Risk
11/4/2010
01:23 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Amazon Says Cloud Beats Data Center Security

Security is a shared responsibility between the cloud provider and its customers, says Amazon Web Services security architect.

Slideshow: Amazon's Case For Enterprise Cloud Computing
Slideshow: Amazon's Case For Enterprise Cloud Computing
(click image for larger view and for full slideshow)

Is your data secure in the leading public cloud? Steve Riley, Amazon Web Services security architect, responds in no uncertain terms: it's more secure there than in your data center.

In a talk at the Cloud Computing Conference and Expo 2010, he cited several ways Amazon's Elastic Compute Cloud (EC2) operation protects users' data and applications. At the same time he concedes that security in the cloud is "a shared responsibility." Amazon provides a secure infrastructure from "the concrete (of the data center floor) to the hypervisor," is one of his favorite expressions. But an EC2 customer has to write a secure application, transport to the cloud, and operate it in a secure fashion there.

AWS is working on an Internet protocol security (IPsec) tunnel connection between EC2 and a customer's data center to allow a direct, management network to EC2 virtual machines. Such a connection would allow customers to operate their servers in EC2 as if they were servers on the corporate network. And that allows EC2 customers "to imagine the day when they will have no more internal IT infrastructure," Riley asserted, trying to elicit a little shock and awe from his stolid listeners.

Riley addressed the Santa Clara, Calif., event in two separate sessions Tuesday, then gave a third talk Wednesday at a satellite RightScale user group meeting. In each session, he emphasized the security that Amazon Web Services currently supplies, plus what it will do in the near future to beef up its Virtual Private Cloud service. With a direct, frank style, the lanky, shaggy security guru said: "It's my job to help people get more comfortable with what makes people squirm."

For long-term storage, your data may be more secure in the cloud than in your data center because AWS' S3 storage service uses a standard cloud data preservation tactic, invoked by the big data handlers, such as Hadoop: It creates "multiple copies" of a data set, anticipating that a server or disk containing the data may fail. If it does, a new copy is automatically generated from a replicated set and a new primary copy is designated from among at least three copies.

Cloud design assumes disk and server hardware failures will occur and works around such failures, he said. It also stores the copies across two availability zones in the EC2 cloud, meaning a complete power outage or catastrophe could take out one of its data centers and a new data set would be reconstituted from another. Although Riley didn't say so, it appears that a data loss could occur only if at least three hardware failures holding a particular data set in disparate locations occurred simultaneously.

Through this approach, S3 has stored 180 billion objects for EC2 customers over four years and "hasn't lost one of them," said Riley. It's achieved a 99.999999999% (or eleven nines of) data availability, Riley claimed.

Previous
1 of 3
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.