Click here to close now.

Welcome!

Search Authors: Yeshim Deniz, Elizabeth White, Liz McMillan, AppDynamics Blog, Plutora Blog

Blog Feed Post

Top 5 Best Practices for Cloud Security

cloud security best practices Cloud Security Cloud Encryption  security daily Top 5 Best Practices for Cloud SecurityCloud computing security issues are constantly a top concern for IT leaders migrating to the cloud. There are many issues related to data security in the cloud and more than one approach to cloud security. Focusing on Infrastructure as a Service cloud security, there are five issues that repeatedly concern customers that are resolved by implementing the best practices discussed at a high level below. Cloud security best practices are technology related, but also focuses on P3: Process, People, Products.

1.     Choose your cloud wisely


Infrastructure clouds come in many variations. Some are big (like Amazon Web Services, Microsoft Azure, Google, or HP) and some are smaller but more focused on specific needs such as addressing compliance (Firehost and Layered Technologies are two examples, but there are many more).

A cross-platform concern in every Infrastructure as a Service (IaaS) deployment is that data security is a shared responsibility. When shortlisting cloud providers, make sure specific certification such as ISO 27001 or SOC3 are in place. If you have specific regulatory concerns such as HIPAA safe harbor or PCI DSS compliance, ensure your cloud provider can support these specific requirements. Ask to speak with customers with a similar use case and similar size (or bigger). Learn from their lessons and make a decision accordingly.

2.     Encrypt your data

As we’ve written before, encryption becomes your virtual walls in a cloud deployment. In your datacenter, your physical servers are protected by the 4 walls and the tight access security policy. In a shared cloud infrastructure, those measures are basically nonexistent.

This is where data encryption steps in. Data encryption allows you to segregate and isolate your environment from other companies (or adversaries) running on the same infrastructure. Data encryption in the cloud takes multiple forms: some more secure than others.

Freeware encryption tools might seem attractive at first, but they have two major issues:

  1. They don’t scale well
  2. In many cases, the encryption key is stored on the virtual disk along with the encrypted data, which renders the entire solution useless.

In a compliance use case, these drawbacks might pose serious issues.

Research and test more than one encryption solution, and learn carefully about the security posture of the encryption provider.

3.     Focus on encryption keys

Although it sounds strange at first, cloud encryption can be easily achieved. The challenge lies=s not with the actual encryption, but with the encryption keys.

The Heartbleed bug, discovered a few weeks ago, exposed a weakness in Open SSL’s SSL/TLS protocol, allowing anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. As a result, many encrypted servers in the cloud unknowingly exposed their encryption key, which resided in memory of a server impacted by heartbleed.

To mitigate with such sophisticated attack vectors, the encryption keys should be secured throughout their life cycle: while in the key management system and while in use in the cloud. Emerging technologies such as split-key encryption and homomorphic key management can be used to avoid such attacks.

When researching encryption and key management technologies, look for cloud-enabled innovative technologies, and verify how encryption keys are managed and secure throughout the life cycle of the key usage.

4.     Automate cloud security as much as possible

One of the clouds’ most important benefits is its ability to automatically scale an infrastructure environment up or down, in a single geography or across multiple geographies. When it comes to cloud security, the paradigm shifts. You’ll hear experts telling you about the need to “keep security under your control,” and that security automation means sacrificing trust.

While true for traditional security systems, new – cloud based – security solutions do enable automation using secure, RESTful API tools.

Automating data security actually reduces risk and configuration mistakes. Assuming the software vendor can prove automation is done securely, it is a best practice for IaaS cloud security.

5.     Train your employees

Implementing the latest and greatest security toys is fun. Training employees may not seem as exciting. Yet, in many cases, a trained employee will be more efficient in stopping an attack than most technologies. (Art Gilliland gave a great pitch on “defense in depth” during RSA 2014 – see the video here).

A common modern attack pattern would start by identifying and infiltrating privileged users’ accounts (such as database administrator, or system administrators), and once access is gained, getting to end user data stored on those databases becomes a much simpler task for the attacker.

