybrid cloud data services that simplify management of applications and data across cloud and on-premises environments to accelerate digital transformation. Together with their partners, NetApp emp...
SYS-CON Events announced today that IBM has been named “Diamond Sponsor” of SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California.
SYS-CON Events announced today that TidalScale, a leading provider of systems and services, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. TidalScale has been involved in shaping the computing landscape. They've designed, developed and deployed some of the most important and successful systems and services in the history of the computing industry - internet, Ethernet, operating s...
Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. They are the industry leader in DNS, DHCP, and IP address management, the category known as DDI. We empower thousands of organizations to control and secure their networks from the core-enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements.
SYS-CON Events announced today that IBM has been named “Diamond Sponsor” of SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California.
Join IBM November 1 at 21st Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Cognitive analysis impacts today’s systems with unparalleled ability that were previously available only to manned, back-end operations. Thanks to cloud processing, IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Imagine a robot vacuum that becomes your personal assistant tha...
In his Opening Keynote at 21st Cloud Expo, John Considine, General Manager of IBM Cloud Infrastructure, will lead you through the exciting evolution of the cloud. He'll look at this major disruption from the perspective of technology, business models, and what this means for enterprises of all sizes. John Considine is General Manager of Cloud Infrastructure Services at IBM. In that role he is responsible for leading IBM’s public cloud infrastructure including strategy, development, and offering ...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It’s clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Tha...