Now that weve passed the midpoint in 2020, one thing in the cybersecurity world has become crystal clear: The need for better security within public clouds must be addressed by enterprises once and for all, and that entails cryptography.
No question, enterprises large and small have realized the benefits of rapidly deployable, reasonably priced and extremely scalable public computing infrastructure. According to Forbes, the global cloud computing market will reach $411 billion this year.
But what about the security? Is it up to snuff?
Not really, even though some public cloud purveyors offer some encryption as an option and sometimes by default. This step is hardly foolproof, however, and that should come as no surprise. After all, data in the cloud is stored with a third-party provider and accessed over the internet. This means visibility and control over that dataincluding its securityis limited.
Fact is, cloud service providers treat cloud security risks as a shared responsibility. The good news is that some cloud companies allow clients to encrypt their data before sending it to the cloud, and its becoming increasingly clear that thisor possibly the additional option of adopting a few other proven, state-of-the-art fixes for cloud securityis the preferred route for truly security-conscious enterprises.
That enhanced data encryption in the cloud makes sense began circulating roughly two-and-a-half years ago, when technology and cloud giant Accenture confirmed that it inadvertently left a gigantic store of private data access across four unsecured cloud servers. This exposed highly sensitive passwords and secret decryption keys that could have inflicted considerable damage on the company and its customers.
Since then, misconfigured cloud settings have caused multiple incidents of data exposures in the Amazon Web Services cloud. In addition, a misconfiguration error in Microsofts Azure cloud exposed 250 million technical support accounts. Meanwhile, MVISION Cloud, a unit of McAfee, analyzed the encryption controls offered by more than 12,000 providers and found yet more shortcomings. While 82percent of cloud service providers encrypt data in transit between the user and the cloud service, not even 10percent of cloud providers encrypt data once its stored, MVISION found.
According to CloudPassage, a software-as-a-service purveyor that provides security for private, public and hybrid clouds, one of the worst mistakes made by public cloud companies is having easily hacked administrative credentialsessentially the keys to the kingdom. As it turns out, attackers can execute a breach with a badly configured set of privileged credentialsa common occurrence, unfortunately, when a cloud company cuts corners in a rush to market.
Other mistakes among public crowd companies include exposed data assets, weak network access control and poor event logging, which impedes efforts to detect, contain and analyze compromises in the cloud.
On the bright side, there are companies today that help enterprises adopt cloud encryption. Oneborn out of research done at MITis cybersecurity company PreVeil, whose end-to-end encryption could redefine cloud-based cybersecurity in a way that doesnt interfere with workflows while still enabling popular cloud-based machine-learning applications.
Another company with a different approach to the same end goal is Zscaler, which offers a Secure Web Gateway in the cloud via software-as-a service. No hardware is required. Zscaler decentralizes cybersecurity protection, allowing data to flow back and forth from a public cloud rather than redirecting it to clients own physical data centers.
Another form of cryptography enhances the breadth of the science by offering fresh analytical capabilities as well as securityhomomorphic encryption (HE). HE is attracting more attention from select technology companies such as IBM, Microsoft and Google, and startups such as Enveil, and slowly growing. HE makes it possible to analyze or manipulate encrypted data without revealing the data to anyone, offering huge potential in areas with sensitive personal data such as in financial services or healthcareareas in which the privacy of a person is paramount.
The biggest barrier to widespread adoption of HE is that it is still very slow and so not yet practical for many applications. Nonetheless, company researchers are working diligently to speed up the process by decreasing the required computational overhead.
Microsoft, for example, has created SEAL, a set of encryption libraries that allow computations to be performed directly on encrypted data. SEAL is partnering with companies to build end-to-end encrypted data storage and computation services. Googleanother tech giant that has moved into the fieldlast year unveiled an open-source cryptographic tool similarly focused on analyzing data in its encrypted form with only the insights derived from the analysis visible, not the underlying data itself.
An even more futuristic development that cryptography-minded folks should be aware ofalthough in this case, in a blatantly negative senseis quantum computing, based on the principles of quantum physics.
At least a decade away, ultra-fast quantum computers could perform calculations exponentially faster than classic computersin the wrong hands potentially enabling the destruction of the encryption protecting their data. Fortunately, there is also some good news on this front. The National Institute of Standards and Technology is already pushing researchers to analyze potential problems in this post-quantum era. Meanwhile, IBM has already successfully demonstrated a quantum-proof encryption method it developed.
For now, here are six security tips for companies moving to public or even multi-cloud environments and concerned about cryptography and related security disciplines.
+ Get the basics right.Establish a strategy for multi-cloud encryption and the management of cryptography keys before expanding to more advanced crypto technologies.
+ Leverage encryption as part of your broader IT security efforts.Companies that dont have effective data classification and/or a prioritization program in place tend to struggle with data encryption. Data classification policies and tools facilitate the separation of valuable information that may be targeted from less valuable information.
+ Build in crypto agility.This refers to the capacity for an information security system to adopt an alternative to the original encryption method without significant change to system infrastructure. Be ready to replace or retire your deployed cryptography as needed.
+ Ensure that only authorized users can access data.This is critical to prevent tampering by anyone inside or outside the organization. Audit access controls regularly to ensure their validity.
+ Develop robust plans for business continuity and disaster recovery of crypto keys.Inventory keys and cryptographic libraries so you can recover your data alongside your protection mechanisms.
+ Make sure your cryptography is integrated intothe DevSecOps world.Ensure that DevOps teams choose crypto libraries that follow secure coding practices.
In the final analysis, encryption is tough stuff, but extremely important in the world of security. Companies that embrace it and incorporate it properly are taking an additional big step to protect their data and their reputation in a world inundated by embarrassing, hurtful and costly cyber-breaches.
Now that cloud computing has introduced encryption widely, security-minded companies are under growing pressure to keep the ball rolling and help move on to next steps.
See the rest here:
Corporations Must Step Up to the Plate to Enhance the Security of Cloud Computing - Security Boulevard
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]