Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Second Look: Data Security In A Hybrid Cloud
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
xmarksthespot
50%
50%
xmarksthespot,
User Rank: Strategist
3/16/2015 | 7:11:44 PM
Re: Security matters are getting forced into forethought rather than an afterthought
The concept of 'Trust No One' (TNO) is a bulletproof security measure for cloud-based storage.  Encryption is done before uploading to the cloud and decryption after downloading.  With proper encryption, no one can crack the files.  LastPass is a password storing app in the cloud employing the concept of 'Trust No One'.  Google "Trust no one (internet security)" to read more on Wikipedia.org .

This concept only applies where the applications running are at your site.  This article may describing Platform As A Service, or Software-As-A-Service, where encryption is being done in the cloud.
Bill Kleyman
50%
50%
Bill Kleyman,
User Rank: Apprentice
3/10/2015 | 4:01:25 PM
Re: Security matters are getting forced into forethought rather than an afterthought
@Dr.T - "Once we put humans out of the security equation we can have a better chance to succeed in scurity..."


That sounds very SkyNet-ish :) We definitely want to place more automation and intelligence into the security layer. However, brilliant security and cloud professionals will always be needed. I have a very dear friend who works as a whitehat for a big security firm. He regularly tests some of the worlds most complex systems out there. In fact, he was one of the people that found a flaw in Blackberry's early OS 10 platform. He also found a backdoor hole in how AWS VM images are shared in a community. 

These guys conduct audits, assessments and much more to keep an environment up and running. For now, advanced persisten threats come from a variety of sources. Sometimes it's a set of zombie servers; and sometimes it's a person conducting a targeted attack. We still need people at the helm to defend against these threats. 
Bill Kleyman
50%
50%
Bill Kleyman,
User Rank: Apprentice
3/10/2015 | 3:56:57 PM
Re: Full adoption of Cloud is the future
@ Dr.T - I have to say, regulations are certainly changing already. Just look at my AWS example. Similarly, there will have to be a change in how security is delivered at the corporate side. Workload and VM segmentation will have to happen, internal security audits will need to become common practice, and those organizations that can quickly move into the cloud - should consider doing so.

Marilyn asked a great question earlier - How does security work better in the cloud? Well, to begin with, they treat each client as their own seperate entity. They get their own resources, their own pool of space, their own management platform and even their own set of locked down rights. What happens if there is a breach? The limited accessibility really pins down the attacker to doing very limited damage if any at all. The difference is that in the corporate world - one slip up, or one improper setting can impact an entire ecosystem. Cloud providers simply never allow their configurations to reach that point.

Their cost structure allows them to create multi-tenancy, while keeping everyone segmenter and secure -- all the while continuing to make money. Organizations with more traditional deployments sometimes miss key points where network controls and security have to be better deployed. Now, this isn't a blanket statement. There are some private organizations that take security into account similar to how the CSPs do it. But not all of them... and I have some big examples in this article already...
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/10/2015 | 3:49:05 PM
Re: Security matters are getting forced into forethought rather than an afterthought
I truly agree with it, I am also optimistic, once we implement a better authentication and authorization mechanism such as getting rid of username/password combination we would get rid of major source of security problems. Most of these breach are happing simply because they get a legitimate credential to attack.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
3/10/2015 | 3:45:02 PM
Re: Security matters are getting forced into forethought rather than an afterthought
Agree. I also like to look at the problem in a little bit simpler way, at the end of the day we want to protect the data, encrypt the data in transit and at rest and do a proper key management and at least you do not have to worry if the data is stolen it would not be compromised.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/10/2015 | 3:41:26 PM
Re: Security matters are getting forced into forethought rather than an afterthought
 

Agree, once we put humans out of security equation we can have better chance to succeed in security in cloud and everywhere else. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/10/2015 | 3:39:03 PM
Full adoption of Cloud is the future
 

Businesses can not continue to keep up with the requirements in their internal networks, they have to outsource all that at one point.  The main reason they could not do it now is because regulations are not responding today's needs. In the future those regulations will ease down, there will be less concerns on privacy and we will eventually reach more secure platforms in the cloud.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/10/2015 | 12:12:30 PM
Re: Security matters are getting forced into forethought rather than an afterthought
 Does it work in the cloud? Does it help you reduce cost? Does it help reduce complexity? Is is potentially even more secure to store in the cloud?

Isn't the more meaningful question (to cloud service providers and enterprises) : How would security work in the cloud?....etc. I wonder how many CSPs would have answers that would satisfy infosec?
Bill Kleyman
50%
50%
Bill Kleyman,
User Rank: Apprentice
3/10/2015 | 11:52:20 AM
Re: Security matters are getting forced into forethought rather than an afterthought
@Marilyn - Cloud providers maintain an ever-agile response system. Here's the thing - they built their cloud platforms around dynamic scaling capabilities and secure multi-tenancy. Basically, that's their business model. Because of this - they segment user and customer workloads really well and keep everything isolated. This means they can scale as a user needs more resources while still keeping the architecture secure.

The biggest issues are misconceptions around the cloud. Yes, there are some use-cases which just won't work in the cloud; but even those are becoming fewer. We've seen micro-breaches happen in the cloud. If you recall, we had a console breach against a company being hosted at AWS. In 2014, Code Spaces was basically taken down. But the attack was isolated, no one else was impacted and everyone else ... even on that same server ... was still secure. 

Today - organizations should look at their workloads and do some cloud analysis planning. Does it work in the cloud? Does it help you reduce cost? Does it help reduce complexity? Is is potentially even more secure to store in the cloud? I think it's time some organizations seriously ask these questions -- especially if they hesitated to do so in the past. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/10/2015 | 10:55:37 AM
Re: Security matters are getting forced into forethought rather than an afterthought
Bill, how responsive are cloud providers to enterprise's concerns about data security, and what are the biggest issues where you see cloud still falling short today.
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15208
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can ...
CVE-2020-15209
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one....
CVE-2020-15210
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and ...
CVE-2020-15211
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices f...
CVE-2020-15212
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `outpu...