Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
In Cloud We Trust: A New Model
The solution to the problem of data security in the public cloud will require more than a traditional compliance-driven approach.
Evelyn De Souza & Richard Noguera
September 4, 2014
5 Min Read
Everything is moving fast in the cloud. Public cloud services are delivered with the promise of instant provisioning and constant availability at a fraction of the cost of on-premises implementations. But given our mobile, cloud-enabled, data-driven environment, it is highly likely that in the near future there will be a significant data breach as a result of a compromised cloud account with excessive access to sensitive customer data.
While the prediction is that cloud service providers will be attacked, business consumers will have the most to lose if they are compromised. So how do we control the uncontrollable: the nexus of cloud, mobile, and a data-driven environment? CISO’s and their InfoSec teams need to simplify the problem, the solution, and how they speak with the rest of business operations.
A failure to communicate
Currently, most security teams don’t effectively communicate with business operations. However, by doing so, CISOs and InfoSec teams will have a much better chance to partner with the key internal influencers and enable smarter data security.
Back in the day, information security frameworks were created at a time when data was primarily housed behind a corporate firewall and the focus was on placing controls on the endpoints and key points in the infrastructure. As a result, existing frameworks do not cater to a cloud-enabled enterprise in which the traditional enterprise perimeter has evaporated, control of the endpoints is greatly diminished and there are new, higher levels of data fluidity than ever before.
Many public cloud-consuming organizations look for cloud providers to adhere to particular regulations and standards both because they are a business requirement and because they equate them with trustworthiness. However, even though the intent of these regulations and standards is to protect, the long rote of compliance has taken its toll. When faced with an overwhelming number of compliance obligations and audits, the tendency of CSPs is to treat compliance in a checkbox fashion versus taking a risk-based, sustained approach where controls are assessed on a continual basis rather than at just a single point in time. What that means is that while compliance requirements may prove that a particular scope of an environment was compliant at a specific state in time, it does not guarantee the protection of data.
Furthermore, the way that InfoSec teams classify and treat data has to align to the new business and usage contexts of cloud and mobile. In other words, data identification and classification schemes have to be intuitive and simple in order for the business to own up to protecting their data.
A new model for data sets
A simple-tiered model including three categories of regulated, commercial and collaborative could be an industry-agnostic model for tiering data and provide a construct for educating business users about to how to identify critical data assets and transactions. It also ensures that the business is able to have an intelligent discussion with the cloud service provider about protecting data.
Specific industries and verticals may want to tailor data classifications schemes to the values that data holds for their particular industry. However, in the baseline model we propose, regulated would classify any data that is subject to regulation including Personally Identifiable Information (PII), commercial would cover any business to business or business to consumer transactions, industry data or intellectual IP and collaborative would imply data such as document collaboration, DevOps, and also that which is publicly accessible.
We propose these tiers as a base model because they can be applied concretely to define data and minimize misinterpretation versus definitions such as "confidential" and "not confidential" which could be informed by personal values. They also allow for easy mapping of policy, process and technology controls based on standard definitions.
Data could be identified, classified, digitally tagged, or watermarked based on these tiers. User entitlement, access, authorization, authentication, logging monitoring, and other data protection controls map easily to this model. Encryption strength and type can be based on data type. For example, commercial cata would ideally require point-to-point encryption and tokenization while collaborative data may not always require encryption especially if already publicly accessible. Data residency controls in many cases will apply only to regulated data given data privacy and national regulations that restrict the flow of data geographically.
Looping CISOs and CSPs
Data classification schemes provide the means by which the CISO can be better looped in with cloud service providers. They enable the business to intelligently champion data security with the CSP without having to defer to a purely compliance-driven approach to security.
In this construct CISOs and InfoSec teams can start to focus on protecting the data, the users, the transactions and workstreams through digital watermarking technologies, encryption, strong user access controls and data residency controls. It is this overarching approach -- rather than having a secure and compliant infrastructure -- that will help retain customer trust, because in the cloud-enabled business, the most control that CISOs can have is over their data and users.
So, what can IT and InfoSec teams do to better protect data and reduce the risk of a data breach in the cloud?
Start to align information security measures to the business usages and contexts for cloud today.
Communicate regularly with business users to understand and align to their needs.
Shift the focus on data and user centric controls rather than solely relying on an infrastructure-based approach to security.
Consider using a tiered data scheme that to ensure that the data that is most valuable or sensitive to your business is protected appropriately.
By taking these steps, CISOs and InfoSec teams can ensure more effective collaborations with internal business units, while enabling smarter data security.
About the Author(s)
Cloud Security Alliance Data Governance Chair & Cloud Compliance & Data Privacy Strategy Leader, Cisco
Evelyn De Souza, Cloud Security Alliance Data Governance Chair & Cloud Compliance & Data Privacy Strategy Leader, Cisco
Evelyn de Souza is a Data Privacy and Compliance Leader at Cisco Systems, where she focuses on developing industry blueprints to help organizations embrace the cloud securely and ensure data privacy in an agile manner. She currently serves as the Chair of the newly formed Cloud Security Alliance (CSA) data governance and privacy working group. Evelyn previously co-chaired the CSA Cloud Controls Matrix working group and played an integral role in guiding its development and evolution.
Richard Noguera, Head of Information Security, The Gap
Richard is the Global Head of Information Security at The Gap Inc. He has built and matured the information security programs at three Fortune 500 companies, and the Gap will be his fourth. He is focused on establishing information security practices that enable and accelerate the business through prioritizing corporate IP and assuring protection of user data in cloud and extended ecosystems. Richard has extensive experience across financial services and high-tech industries as well as from a consultancy perspective. His recent positions include Senior Director of Governance at Yahoo and most recently as a Security and Risk Management practice leader at Accenture.
You May Also Like
Your Everywhere Security guide: Four steps to stop cyberattacksFeb 27, 2024
Your Everywhere Security Guide: 4 Steps to Stop CyberattacksFeb 27, 2024
API Security: Protecting Your Application's Attack SurfaceFeb 29, 2024
API Security: Protecting Your Application's Attack SurfaceFeb 29, 2024
Securing the Software Development Life Cycle from Start to FinishMar 06, 2024