Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Second Look: Data Security In A Hybrid Cloud
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
xmarksthespot
50%
50%
xmarksthespot,
User Rank: Strategist
3/16/2015 | 7:11:44 PM
Re: Security matters are getting forced into forethought rather than an afterthought
The concept of 'Trust No One' (TNO) is a bulletproof security measure for cloud-based storage.  Encryption is done before uploading to the cloud and decryption after downloading.  With proper encryption, no one can crack the files.  LastPass is a password storing app in the cloud employing the concept of 'Trust No One'.  Google "Trust no one (internet security)" to read more on Wikipedia.org .

This concept only applies where the applications running are at your site.  This article may describing Platform As A Service, or Software-As-A-Service, where encryption is being done in the cloud.
Bill Kleyman
50%
50%
Bill Kleyman,
User Rank: Apprentice
3/10/2015 | 4:01:25 PM
Re: Security matters are getting forced into forethought rather than an afterthought
@Dr.T - "Once we put humans out of the security equation we can have a better chance to succeed in scurity..."


That sounds very SkyNet-ish :) We definitely want to place more automation and intelligence into the security layer. However, brilliant security and cloud professionals will always be needed. I have a very dear friend who works as a whitehat for a big security firm. He regularly tests some of the worlds most complex systems out there. In fact, he was one of the people that found a flaw in Blackberry's early OS 10 platform. He also found a backdoor hole in how AWS VM images are shared in a community. 

These guys conduct audits, assessments and much more to keep an environment up and running. For now, advanced persisten threats come from a variety of sources. Sometimes it's a set of zombie servers; and sometimes it's a person conducting a targeted attack. We still need people at the helm to defend against these threats. 
Bill Kleyman
50%
50%
Bill Kleyman,
User Rank: Apprentice
3/10/2015 | 3:56:57 PM
Re: Full adoption of Cloud is the future
@ Dr.T - I have to say, regulations are certainly changing already. Just look at my AWS example. Similarly, there will have to be a change in how security is delivered at the corporate side. Workload and VM segmentation will have to happen, internal security audits will need to become common practice, and those organizations that can quickly move into the cloud - should consider doing so.

Marilyn asked a great question earlier - How does security work better in the cloud? Well, to begin with, they treat each client as their own seperate entity. They get their own resources, their own pool of space, their own management platform and even their own set of locked down rights. What happens if there is a breach? The limited accessibility really pins down the attacker to doing very limited damage if any at all. The difference is that in the corporate world - one slip up, or one improper setting can impact an entire ecosystem. Cloud providers simply never allow their configurations to reach that point.

Their cost structure allows them to create multi-tenancy, while keeping everyone segmenter and secure -- all the while continuing to make money. Organizations with more traditional deployments sometimes miss key points where network controls and security have to be better deployed. Now, this isn't a blanket statement. There are some private organizations that take security into account similar to how the CSPs do it. But not all of them... and I have some big examples in this article already...
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/10/2015 | 3:49:05 PM
Re: Security matters are getting forced into forethought rather than an afterthought
I truly agree with it, I am also optimistic, once we implement a better authentication and authorization mechanism such as getting rid of username/password combination we would get rid of major source of security problems. Most of these breach are happing simply because they get a legitimate credential to attack.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
3/10/2015 | 3:45:02 PM
Re: Security matters are getting forced into forethought rather than an afterthought
Agree. I also like to look at the problem in a little bit simpler way, at the end of the day we want to protect the data, encrypt the data in transit and at rest and do a proper key management and at least you do not have to worry if the data is stolen it would not be compromised.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/10/2015 | 3:41:26 PM
Re: Security matters are getting forced into forethought rather than an afterthought
 

Agree, once we put humans out of security equation we can have better chance to succeed in security in cloud and everywhere else. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/10/2015 | 3:39:03 PM
Full adoption of Cloud is the future
 

Businesses can not continue to keep up with the requirements in their internal networks, they have to outsource all that at one point.  The main reason they could not do it now is because regulations are not responding today's needs. In the future those regulations will ease down, there will be less concerns on privacy and we will eventually reach more secure platforms in the cloud.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/10/2015 | 12:12:30 PM
Re: Security matters are getting forced into forethought rather than an afterthought
 Does it work in the cloud? Does it help you reduce cost? Does it help reduce complexity? Is is potentially even more secure to store in the cloud?

Isn't the more meaningful question (to cloud service providers and enterprises) : How would security work in the cloud?....etc. I wonder how many CSPs would have answers that would satisfy infosec?
Bill Kleyman
50%
50%
Bill Kleyman,
User Rank: Apprentice
3/10/2015 | 11:52:20 AM
Re: Security matters are getting forced into forethought rather than an afterthought
@Marilyn - Cloud providers maintain an ever-agile response system. Here's the thing - they built their cloud platforms around dynamic scaling capabilities and secure multi-tenancy. Basically, that's their business model. Because of this - they segment user and customer workloads really well and keep everything isolated. This means they can scale as a user needs more resources while still keeping the architecture secure.

The biggest issues are misconceptions around the cloud. Yes, there are some use-cases which just won't work in the cloud; but even those are becoming fewer. We've seen micro-breaches happen in the cloud. If you recall, we had a console breach against a company being hosted at AWS. In 2014, Code Spaces was basically taken down. But the attack was isolated, no one else was impacted and everyone else ... even on that same server ... was still secure. 

Today - organizations should look at their workloads and do some cloud analysis planning. Does it work in the cloud? Does it help you reduce cost? Does it help reduce complexity? Is is potentially even more secure to store in the cloud? I think it's time some organizations seriously ask these questions -- especially if they hesitated to do so in the past. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/10/2015 | 10:55:37 AM
Re: Security matters are getting forced into forethought rather than an afterthought
Bill, how responsive are cloud providers to enterprise's concerns about data security, and what are the biggest issues where you see cloud still falling short today.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-33033
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
CVE-2021-33034
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
CVE-2019-25044
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.
CVE-2020-24119
PUBLISHED: 2021-05-14
A heap buffer overflow read was discovered in upx 4.0.0, because the check in p_lx_elf.cpp is not perfect.
CVE-2020-27833
PUBLISHED: 2021-05-14
A Zip Slip vulnerability was found in the oc binary in openshift-clients where an arbitrary file write is achieved by using a specially crafted raw container image (.tar file) which contains symbolic links. The vulnerability is limited to the command `oc image extract`. If a symbolic link is first c...