The recent Amazon EC2 outage and the Sony PlayStation Network data breach have served to renew concerns in enterprises that cloud computing is inherently less secure than private, self-contained data centres.
Amazon’s Elastic Compute Cloud and Elastic Block Storage platforms were both affected during a 21 April outage that had major websites unavailable for three days. The cause of the outage remains unknown. Meanwhile, entertainment giant Sony shut down two of its cloud services, the PlayStation Network for games and Qriocity for music and video, on April 19 after “an external intrusion” that resulted in the theft of personal information belonging to 77 million customers.
The problems, while significant, are not unique to cloud services. Amazon’s outage focused a lot of attention on availability issues and reliability, but those concerns exist in traditional data centre environments as well.
“It happened all the time,” Chris Drake, founder and CEO of Firehost, told eWEEK. People generally didn’t hear about outages in the data centre because they affected only one organisation and were smaller scale, but they often added up to far more lost time, money and business, Drake said.
“In this age of customer uptime, we’ve forgotten that it used to happen all the time,” Roberts said.
For organisations that have moved security applications to the cloud, this kind of an outage may seem a little nerve-wracking. However, the severity of downtime affecting cloud-based security services depends entirely on how “paranoid” the organisation is and on its tolerance for downtime, Roberts said.
The most common cloud-based security applications are web and spam filtering, hosted email, malware scanning and hosted application firewalls. If any of these services were unavailable for a stretch of time, it would be inconvenient and leave the organisation vulnerable, but it wouldn’t bring business to a standstill, according to Roberts.
“An outage of 36 hours wouldn’t stop attorneys at a law firm from being productive,” Roberts said.
It would mean that employees would have to be more vigilant during the outage to not click on links, surf to only recognised sites and not open attachments. IT managers can decide to restrict certain activities to prevent any threats from entering the network, according to Roberts. “It’s a calculated risk,” he said.
As for Sony, recent events have shown that companies can be hacked and have sensitive customer data stolen, even when the data was stored in corporate data centres. Epsilon, the email marketing firm that disclosed its data breach a month ago, has yet to say how many consumers were affected.
“The ultimate lesson here is that all businesses are vulnerable to hackers, regardless of size or industry,” Mandeep Khera, CMO at Cenzic, told eWEEK.
Kohn addressed the commonly held belief that unimportant data and applications could be moved to the cloud while critical and sensitive applications remain in the corporate data centre during his “Can Data Be More Secure in the Cloud?” talk on 19 April at the Infosecurity Europe conference in London. In general, data is actually more secure in the cloud, and there is no reason why enterprises shouldn’t store critical data in the cloud, Kohn said.
Enterprises, especially midsize ones, would be far more secure with a cloud provider with the resources to provide higher-level security expertise than they can otherwise afford themselves, according to Randy Abrams, director of technical education at ESET.
“There is no perfect security. If the net result of outsourcing your security is an improvement in security, then it is a good thing, but there is no perfect security, only risk management,” Abrams told eWEEK.
A security-conscious cloud provider would be continuously auditing and monitoring its environment, have higher levels of automation for repetitive tasks, strict access controls against malicious insiders, and more skilled technicians maintaining the network, Kohn said. There are some additional considerations, such as sifting through the logs for intrusions, closing any SQL injection or cross-site scripting flaws in web applications, and regularly patching the environment to ensure all vulnerabilities are closed.
Cloud IT security is not intended to replace conventional in-house IT security, but it’s supposed to be “an addition,” Yevgeny Kaspersky, CEO of Kaspersky Lab said at Infosecurity Europe.
CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation
Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…
Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…
Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector
Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…
Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…