Enterprises Should Practice For Cloud Security Breaches

  /     /     /  
Publicated : 22/11/2024   Category : security


Enterprises Should Practice For Cloud Security Breaches


With cloud services collecting more data from businesses, firms should prepare for potential breaches that involve their providers



Companies are increasingly moving to cloud: Over the 18 months ending June 2013, enterprises boosted their use of cloud storage by 90 percent, resulting in 45 percent more revenue for cloud service providers, according to report released by Verizon.
Yet businesses should expect bumps ahead. Attackers will increasingly focus on finding ways to compromise companies cloud services to gain access to the valuable data stored in those online systems. From the
attempted digital coup on CloudFlares infrastructure
to breaches at businesses services such as
social network LinkedIn
and
e-mail marketing firm Epsilon Data Management
, attackers have already shown interest in illicitly accessing enterprise data in the cloud.
While the security of cloud provides is typically better than the average company, breaches will happen, experts say. And responding to an incident will likely be more complex for businesses when the response includes a cloud providers infrastructure.
The key here is to plan ahead, says Kristy Westphal, information security officer with Element Payment Services, a secure payment processing firm recently acquired by Vantiv. You need to know what is in your contract, what you can get access to, and what you are on the hook for.
At the coming Cloud Security Alliance (CSA) Congress, Westphal plans to discuss strategies for minimizing the impact of a cloud breach and smoothing incident response. As a first step, companies should begin including their cloud providers in their incident response planning, finding the appropriate contact at the firm, and discovering what resources they can expect in the event of a breach.
Companies need to know the providers contractual obligations because there is often a murky line between the cloud providers responsibilities and the customers responsibilities, says Dave Dalva, vice president in the risk consulting practice at Stroz Friedberg.
In addition, companies should be familiar with the providers technologies, such as what mechanisms the cloud firm has for logging, he says. In multitenant cloud environments, separating the logs of one client from another may be difficult. Businesses should also find out whether the provider will preserve data and hard drives for later forensics, and whether that is even possible in the cloud environment.
You need to make the lines of responsibility very clear, Dalva says.
It may be very easy, or it may be very hard, but getting an appreciation for that stuff up front will make life a lot easier in the event of a breach, he says.
[What attacks are most likely against cloud computing environments? Heres a look -- and some advice. See
How Cybercriminals Attack The Cloud
.]
Before moving to the cloud, company management should discuss incident response with the cloud provider. Executives and IT managers should ask whether the cloud service provider offers enough assurances to protect data and respond to breaches, says Dave Anderson, senior director of marketing at Voltage Security, a data-encryption provider.
Do you trust your cloud provider to securely or properly manage the data you are throwing up into the cloud? If the cloud providers are saying that we are not going to provide that level of end-to-end data protection for you, then its up to you to do it, he says.
The response will also depend on the type of cloud service that a company uses: Platform-as-a-service (PaaS) and software-as-a-service (SaaS) will differ from infrastructure-as-a-service, such as Amazon EC2, because of the number of differences between cloud providers, Elements Westphal says.
The most important step for companies is to practice incident response exercises and include the cloud provider in the session, she says. IT managers should know who the point of contact is at the cloud service provider and who is responsible for contacting cloud providers.
You need to know who the players are -- who would be involved and that they know what their roles are, so they are not trying to solve someone elses issue, Westphal says. You cant buy that kind of preparation. The more prepared you are, the better off you will be.
While cloud providers may not provide much in terms of supporting incident response activities, thats changing, says Stroz Friedbergs Dalva.
There is an opportunity for cloud providers that do do all the security stuff, and we are starting to see more effort to help clients with that, he says.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Enterprises Should Practice For Cloud Security Breaches