Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

2/13/2017
11:30 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

National Security, Regulation, Identity Top Themes At Cloud Security Summit

Gen. Keith Alexander gives Trump a thumbs-up and Cloud Security Alliance releases a new application.

RSA CONFERENCE -- San Francisco – While deep conversations about DNS infrastructure and Dyn DDoSes were absent, the most popular refrains at today’s Cloud Security Alliance Summit here were related instead to regulation, identity, and how to use the cloud to improve security.

Keynote speaker Gen. Keith Alexander (ret.) -- who served as the first commander of the US Cyber Command from 2010 to 2014 and director of the NSA from 2005 to 2014 - proposed a new model for securing government systems.

“Why did [the Office of Personnel Management] get hacked?” said Gen. Alexander, now CEO and president of IronNet Cybersecurity. “They didn’t have the resources to" defend themselves, he said.

Historically, the government has left individual agencies “on their own as if they were individual organizations on their own to defend themselves. But they’re not," he said.

Moving government agencies to the cloud, he said, would ultimately make it possible to create a defensive surface far stronger than what currently exists, protecting the entire government. "Reading the Constitution, it reads ‘provide for the common defense,’ not only for the defense of you who are really big and the really critical,” he said.

The same practice could be applied to businesses in the same vertical industry, to make compliance with regulations easier and more effective, he indicated.

Gen. Alexander also remarked that he met President Trump for the first time recently, as a civilian at a White House cybersecurity meeting Jan. 31. Once the press left, said Alexander, the President listened to each person, took in their advice, and weighed what they said. “I think what I saw there was the President our nation needs to solve this problem.”

Regulation and More Regulation

Throughout the day, speakers discussed regulation -- how more was coming, how to make complying with it easier, and even how to avoid complying with it at all. 

The usual alphabet soup of HIPAA, FISMA, FedRAMP, etc., made passing appearances, but more time was devoted to the tricky topic of government intelligence agencies or law enforcement subpoenaing cloud users or cloud service providers for data. 

“The subpoenas are not the problem; the blind subpoenas are the problem,” said Venafi CEO Jeff Hudson. As Hudson explained, because of the secretive nature of these exposures, the government begins to seem like an adversary and a blind subpoena seems like a breach.

Building on that sentiment, Chris Eng, Veracode vice president of research, said “If I don’t have the data, I can’t give it up." He said he believed cloud users' desire to avoid these situations should push them to stop storing data they don't really need, and he predicts more cloud service providers will move to end-to-end encryption and put keys in the hands of users to avoid these sticky situations.

Robert Herjavec, CEO of Herjavec Group (and star of Shark Tank, who has served as cybersecurity advisor to the government of Canada and recently joined the US Chamber of Commerce Task Force for Cybersecurity) predicts there will be more and more cloud regulation -- which, among other factors, will contribute to the creation of more country-specific cloud services, that keep data within national borders.

CSA's First Commercial Product

The CSA itself is making a new contribution to help organizations prepare for whatever compliance obligations that may be on the horizon -- announcing, today, the official launch of STARWatch. Building on the CSA Security Trust and Assurance Registry (STAR) program, STARWatch is a SaaS application that enables organizations to manage all their cloud providers, as well as their own private clouds, set consistent security baselines, and perform audits. The application already boasts 250 licensees, activated during the beta phase. 

“We created the STARWatch application with two main objectives in mind – to simplify assurance and vendor management as well as to streamline compliance,” said Daniele Catteddu, CTO for the Cloud Security Alliance, in a release.

This is the first commercial product that CSA has released. In an interview here, CSA CEO Jim Reavis said STARWatch was created because of demands from the CSA members for such an offering. It's essentially a tool to make all the Alliance's earlier research more usable and actionable, he said.

While Reavis didn't rule out the possibility of CSA releasing more products in the future, he also didn't indicate the Alliance had plans to make this a habit. Rather, they would take the approach of being the "standards-bearer" for the industry, he said.

Identity

“You need to get your identity act together,” said CEO of Centrify Tom Kemp. He mentioned that despite the fact that the vast majority of attacks derive from an excess of passwords and privileges, only a small share of cybersecurity investments are spent on identity solutions.

“In Starbucks, you’re not using a next-gen firewall,” said Kemp. “You need to be securing the user.”

Centrify is an identity-as-a-service provider; but Kemp was not the only one beating the identity drum. The subject came up repeatedly throughout the day.

Hudson added that the identity of machines, not just users, was essential, particularly as it related to IoT security.

Herjavec, however, noted that identity management “requires a lot of care and feeding.”

Related Content:

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10100
PUBLISHED: 2019-07-16
NASA CFITSIO prior to 3.43 is affected by: Buffer Overflow. The impact is: arbitrary code execution. The component is: over 40 source code files were changed. The attack vector is: remote unauthenticated attacker. The fixed version is: 3.43.
CVE-2019-10100
PUBLISHED: 2019-07-16
BigTree-CMS commit b2eff67e45b90ca26a62e971e8f0d5d0d70f23e6 and earlier is affected by: Improper Neutralization of Script-Related HTML Tags in a Web Page. The impact is: Any Javascript code can be executed. The component is: users management page. The attack vector is: Insert payload into users' pro...
CVE-2019-10100
PUBLISHED: 2019-07-16
PluckCMS 4.7.4 and earlier is affected by: CWE-434 Unrestricted Upload of File with Dangerous Type. The impact is: get webshell. The component is: data/inc/images.php line36. The attack vector is: modify the MIME TYPE on HTTP request to upload a php file. The fixed version is: after commit 09f0ab871...
CVE-2019-13612
PUBLISHED: 2019-07-16
MDaemon Email Server 19 skips SpamAssassin checks by default for e-mail messages larger than 2 MB (and limits checks to 10 MB even with special configuration), which is arguably inconsistent with currently popular message sizes. This might interfere with risk management for malicious e-mail, if a cu...
CVE-2019-10100
PUBLISHED: 2019-07-16
Zammad GmbH Zammad 2.3.0 and earlier is affected by: Cross Site Scripting (XSS) - CWE-80. The impact is: Execute java script code on users browser. The component is: web app. The attack vector is: the victim must open a ticket. The fixed version is: 2.3.1, 2.2.2 and 2.1.3.