Is the Public Cloud Secure?
While deciding amongst a public, private or hybrid cloud offerings, any organization considers the involved security risks as one of the most important parameters. The prefix ‘Public’ alone can make some people think that public cloud is not as secure as a hybrid, or a private offering. But is that really true – or is the public cloud secure enough for your organization’s data? Let’s try to analyze this question and arrive at an answer post validation of some facts. However, before we do the analysis let’s give a brief intro to the public cloud so that this assessment becomes meaningful even for someone with no technical background on cloud computing. Introduction to public cloud The concept of offering cloud computing as a public utility is not new. It was first mooted in the 1960s by JCR Licklider as an ‘intergalactic computer network,’ which laid the foundations of grid computing, an early forerunner of the cloud. However, it was wasn’t until the 1990s when the internet started to offer significant bandwidth that the idea actually started seeing the light of the day. One of the first milestones was the arrival of salesforce.com in 1999 which pioneered the concept of delivering enterprise applications via a simple website. In 2002, Amazon created a suite of cloud based infra services including storage and compute as a captive arm of Amazon e-commerce. Later by 2006 Amazon Web Services (AWS) was introduced as a commercial web service, with the launch of their compute service Elastic Compute (EC2) that allowed small companies to rent computers on the cloud to run their own applications. Soon enough other players entered the market as public cloud service providers prominent being IBM Cloud (2011), Google Cloud (2011), Microsoft Azure (2012), and many others. Public cloud computing is defined as computing services offered by third party providers over the public internet making them available to anyone who wants to use them. A public cloud is built on a fully virtualized environment which supports a multi-tenant architecture enabling users to share computing resources – thus bringing economies of scale and lowering costs. A user pays only for what they use just like a public utility service such as electricity or piped gas. This no capex opex only model was the major attraction which initially attracted a lot of customers to the public cloud. Over the years as the technology has evolved, most public cloud service providers have upped their game This no capex opex only model was the major attraction which initially attracted a lot of customers to the public cloud. Over the years as the technology has evolved, most public cloud service providers have upped their game. Is that a valid concern, or just a bogey? This article tries to address the query. Security concerns in the public cloud Loss of governance The idea of migrating applications hosted on premise to the public cloud is quite disconcerting to many users. The concerns largely are around the under mentioned areas. Data loss/ leakage. Misuse or leakage of data especially with other tenants in the cloud. Access control. When a business operates in an exclusively on-premise IT infrastructure, governance is controlled and executed within a ring-fenced environment. In the cloud, the boundaries are suddenly gone and this instils a sense of unease. The customers are not sure of if unauthorised access is prevented, or even if the cloud providers claim so how can they be assured of it. Incident response. How is this going to be managed? DDoS protection. What is the protection from a distributed-denial-of-service attack? Compliance Data sovereignty. In many cases regulation demands that the data stay within a country or a region. How can a customer be assured of the same when the cloud service provider host their infra in their global data centers. Compliance to certifications/ audits. Many organizations may be holding security related or other global certifications e.g., ISO 27001 etc., but how can they be assured in the public cloud? Privacy Misuse of data. There are concerns about the customer data being used by the cloud service providers analytics, marketing, and/ or shared with any 3rd parties? Data ownership. Who owns the data on the cloud? Malicious insider. A malicious insider is an employee of the cloud service provider who abuses his or her position for information gain or for other nefarious purposes such as a disgruntled employee. How does one prevent that? Transparency Visibility. Do I have control over my data, where is it stored? Who can access it in the cloud provider team? Deletion. When I delete my data in the cloud, is it truly and completely deleted? How cloud providers have responded to the security concerns Institutional frameworks The Cloud Security Alliance (CSA) was formed in Dec 2008 with the aim to securing cloud computing. It is a not-for-profit organization with a ‘mission to promote use of best practices for providing security assurance for cloud computing.’ Over the years it has come up with several security guidelines and standards to assure public cloud security, prominent amongst them is the 2010 Cloud Controls Matrix (CCM) which is a baseline set of security controls to help enterprises assess the risk associated with a cloud computing provider. It provides guidance in 16 security domains including application security, identity and access management, mobile security, encryption and key management, and data center operations. In 2013, it launched the STAR (Security Trust and Assurance Registry) certification. STAR has 3 levels of certifications. It encompasses key principles of transparency, rigorous auditing and harmonization of standards. STAR level 2 certification provides multiple benefits including indications of best practices and validation of security posture in the cloud offerings. All major cloud providers conform to these standards and that has greatly helped them build assurance in the minds of the customers. Shared responsibility model of security Security and compliance is a shared responsibility between the cloud provider and the customer. This shared model can help relieve the customer’s operational burden as the cloud…