Is cloud computing secure?
Posted on 1 Nov 2010 at 08:00
In the latest of our cloud computing exploration features, we look at the issue of security
With more and more data and applications heading to the cloud, leaving the familiar data centre for the fresh field of hosted online data centres, it's time to think hard about security issues.
Can hosted, multi-tenant services ever be as secure as your own server?
This isn't a new problem. Far from it. It's actually one the industry keeps coming back to. First it was data processed by time-sharing systems at a data processing bureau, and then it was outsourcing, and most recently off-shoring. Data leaks and breaches in the news focus attention from legislators, and regulations are put in place to try and manage things – but regulations are never enough. It's what you do that protects your data.
There are three basic models for cloud services, and how you treat security is going to differ as a result of the cloud services you choose:
• Infrastructure as a Service (IaaS): a service like that provided by Amazon Web Service, where they provide an infrastructure, leaving you to deploy your own virtual servers.
• Platform as a Service (PaaS): a service like that provided by Microsoft Azure, where you run your applications on the service's operating system, using its storage infrastructure.
•Software as a Service (SaaS): a service like that provided by Salesforce.com, where you store your data in the services databases, and use its software to process the information.
If you're using an IaaS provider, then you're going to need to treat your virtual machines much like any cluster of virtual machines in a data centre. The service provider is providing the network infrastructure (and the network security tools), and you're going to need to secure your virtual servers. You can use familiar tools and techniques, but it does mean that you're going to have to treat security as a full time IT task.
PaaS is a more complex beast to secure effectively, as you're reliant on the security features of the service operating system. You're only working with applications and data, and you need to ensure that you only rely on the security you build into your applications.
That does take some of the load off your IT team, though, as you're handing over both infrastructure and OS security to your cloud service provider.
SaaS is both the simplest and the hardest to deal with. It's simple, in that all your security needs are taken care of by the service provider. It's also the hardest, because that means you need to trust your SaaS vendor – or at least ensure that you have a legally binding agreement which includes security provisions. You'll need to be sure that you're complying with the appropriate regulations, and that you've got a secure connection to your provider's applications – using more than just simple passwords!
Getting that trust right is important to Salesforce.com, according to Tim Barker, the company's vice president of marketing in Europe, the Middle East and Africa (EMEA).
He describes it as a "consistent focus," adding "We started building with security in mind, to be a service that users trust".
But it's not good enough to be trusted for what you say, and that trust needs to be verified. "We work to ISO 27001 standards, with third party accreditation, and we're also evaluated by prospective customers who send in their own security people. So we're probably more regularly reviewed than any other vendor, right down to code reviews," Barker added.
Mike Lingo, chief technology officer at Astadia, echoes the need for an audit of cloud services as part of ensuring compliance. "Customers need to assert that their vendors are compliant with best practices for processing in their environment by reviewing things like SAS 70 compliance, which is obviously the standard vendors will work towards," he said.
"Further, you'll want to know for mission-critical or system-critical apps that a Type II audit was performed."
That actually adds up to a security advantage for cloud services, as Lingo points out that "a well-established vendor's cloud solution has probably had much much more money spent on its infrastructure, security and competencies than an internal IT shop can often afford".
Micrsoft Office 365 security
All the points sited are spot on. See this video about Microsoft 365 security. SAS II 70 audits yearly and ISO 27001.
By Techquarters on 23 Jul 2011
For more details about purchasing this feature and/or images for editorial usage, please contact Jasmine Samra on firstname.lastname@example.org
- Google I/O live stream and blog: how to watch 2014 Google I/O keynote speech live
- Google testing its own domain registration service
- Adobe announces first hardware: Adobe Ink and Slide
- Vote now in the PC Pro Excellence Awards 2014!
- What’s new in OS X 10.10? Apple Yosemite’s new features
- Samsung Z Tizen phone helps loosen ties with Android
- Microsoft rumoured to launch smartwatch this summer
- LG G3 launched: LG takes the wraps off smartphone that offers “more with less effort”
- LG G3 launch live video stream and blog: as it happened
- Apple fixes iMessage lock-in for Android switchers
- How Google Glass ruined my lunch hour
- Smartphone battery packs: can a USB power pack beat the festival battery blues?
- Windows Easy Transfer – not so "easy" in Windows 8.1
- Formula 1: what a difference virtualisation makes
- Office of the future: comfy chairs and tablets everywhere
- I went to Glastonbury and the only thing that got high was my smartphone
- Meet the robots helping teach children
- PaperLater: would you pay to print the internet?
- Amazon vs Kobo: how much to make the ebook switch?
- Phishing emails: how I nearly got caught out