Storms ahead: Insiders and the cloud

Share this article:
Storms ahead: Insiders and the cloud
Storms ahead: Insiders and the cloud

The cloud presents new challenges in protecting data, such as who is responsible for implementations, Stephen Lawton reports.

Cyber espionage is fast becoming a hot topic of Hollywood blockbuster movies, best-selling mystery novels and international intrigue. But, in real life, sometimes the “villain” is someone within the victimized organization and often the so-called attack is anticlimactic bordering on the mundane. And, while many insider breaches are malicious in motivation, sometimes attacks are nothing more than employees' accidents, misconfigured networks or staffers being duped into clicking on a legitimate-looking link in an email.

Further, unlike traditional data centers where insiders are employees of the company that creates and owns the information, cloud-based “insiders” might not work for the company at all, but rather the service provider that operates the data infrastructure or cloud-based software. Cloud service providers have their own staffs, and in the case where a company's cloud-based infrastructure is housed on virtual machines (VMs), the definition of who constitutes an insider gets increasingly muddled. In multitenant environments, each company that has data stored on a VM has its own community of insiders, and multiple VMs are housed on a single, physical piece of hardware. In such cases, the hypervisor component of the virtualization environment acts as the barrier among various stores of private information.

Guidelines: Stopping leaks

“The Guide to Intrusion Detection and Prevention Systems” from The National Institute of Standards and Technology (NIST) offers five recommendations for federal departments and agencies, although these are not limited to government sites. They include:

  1. Organizations should ensure that all IDPs [intrusion detection and prevention system] components are secured appropriately.

Who has responsibility?

Many cloud providers are moving away from the VM-centric cloud, instead opting for security controls built in to off-the-shelf, software-as-a-service (SaaS) applications, such as Microsoft Office 365, Salesforce.com and the suite of Google applications, says John Howie, chief operating officer of the Cloud Security Alliance, a nonprofit coalition of industry practitioners which seeks to educate stakeholders and promote the use of cloud computing best practices. Additionally, he says the idea of giving sensitive corporate data to a third party is not unique to the cloud. Companies for years have outsourced human resources and payroll services with little concern that an insider could steal data, he says.

The underlying key to determining insider threats is a full-risk analysis, Howie says. Companies need to ensure their providers employ best practices to protect private data, he says, but much of the security enforcement should remain with the customer and not with the provider. 

Page 1 of 4
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in Features

Game theory: Cyber preparedness

Game theory: Cyber preparedness

Business leaders are beginning to fathom the importance of cyber war game simulation exercises, reports James Hale.

Forward progress: How the Denver Broncos really play defense

Forward progress: How the Denver Broncos really play ...

Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.

Smart defense: A talk with industry veteran Gene Fredriksen

Smart defense: A talk with industry veteran Gene ...

Today's CISO must stay ahead of attackers, says Gene Fredriksen, CISO at PSCU. Teri Robinson talks one on one with the industry veteran.