While many enterprises around the world rightfully remain cautious about moving their data to the cloud,ย EMC Corp.โs security division (RSA) is arguing that cloud security has to potential to surpass the typical level of in-house data security available today.
ย
The idea comes out of a newย RSA security briefing (which was written by security experts from EMC and VMware Inc.) that outlines best practices for protecting enterprise data and user identities in the cloud.
ย
The whitepaper advocates measures such as carefully drafting a service level agreement (SLA), requiring cloud providers to ensure multi-tenancy and data isolation, and ensuring your in-house system administrators can still access and configure the environment.
ย
There are a few other great tips in the security brief, the rest of which can be found here, but thereโs also a very troubling claim made in the paperย that I must highlight.
ย
RSA argues that because physical servers are being replaced by virtual ones, this will apparently give the technology industry a โonce-in-a-career opportunityโ to make IT security faster and more efficient.
ย
โCloud security has vast potential to surpass the levels of information security that are possible today,โ the report indicates.
ย
RSA added that security will not be tied to OSs, networks, and applications as an afterthought anymore, as security protocols can be built into the virtualization layer. This will embed security policies deep into the technology stack and spread them throughout the cloud, the security firm argued.
ย
While all these points might be true, I still donโt see how this demonstrates the cloudโs great potential to surpass our current levels of data centre security.
ย
In fact, I think most enterprise IT shops are smart enough to see through this. Cloud security will never be any more secure than the security measures you develop in-house. It would be quite illogical to ever think otherwise.
ย
If this was the case, why wouldnโt we see the same principles that RSA is outlining transferred to the physical world?
ย
David Senf, the director of IDC Canada Ltd.โs infrastructure solutions group, agreed with me, saying that just because security is enhanced in the new virtual layer, it does not mean security will be enhanced overall.
ย
โThere are a number of new steps towards better security that firms need to consider as cloud adoption builds,โ he said. โOne of those is security of the VM and between VMs, agreed. But issues such as network segmentation, firewalls/IDP, data classification, access rights, good change management practices and so on are still very much present in the cloud โ and at all layers of the stack.โ
ย
Good points, Senf!
ย
When I asked Eric Baize, a senior director at RSAโs secure infrastructure group, why cloud and virtual environments could potentially be more secure than its physical world counterparts, he told me that the thereโs a unique opportunity to embed โspecific security controlsโ that can be taken away from the application layer and put directly in the infrastructure.
ย
โSo the security enforcement of the policy becomes handled by the virtual infrastructure instead of being handled by the application,โ he said.ย โThis is a very important technological shift.โ
ย
Baize added that security has historically been handled as an afterthought in the evolution of technological infrastructure over the last 20 years, referring to the development of the virtual private network (VPN) to bring encryption to the Internet
ย
But for me, all of this misses the point and certainly doesnโt prove cloud security will be any more effective than what you can bring into your data centre.
ย
Sure, cloud vendors will tout things like โthe ability to isolate and compartmentalize your computing and applications will make things more secure,โ but to me, all they are really describing is a best practice on how to operate in the cloud.
ย
You can isolate your workloads in your own data centres canโt you? This feature is obviously crucially important to cloud providers, so they can establish multi-tenancy and data isolation.
ย
This isnโt a security feature, so much as it is a basic rule that cloud providers are going to need to follow to ensure their customers can share the same physical computing, storage and network infrastructure.
ย
The RSA reports advises that the best way to ensure secure data isolation and multi-tenancy is for enterprise customers to require maximum transparency into their cloud providersโ operations.
ย
โCloud vendors should furnish log files and reports of user activities,โ the report advices. โSome cloud vendors are able to provide an even higher degree of visibility through applications that allow enterprise IT administrators to monitor the data traversing their virtual networks and to view events within the cloud in near-real-time.โ
ย
Wouldnโt we be doing all this stuff in our own data centres as well? I would hope so.
ย
When we move key elements of our IT infrastructure to the cloud, we certainly give up some of the control we have over it. We canโt see it or touch it. Plus, weโve added a third-party into the mix.
ย
All of this applies to both private clouds and public clouds.
ย
Of course, moving to the cloud isnโt a huge danger to your organization like many enterprises out there might believe (and really thatโs why RSA is making these bold claims in the first place).
ย
You just have to choose your provider wisely and actually develop a strong business case for making the switch.
ย
That principle applies to every single IT project since the beginning of time.
ย
Some of the other best practices RSA lays out are actually pretty valuable in helping you determine whether your vendor or systems integrator is up to the challenge.
ย
And this is the type of information that we need it to be releasing more often, as opposed to delusions that our security will be eventually be enhanced by moving off-site.