Menu
The dangers of cloud computing

The dangers of cloud computing

On-demand apps and services have several security risks that IT should address up front

A best practice guideline for cloud computing

Ultimately, the consumer of the services is responsible for maintaining the confidentiality, integrity, and availability of data, agrees Kristin Lovejoy, director of IBM's security, governance, and risk management division.

Lovejoy cites by way of example the fact that the HIPAA (US Health Insurance Portability and Accountability Act) makes no specific statements regarding outsourcing or offshoring. Instead, the act's sections 164.308 and 164.314 simply require that a company get assurance from any third parties handling its data that the data will be safeguarded, she notes.

As far as placing limitations on when to deploy the cloud, Lovejoy advises that companies adhere to Geoffrey Moore's consideration of "context versus core." (Moore is a business strategist and managing partner of TCG Advisors.)

Core business practices provide competitive differentiation. Context practices deliver business activities that are typically internal, such as HR services and payroll. Both core and context can be divided into mission-critical applications and non-mission-critical ones. "If a non-mission-critical application goes offline, the company can survive," Lovejoy says.

The rule of thumb Moore comes up with, notes Lovejoy, is this: If the business practice is context and non-mission-critical, then always put it in the cloud. If it is context and mission-critical, it is likely you should make it cloud-enabled. However, if it is core and non-mission-critical, you may want to think about keeping it behind the firewall; if it is core and mission-critical, then definitely keep it behind the firewall, she says.

Good security takes time

The cloud approach doesn't map naturally to how good security is typically designed, says John Pescatore, Gartner's chief security analyst and a man whose resume reads like it came from a James Bond movie, including a stint with the FBI, the National Security Agency, and the Secret Service.

The area that worries Pescatore most is how quickly cloud-based services are updated and changed. He cites Microsoft's painstaking development of the SDLC (Software Development Life Cycle) initiative that assumes mission-critical software will have a three- to five-year period in which it will not substantially change.

"In the cloud, every two weeks we add a new feature, changing the app all the time. But the secure SDLC is not built to do that. We are going back to the old Netscape days of pushing out new features real quick, and nobody has a security cycle that moves that fast," Pescatore says.

What makes matters even worse is that the business user can't say he wants to stay on the old version. "In the cloud you have to accept the next version, possibly nullifying any security that was built into the old application or assumed through integration at the customer site.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

EDGE 2019: Thought leaders share how to build a channel of the future

EDGE 2019: Thought leaders share how to build a channel of the future

Day 2 of EDGE was opened by in-depth research from TRA's Tim Dillon, which outlined the partner view on the channel's future. The following day saw Forrester's Jay McBain and Odgers Berndtson's Tim Sleep conclude the keynote line-up, while HPE and Cisco rounded off the thought leadership.

EDGE 2019: Thought leaders share how to build a channel of the future
Tech credentials on show during Ingram Micro One APAC

Tech credentials on show during Ingram Micro One APAC

Ingram Micro outlined the key technologies for future channel growth on the second day of Ingram Micro One APAC in Singapore, in front of more than 1300 business leaders.

Tech credentials on show during Ingram Micro One APAC
Show Comments