Cloud

10/15/2015
03:30 PM
Jaikumar Vijayn
Jaikumar Vijayn
News
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Survey Shows Little Accord On Responsibility For Cloud Security

With procurement teams and business groups doing most vendor selection and vetting, IT groups have little role in security.

Many industry experts agree that cloud security has to be a shared responsibility between cloud providers and the businesses that use these services to host and manage their data and applications. But there's less agreement is over just how much responsibility each side has for ensuring data security in the cloud.

The Ponemon Institute, sponsored by Armor Defense, recently polled 990 IT and non-IT executives in the US and UK on cloud security-related topics and found a considerable disconnect on the issue of shared responsibility.

For starters, barely 16 percent of those polled even believe ensuring the security of cloud-hosted applications is a shared responsibility. Some 31 percent rely entirely on their cloud provider to keep SaaS applications safe, while 20 percent say businees end-users should be most accountable for it. A mere 15 percent say IT organizations should be most responsible for securing enterprise data stored in the cloud.

Interestingly, IT and non-IT respondents have different views of the role that technology organizations should play in cloud security. Nearly a quarter of the non-IT executives that Ponemon polled feel IT has a lead role to play in securing cloud hosted applications. But barely 13 percent of IT security executives share that same opinion.

The numbers become somewhat easier to understand when taken in the context of some of the other findings of the survey. For example, the survey results show that IT organizations continue to be largely in the dark about the use of SaaS and infrastructure as a service within their organizations. Most of the selection and vetting of cloud providers is being done by procurement teams and directly by the business groups that want the service.

The survey results suggest that corporate IT groups and information security organizations have a minimal role to play in either electing cloud vendors or in ensuring that they are adequately vetted.

When asked who was responsible for ensuring that cloud providers are secure and compliant with applicable privacy and security requirements, 43 percent of the respondents in the Ponemon/Armor survey point to their procurement organization. About 40 percent say business groups that make these decisions. Only 22 percent say corporate IT is responsible for this task, while an even smaller 17 percent say it's their IT security organization.

A surprising 62 percent of the survey respondents say their information security team is rarely or never involved in helping choose cloud providers.

The apparent lack of IT involvement in major cloud decisions is not the only issue.

Despite continuing concerns over the security of cloud-hosted enterprise data and services in many organizations, a substantial proportion of the respondents in the Ponemon survey appear to be doing little proactively to mitigate risk.

For example, more than 50 percent do not evaluate cloud applications and infrastructure for security vulnerabilities prior to deployment. Some 52 percent of organizations that use offshore providers, or whose data might be hosted at an offshore location, do nothing to ensure the vendor is in compliance with relevant security and privacy requirements. Less than four in 10 leverage security tools to protect enterprise applications and data in the cloud, while only 22 percent have the ability to inspect cloud-hosted data.

“It continues to surprise me that there seems to be an agreement in the industry that security is important and continues to be a major concern in the cloud,” says Wayne Reynolds, vice president of security at Armor. “Yet more than half of the respondents are unwilling to pay a premium to ensure [that] security.”

The cloud provides an opportunity for enterprises to gain great flexibility, agility, and scalability for sensitive workloads, Reynolds says. But to do this securely requires the right blend of technologies and security personnel.

“For those enterprises without large security staffs, a fully managed security provider might make the most sense given the ability to take on more responsibility for securing a greater part of the IT stack,” he says.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/21/2015 | 7:11:41 PM
Too much is too little
The problem with shared responsibility is that when it's everyone's repsonsibility, it's no one's responsibility.

There needs to clearly be a party with clear responsibility; otherwise, everyone will shrug things off to each other.
UlfM645
50%
50%
UlfM645,
User Rank: Apprentice
10/19/2015 | 11:24:37 AM
Sensitive Data
I find it concerning that "Some 52 percent of organizations that use offshore providers, or whose data might be hosted at an offshore location, do nothing to ensure the vendor is in compliance with relevant security and privacy requirements," and "Less than four in 10 leverage security tools to protect enterprise applications and data in the cloud." Another Ponemon study "The State of Data Security Intelligence," reported that "Data that is outsourced to cloud is the biggest worry."

Gartner released the report "Simplify Operations and Compliance in the Cloud by Protecting Sensitive Data" in June 2015 that highlighted key challenges as "cloud increases the risks of noncompliance through unapproved access and data breach." The report recommended CIOs and CISOs to address data residency and compliance issues by "applying encryption or tokenization," and to also  "understand when data appears in clear text, where keys are made available and stored, and who has access to the keys." Another recent Gartner report concluded that "Cloud Data Protection Gateways" provides a "High Benefit Rating" and "offer a way to secure sensitive enterprise data and files stores of data and use cases.

Modern tools can at least secure sensitive data before sending it to cloud.

Ulf Mattsson, CTO Protegrity
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
10/16/2015 | 8:13:04 AM
Security through Ambiguity?
To date, cloud has become more and more prevalent in the business sector to the point where businesses can no longer play dumb. Cloud can be discerned and analyzed and this is why its alarming that only 17% of the poll stated that security had a role in their cloud roll out. This is also why its imperative for security to have a seat at the table during business decisions. The cloud can handle data in a variety of walls, most if not all of which involve not storing your data on premise which has inherent security risks. Security needs to have their eyes on cloud implementations from start to finish.  (Title riddled with sarcasm)
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Are you sure this is how we get our data into the cloud?
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-8298
PUBLISHED: 2018-09-24
Multiple SQL injection vulnerabilities in the login page in RXTEC RXAdmin UPDATE 06 / 2012 allow remote attackers to execute arbitrary SQL commands via the (1) loginpassword, (2) loginusername, (3) zusatzlicher, or (4) groupid parameter to index.htm, or the (5) rxtec cookie to index.htm.
CVE-2018-14825
PUBLISHED: 2018-09-24
A skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable...
CVE-2018-17437
PUBLISHED: 2018-09-24
Memory leak in the H5O_dtype_decode_helper() function in H5Odtype.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (memory consumption) via a crafted HDF5 file.
CVE-2018-17438
PUBLISHED: 2018-09-24
A SIGFPE signal is raised in the function H5D__select_io() of H5Dselect.c in the HDF HDF5 through 1.10.3 library during an attempted parse of a crafted HDF file, because of incorrect protection against division by zero. It could allow a remote denial of service attack.
CVE-2018-17439
PUBLISHED: 2018-09-24
An issue was discovered in the HDF HDF5 1.10.3 library. There is a stack-based buffer overflow in the function H5S_extent_get_dims() in H5S.c. Specifically, this issue occurs while converting an HDF5 file to a GIF file.