Cloud
7/21/2011
11:17 AM
George Crump
George Crump
Commentary
50%
50%

How to Choose A Cloud Storage Provider: Security

In the first of a three-part series, we outline security considerations in selecting a place to store your data in the cloud.

The choices you make when selecting a cloud storage provider depend in large part on your environment and what you are trying to accomplish. A small business may be looking to the cloud to start an IT service like file sharing, a larger business may look to the cloud to augment an existing process like backup. Despite those differences everyone should look for security, availability, and flexibility. In the first entry in this series we will discuss security.

As we discuss in "What is Cloud Storage," cloud storage providers (CSP) come in two forms typically. There are providers that provide a complete turnkey system, where they provide an application that moves data to the cloud and they manage and provide the physical storage assets in the cloud.

Then there are the providers of just the physical storage assets in the cloud that you either directly connect to or you connect through a third-party software application or hardware appliance. In that case the choice is typically yours for which cloud provider you will connect to.

There are some third-party software applications that only work with a single cloud storage asset provider. In other words they look like a turnkey solution but are outsourcing the backend storage themselves.

None of these CSP methods is better than the others. Choosing which one makes the most sense for your organization depends on your needs and each of these CSPs can deliver on security, availability, and flexibility.

Security, as we discussed in "Consumer Cloud vs. Enterprise Cloud," is certainly critical for any size of organization and many users of cloud storage. Encryption of some type is typically the security solution, but it is the where and when of that encryption that becomes important. At a minimum you want your data that is at rest in the cloud to be encrypted. The primary motivation is to make sure that, if the CSP hosting your data is responding to a legal action and needs to provide access to data, your data can't be read.

Storing encrypted data at someone else's facility and then having that facility come under investigation is going to make for some very interesting legal arguments and is something I am going to cover in a future entry. In short, while encryption alone does not free you from a court order, it at least gives you the control over who will and will not see your data.

Beyond encryption at the facility, most businesses will also want to consider having that data encrypted as it is being transferred to the remote cloud storage, known as encrypting on the wire. This can be done by the software or hardware that is connecting you to the cloud. Encryption is not free though; it may come at the expense of a small performance loss, especially if transfer is being done by a software-based application. For most, this loss should be well worth the gain in security.

Most cloud storage applications use local storage to cache data as it moves back and forth between the CSP. This local storage should be encrypted, too. Local encryption protects you if a hard drive needs to be disposed of. Unlike a RAID system, although it is still readable, it requires some effort to read data from discarded drives. Most of these caches can exist on a single hard drive, and without encryption they would be very easy to read. By simply removing the key they are rendered useless.

Next up in this series is availability. The spring was a tough time for cloud storage providers with several major names exiting the market and several well-publicized outages, from companies like Amazon and VMware. The focus of that entry will be selecting a provider that has minimal chance of an outage and what to do if there is one.

Follow Storage Switzerland on Twitter

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Storage Switzerland's disclosure statement.

Security concerns give many companies pause as they consider migrating portions of their IT operations to cloud-based services. But you can stay safe in the cloud. In this Dark Reading Tech Center report, we explain the risks and guide you in setting appropriate cloud security policies, processes and controls. Read our report now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9209
Published: 2015-03-30
Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryTalk Services Platform before 2.71.00 and FactoryTalk View Studio 8.00.00 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.