Cloud
5/21/2012
05:28 PM
Connect Directly
RSS
E-Mail
50%
50%

Revamp Mobile Policy To Secure The Cloud

A majority of employees bring their own devices into work and connect out to the cloud -- now it's time to gain greater control over the security of these devices

There are benefits to allowing workers to bring their own devices and connect them to the corporate network, but businesses must take action to counter the risks user-owned devices can bring.

While more than eight out of 10 IT managers believe that a bring-your-own-device (BYOD) policy boosts productivity, more than 60 percent say employees connecting out to cloud services is a risk, according to a survey conducted by telecommunications and consulting firm BT.

"Organizations have to be aware of where their data is now -- in order to control access to it and protect it," says Jeff Schmidt, global head of business continuity, security, and governance at BT Global Services. "CIOs need to have a strategy for how they deal with data at rest and data in motion."

Cloud and the BYOD movement are two trends that are converging to create security problems for companies. Consumer technology could play host to malicious software, which could come from a cloud service or social network, allowing it to enter a business' network unhindered. Devices could also allow an insider to easily exfiltrate data.

"BYOD is a good trend, but there is a negative from a security perspective," says Michael Sutton, vice president of security research for Zscaler. "Where I see most companies migrating to is that they need some degree of control."

To blunt the danger of the always-accessible cloud, companies need to take a trio measures:

1. Employ policy tools from cloud providers.
Take service provider YouSendIt, for example. The company's service originally gave workers an easy way to send large files through e-mail -- the file was stored in the cloud and workers could send a link to the file in e-mail, reducing the bandwidth. Now the company's service works through any mobile device, as well. Users can upload large files or view the files from any mobile device.

[ An increasing amount of corporate data will be accessed through the cloud from anywhere in the world. Great for productivity? Yes, but it's also a security threat. See Cloud's Future Security Depends On Mobile. ]

To help customers deal with compliance requirements, the company has a number of ways of tracking data and limiting access. A company can, for example, bar the sending of corporate data to Gmail accounts. The reason for the controls are to help companies get a handle on where their data is going, says Mihir Nanavati, vice president of product management and user experience for YouSendIt.

"All bets are off in terms of security in the enterprise when users bring in their own devices," he says. "It is hard to manage all this complexity."

2. Institute tight control.
To create an appropriate policy, companies should first identify their important information assets, assigning a monetary value to each, BT's Schmidt says. By knowing the value of its data, a company can prioritize its defensive measures, including data encryption, digital rights management, and data-loss prevention solutions.  A variety of monitoring and log management should be done as well, he says.

Data can leak, not just through smartphones, but also thumb drives, laptops, and other portable storage devices, Schmidt says. Given that, companies should not expect a single technological fix.

"The industry is littered with good technology solutions looking for a problem," Schmidt says. "The important point here is that this isn’t solved with just one application or technical solution, but rather with an approach and direction that reflects your organization's risk appetite and culture."

3. Provide easy-to-use content.
When implementing policies and restrictions and mixing in new technology, companies need to remember that the entire BYOD movement is driven by ease-of-use. It is easier for a worker to bring his smartphone, while at the same time being less expensive for the company.

If security restrictions are too onerous, however, then employees will work around them, weakening security, Nanavati says.

"Administrators should be able to set policy -- absolutely," he says. "But you don't want administrators to be able to set policies that break the end-user experience. The users need to be able to access content when they need it."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
6/30/2012 | 6:51:03 PM
re: Revamp Mobile Policy To Secure The Cloud
There is a balancing act at work whenever it comes to security policies and making sure they don't hurt productivity. But enterprises should take a long look at whether adopting a BYOD approach is truly even worthwhile for them once they factor in risk and compliance requirements.
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.