Cloud
7/21/2011
11:17 AM
George Crump
George Crump
Commentary
50%
50%

How to Choose A Cloud Storage Provider: Security

In the first of a three-part series, we outline security considerations in selecting a place to store your data in the cloud.

The choices you make when selecting a cloud storage provider depend in large part on your environment and what you are trying to accomplish. A small business may be looking to the cloud to start an IT service like file sharing, a larger business may look to the cloud to augment an existing process like backup. Despite those differences everyone should look for security, availability, and flexibility. In the first entry in this series we will discuss security.

As we discuss in "What is Cloud Storage," cloud storage providers (CSP) come in two forms typically. There are providers that provide a complete turnkey system, where they provide an application that moves data to the cloud and they manage and provide the physical storage assets in the cloud.

Then there are the providers of just the physical storage assets in the cloud that you either directly connect to or you connect through a third-party software application or hardware appliance. In that case the choice is typically yours for which cloud provider you will connect to.

There are some third-party software applications that only work with a single cloud storage asset provider. In other words they look like a turnkey solution but are outsourcing the backend storage themselves.

None of these CSP methods is better than the others. Choosing which one makes the most sense for your organization depends on your needs and each of these CSPs can deliver on security, availability, and flexibility.

Security, as we discussed in "Consumer Cloud vs. Enterprise Cloud," is certainly critical for any size of organization and many users of cloud storage. Encryption of some type is typically the security solution, but it is the where and when of that encryption that becomes important. At a minimum you want your data that is at rest in the cloud to be encrypted. The primary motivation is to make sure that, if the CSP hosting your data is responding to a legal action and needs to provide access to data, your data can't be read.

Storing encrypted data at someone else's facility and then having that facility come under investigation is going to make for some very interesting legal arguments and is something I am going to cover in a future entry. In short, while encryption alone does not free you from a court order, it at least gives you the control over who will and will not see your data.

Beyond encryption at the facility, most businesses will also want to consider having that data encrypted as it is being transferred to the remote cloud storage, known as encrypting on the wire. This can be done by the software or hardware that is connecting you to the cloud. Encryption is not free though; it may come at the expense of a small performance loss, especially if transfer is being done by a software-based application. For most, this loss should be well worth the gain in security.

Most cloud storage applications use local storage to cache data as it moves back and forth between the CSP. This local storage should be encrypted, too. Local encryption protects you if a hard drive needs to be disposed of. Unlike a RAID system, although it is still readable, it requires some effort to read data from discarded drives. Most of these caches can exist on a single hard drive, and without encryption they would be very easy to read. By simply removing the key they are rendered useless.

Next up in this series is availability. The spring was a tough time for cloud storage providers with several major names exiting the market and several well-publicized outages, from companies like Amazon and VMware. The focus of that entry will be selecting a provider that has minimal chance of an outage and what to do if there is one.

Follow Storage Switzerland on Twitter

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Storage Switzerland's disclosure statement.

Security concerns give many companies pause as they consider migrating portions of their IT operations to cloud-based services. But you can stay safe in the cloud. In this Dark Reading Tech Center report, we explain the risks and guide you in setting appropriate cloud security policies, processes and controls. Read our report now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2382
Published: 2014-11-20
The DfDiskLo.sys driver in Faronics Deep Freeze Standard and Enterprise 8.10 and earlier allows local administrators to cause a denial of service (crash) and execute arbitrary code via a crafted IOCTL request that writes to arbitrary memory locations, related to the IofCallDriver function.

CVE-2014-3625
Published: 2014-11-20
Directory traversal vulnerability in Pivitol Spring Framework 3.0.4 through 3.2.x before 3.2.12, 4.0.x before 4.0.8, and 4.1.x before 4.1.2 allows remote attackers to read arbitrary files via unspecified vectors, related to static resource handling.

CVE-2014-8387
Published: 2014-11-20
cgi/utility.cgi in Advantech EKI-6340 2.05 Wi-Fi Mesh Access Point allows remote authenticated users to execute arbitrary commands via shell metacharacters in the pinghost parameter to ping.cgi.

CVE-2014-8493
Published: 2014-11-20
ZTE ZXHN H108L with firmware 4.0.0d_ZRQ_GR4 allows remote attackers to modify the CWMP configuration via a crafted request to Forms/access_cwmp_1.

CVE-2014-8767
Published: 2014-11-20
Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?