fbpx
Blog August 15, 2019

Your Crash Course on Security in the Cloud (and of the Cloud)

You’ve no doubt realized by now that cybercrime isn’t going away anytime soon. What you might not know is that approximately 43 percent of all cyberattacks are aimed at small businesses, and the average price per record in breaches is $360. This hasn’t changed with the focus on security in the cloud.

Healthcare organizations are especially vulnerable to cybercrime—more than 2,100 data breaches in the industry have been reported over the decade. According to the Ponemon Institute’s 2019 Cost of a Data Breach study, only about half of breaches were the result of criminal or malicious intent, with the other half attributed to human error and system glitches.

Even though enterprise organizations are aware of the cybercrime issue, fewer than 40 percent claim they’re equipped to handle a complex cyberattack. A key part of keeping your enterprise-sized organization’s data secure is knowing what threats to watch and how to mitigate them. This includes cloud computing and security.

Security Of and In the Cloud

Let’s take a look at the difference between security of the cloud and security in it. Although they sound the same, there is a distinction. As Amazon Web Services (AWS) explains, security in the cloud is like security in your on-premise data center, but without the cost of maintaining facilities and hardware. It’s the applications and data an enterprise organization runs in a cloud. Its counterpart, security of the cloud, involves the safety of the hardware, software and other parts of the infrastructure that run services and applications.

It’s important to remember that cloud security is only partly the responsibility of the cloud provider. It should be a team effort. Many organizations will shift some security responsibility to a cloud provider when they move their applications and data to the cloud. In the shared responsibility model utilized by Microsoft Azure and AWS, AWS handles infrastructure security, including the physical security of the data center itself, and the customer is responsible for the security of everything else. Either way, it’s essential to decide and document which party is responsible for all the components of a cloud infrastructure.

Understanding Obstacles to Cloud Security

Although it helps to think of cloud security as analogous to on-premise cybersecurity, it is important to remember that the cloud brings its own set of security challenges. The main ones are data breaches and loss, distributed denial of services (DDos) attacks, and user authentication. Another source from the Ponemon Institute, The Insider Threat of Bring Your Own Cloud (BYOC), lists the top security risks of cloud services as:

  • Loss or theft of intellectual property
  • Compliance violations and regulatory actions
  • Loss of control over end-user actions
  • Malware infections that unleash a targeted attack
  • Contractual breaches with customers or business partners
  • Diminished customer trust
  • Data breach requiring disclosure and notification to victims
  • Increased customer churn
  • Revenue losses

Enterprise-sized organizations that employ a multi-cloud solution may encounter additional security obstacles. For example, there is a higher chance for misconfiguration, and there are multiple sets of policies to manage. On the other hand, in addition to benefits like scalability, risk management, power of choice, and enhanced productivity, enterprise organizations using a multi-cloud strategy have the security of disaster recovery using automatic failover.

Distinct Differences Between Conventional IT and Cloud Security

Though some elements of traditional IT and cloud security are similar, there are variations. The following list describes some of the differences:

Traditional IT SecurityCloud Security
Controls access through a perimeter security modelComprised of a highly connected environment through which traffic can more easily diverge from typical perimeter defenses
Requires more of an infrastructure approachRequires a data-centric approach
Lets you control your own data security strategy and manage your own networkAllows for easier management of data security

 

Requires onsite installation and maintenance of IT devicesProvides on-demand access to IT infrastructure

 

Makes you responsible for detecting and responding to incoming IT threats

 

Enables you to invest in the services of a reliable cloud provider for your data security

 

Puts more stress on in-house IT professionals due to time-consuming tasksOffers less risk for costly downtime

Best Practices for Ensuring Data Security

As we mentioned in a previous blog post, there are some data security best practices that should be implemented (especially by a cloud hosting provider) to mitigate cloud computing security risks: multi-tiered security, awareness, tracking, and physical security. Following these guidelines can help you strategically safeguard mission-critical data.

  1. Multi-Tier Security: A multi-tiered approach signifies that multiple barriers and checkpoints are put in place in the event a compromise occurs. For example, the first tier of the architecture is implemented by redundant perimeter firewalls, which protect against malicious hacking and DDoS attempts. The second tier is implemented by the use of private, non-routable IP address spaces. In the unlikely event the firewall is breached, the servers behind the firewall can’t route traffic to the internet.
  2. Monitoring, Awareness, and Tracking: With security breaches posing a continuous threat to your data, being well versed and monitoring multiple channels of information is essential in staying atop the ever-changing security environment. In the event of a security notice, vigilant awareness measures must be implemented to swiftly review the notice and determine the severity of it. If the notice is deemed to present a serious threat, there should be patches or set work-arounds in place to be applied immediately.
  3. Physical Security: All data centers are protected by a number of layers of security, including multiple layers of electronic building and facility access secured by magnetic locks, 24/7 onsite personnel, monitored and recorded closed-circuit cameras, mantraps, and mandatory identity logging of all outside visitors. Hosting providers shouldn’t risk compromising your data by allowing companies with poor security practices to share data center resources. Demand a provider that performs background checks before allowing customers to host.

If you’re planning to join the large number of enterprise-sized organizations moving their workloads to the cloud, we recommend employing the services of a vendor who can partner with you to integrate and secure your cloud environments. At Connectria, we’re at the forefront of protecting sensitive data for customers of all sizes in all industries. Plus, we ensure the highest standards for our customers’ data protection and uninterrupted access to their data. Contact us to learn more.

Further Reading

For more on the physical security of data centers, see our article “Physical Data Center Security Must Haves.”

This article covers specific cloud security issues and how IBM i meets them.

For more on how Connectria can help your organization with cloud security and compliance, see our solutions brief.

Related Resources

 
What is HITRUST Certification, and why does it matter?
Earlier this month, we announced that Connectria has, once again, passed all of its third-party certifications. For a complete list and a high-level look at…
 
Whitepaper December 5, 2019
GDPR’s Impact on US-Based Companies
 
How to Check Your IBM i OS Version (and Why a Third Party Should Do Your Upgrade)
Many companies run their critical applications on an IBM i framework, all or some of which is still being hosted in their own data centers.…