By educating users on risks and security best practices, the access of the attacker can be avoided. In addition, the cloud brings additional potential attack vectors, such as disk snapshots, or identity theft to the online portal, managing all servers. When training employees, always keep cloud in mind, together with your business tools and processes.

Cloud Security Best Practices Lead to Successful Deployments
There are many considerations surrounding cloud security. These best practices do not eliminate the risks or remove the need to always be kept abreast of the latest development. They do, however, ensure that your cloud will be more secure and enable you to comply with laws and industry regulations while taking advantage of the many business benefits of the cloud. Much of this, when explored from such a high level seems like common sense, and yet, the news is filled with stories of companies large and small who failed to properly manage their encryption keys or permitted their employees or vendors to enable access by attackers (a la recent breaches at Ebay and Target). Implementing these best practices will ensure that yours isn’t listed among the news-making breaches.

cloud security best practices Cloud Security Cloud Encryption  333333 Top 5 Best Practices for Cloud Security

The post Top 5 Best Practices for Cloud Security appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

@ThingsExpo Stories
SYS-CON Events announced today that GENBAND, a leading developer of real time communications software solutions, has been named “Silver Sponsor” of SYS-CON's WebRTC Summit, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. The GENBAND team will be on hand to demonstrate their newest product, Kandy. Kandy is a communications Platform-as-a-Service (PaaS) that enables companies to seamlessly integrate more human communications into their Web and mobile applications - creating more engaging experiences for their customers and boosting collaboration and productiv...
SYS-CON Events announced today that BroadSoft, the leading global provider of Unified Communications and Collaboration (UCC) services to operators worldwide, has been named “Gold Sponsor” of SYS-CON's WebRTC Summit, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. BroadSoft is the leading provider of software and services that enable mobile, fixed-line and cable service providers to offer Unified Communications over their Internet Protocol networks. The Company’s core communications platform enables the delivery of a range of enterprise and consumer calling...
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal today!
So I guess we’ve officially entered a new era of lean and mean. I say this with the announcement of Ubuntu Snappy Core, “designed for lightweight cloud container hosts running Docker and for smart devices,” according to Canonical. “Snappy Ubuntu Core is the smallest Ubuntu available, designed for security and efficiency in devices or on the cloud.” This first version of Snappy Ubuntu Core features secure app containment and Docker 1.6 (1.5 in main release), is available on public clouds, and for ARM and x86 devices on several IoT boards. It’s a Trend! This announcement comes just as...
What exactly is a cognitive application? In her session at 16th Cloud Expo, Ashley Hathaway, Product Manager at IBM Watson, will look at the services being offered by the IBM Watson Developer Cloud and what that means for developers and Big Data. She'll explore how IBM Watson and its partnerships will continue to grow and help define what it means to be a cognitive service, as well as take a look at the offerings on Bluemix. She will also check out how Watson and the Alchemy API team up to offer disruptive APIs to developers.
The IoT Bootcamp is coming to Cloud Expo | @ThingsExpo on June 9-10 at the Javits Center in New York. Instructor. Registration is now available at http://iotbootcamp.sys-con.com/ Instructor Janakiram MSV previously taught the famously successful Multi-Cloud Bootcamp at Cloud Expo | @ThingsExpo in November in Santa Clara. Now he is expanding the focus to Janakiram is the founder and CTO of Get Cloud Ready Consulting, a niche Cloud Migration and Cloud Operations firm that recently got acquired by Aditi Technologies. He is a Microsoft Regional Director for Hyderabad, India, and one of the f...
In 2015, 4.9 billion connected "things" will be in use. By 2020, Gartner forecasts this amount to be 25 billion, a 410 percent increase in just five years. How will businesses handle this rapid growth of data? Hadoop will continue to improve its technology to meet business demands, by enabling businesses to access/analyze data in real time, when and where they need it. Cloudera's Chief Technologist, Eli Collins, will discuss how Big Data is keeping up with today's data demands and how in the future, data and analytics will be pervasive, embedded into every workflow, application and infra...
As Marc Andreessen says software is eating the world. Everything is rapidly moving toward being software-defined – from our phones and cars through our washing machines to the datacenter. However, there are larger challenges when implementing software defined on a larger scale - when building software defined infrastructure. In his session at 16th Cloud Expo, Boyan Ivanov, CEO of StorPool, will provide some practical insights on what, how and why when implementing "software-defined" in the datacenter.
SYS-CON Media announced today that @ThingsExpo Blog launched with 7,788 original stories. @ThingsExpo Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @ThingsExpo Blog can be bookmarked. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago.
The world's leading Cloud event, Cloud Expo has launched Microservices Journal on the SYS-CON.com portal, featuring over 19,000 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. Microservices Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Follow new article posts on Twitter at @MicroservicesE
SYS-CON Events announced today that robomq.io will exhibit at SYS-CON's @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. robomq.io is an interoperable and composable platform that connects any device to any application. It helps systems integrators and the solution providers build new and innovative products and service for industries requiring monitoring or intelligence from devices and sensors.
Wearable technology was dominant at this year’s International Consumer Electronics Show (CES) , and MWC was no exception to this trend. New versions of favorites, such as the Samsung Gear (three new products were released: the Gear 2, the Gear 2 Neo and the Gear Fit), shared the limelight with new wearables like Pebble Time Steel (the new premium version of the company’s previously released smartwatch) and the LG Watch Urbane. The most dramatic difference at MWC was an emphasis on presenting wearables as fashion accessories and moving away from the original clunky technology associated with t...
SYS-CON Events announced today that Litmus Automation will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Litmus Automation’s vision is to provide a solution for companies that are in a rush to embrace the disruptive Internet of Things technology and leverage it for real business challenges. Litmus Automation simplifies the complexity of connected devices applications with Loop, a secure and scalable cloud platform.
SYS-CON Events announced today that Vicom Computer Services, Inc., a provider of technology and service solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. They are located at booth #427. Vicom Computer Services, Inc. is a progressive leader in the technology industry for over 30 years. Headquartered in the NY Metropolitan area. Vicom provides products and services based on today’s requirements around Unified Networks, Cloud Computing strategies, Virtualization around Software defined Data Ce...
SYS-CON Events announced today the IoT Bootcamp – Jumpstart Your IoT Strategy, being held June 9–10, 2015, in conjunction with 16th Cloud Expo and Internet of @ThingsExpo at the Javits Center in New York City. This is your chance to jumpstart your IoT strategy. Combined with real-world scenarios and use cases, the IoT Bootcamp is not just based on presentations but includes hands-on demos and walkthroughs. We will introduce you to a variety of Do-It-Yourself IoT platforms including Arduino, Raspberry Pi, BeagleBone, Spark and Intel Edison. You will also get an overview of cloud technologies s...
The only place to be June 9-11 is Cloud Expo & @ThingsExpo 2015 East at the Javits Center in New York City. Join us there as delegates from all over the world come to listen to and engage with speakers & sponsors from the leading Cloud Computing, IoT & Big Data companies. Cloud Expo & @ThingsExpo are the leading events covering the booming market of Cloud Computing, IoT & Big Data for the enterprise. Speakers from all over the world will be hand-picked for their ability to explore the economic strategies that utility/cloud computing provides. Whether public, private, or in a hybrid form, clo...
WebRTC is an up-and-coming standard that enables real-time voice and video to be directly embedded into browsers making the browser a primary user interface for communications and collaboration. WebRTC runs in a number of browsers today and is currently supported in over a billion installed browsers globally, across a range of platform OS and devices. Today, organizations that choose to deploy WebRTC applications and use a host machine that supports audio through USB or Bluetooth can use Plantronics products to connect and transit or receive the audio associated with the WebRTC session.
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of robomq.io, and Fred Yatzeck, principal architect leading product development at robomq.io, will discuss how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at the same time reduce Time to Market (TTM) by using plug and play capabilities offered by a robust I...
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what the future may hold. Mike Kavis is Vice President & Principal Cloud Architect at Cloud Technology Pa...
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this case) takes into account the number and quality of contextual references that a user receives.