Welcome!

@CloudExpo Authors: Liz McMillan, Jason Bloomberg, Zakia Bouachraoui, Yeshim Deniz, Pat Romanski

Related Topics: @CloudExpo, Microservices Expo, Microsoft Cloud, Cloud Security, @DXWorldExpo, SDN Journal

@CloudExpo: Blog Feed Post

Five Cloud Encryption Tips

Encryption is one of the strongest security measures & its price-performance has become very attractive with the advent of cloud

A day doesn’t go by when we don’t hear about sensitive information being exposed or stolen. The culprits could be the government, professional hackers, careless employees with data on mobile devices, or internal employees with unauthorized access to data or unintentional release of data. It seems the wave of data breaches has gained momentum as data has moved from internal servers to the cloud; and access has gone mobile. Though the fact remains that there will be gaps in security, the goal of companies and IT departments should be to make those gaps as small and as difficult to take advantage of as possible.

Encryption has always been viewed as one of the strongest security measures, and its price-performance has become very attractive with the advent of cloud computing. This is because encryption is by far the best way to replace physical walls in the cloud.

Here are our top five cloud encryption tips (and we know a thing or two about encryption) to help protect your data:

1. Consider Encryption at rest, in use and in transit.
Data can be exposed when it is at rest in the cloud, on a virtual disk, in a cloud database, or in object storage. Eavesdropping may occur when data is being transmitted, perhaps from a user’s browser to your servers in the cloud, or between your cloud servers. Really nasty hackers may even try to gain access to your “root account” in a cloud server and look at the memory of your server while the data is being used and computation is going on. You should be aware of all these possibilities and choose solutions that address all of these risks.

2. Review your cloud encryption options and pick the strongest
Implementing encryption properly is tricky, and your best bet is to use a solution from the experts. Take a look at the encryption solutions available for your choice of cloud. Encryption is available for both private and public clouds – check the Amazon Marketplace, the VMware VSX, or whatever is appropriate for the cloud you are using. Whichever path you take, make sure the strongest encryption standards are used and regularly reviewed.

3. Define security responsibility
Many compliance regulations (like PCI and HIPAA) require data encryption at multiple touch points. That means it’s no longer the other guy’s (customer, provider, vendor, or all) problem, but yours. A full 39% of responses from the Ponemon Institute study hoped that if their cloud data was compromised the cloud provider would alert them – but actually it may be their own responsibility. More chillingly – yet realistically:42% said they wouldn’t know if their cloud server was hacked.

Taking responsibility for your data involves many precautions. Encryption in the cloud is one of the most important precautions, especially if you make sure to keep ownership of the encryption keys to yourself. As long as you own your encryption keys, you retain control of your data, even if bad things may happen.

4. Encrypt Encrypt 000000000 45 6E 63 72 79 70 74
Let’s just say that you’ve hardened the server from external hackers and they can’t access your data. That’s great! But, wait, what about internal employees?

What’s that you say? They are all trustworthy? Really? I bet that’s what Snowden’s boss thought too.

Trusting your employees is fine but it is best to be prepared for the worst, just in case. Choose STRONG encryption for your data to protect it from internal and external attacks, breaches, and theft. Only grant access to those who need it. Train them on how to deal with encrypted data, how to access it, where they can access it from, and have them follow the security procedures. Don’t forget to encrypt backups and snapshots. Encryption is especially great for maintaining control of multiple copies and backups – deleting the key for that particular data has the same effect as deleting all the copies, no matter where they have strayed.

5. Protect your keys
To give one key to the security vendor or cloud provider is to provide attackers one target to compromise. Strengthen your key security by using the strongest encryption key technology available, homomorphic key management. The technology provides two keys with an encrypted master given to the application/data owner, which stays encrypted while in-use. Even if the encrypted master is stolen the data still won’t be accessible.

Protecting your and your customer’s data is a part of doing business. Doing it wrong can hurt business and the bottom line. Put real procedures in place to protect the data and in-turn, the business. Preparing for the worst never seems necessary until it is necessary. After all, you don’t want to find out about a data breach to your data on the nightly news. Prepare and protect.

To find out more about cloud encryption tips and a white paper on key management click here.

The post 5 Cloud Encryption Tips appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

CloudEXPO Stories
Mike is managing director in Deloitte Consulting LLP's Cloud practice, responsible for helping clients implement cloud strategy and architecture to drive digital transformation. Beyond his technology experience, Mike brings an insightful understanding of how to address the organizational change, process improvement, and talent management challenges associated with digital transformation. Mike brings more than 30 years of experience in software development and architecture to his role. Most recently, he was a principal architect with Cloud Technology Partners. A pioneer in cloud computing, Mike led a team that built the world's first high-speed transaction network in Amazon's public cloud and won the 2010 AWS Global Startup Challenge. He has written extensively about cloud technologies and the Internet of Things.
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Get started on automating your way to a brighter future!
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next-gen applications and how to address the challenges of building applications that harness all data types and sources.
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed by some of the world's largest financial institutions. The company develops and applies innovative machine-learning technologies to big data to predict financial, economic, and world events. The team is a group of passionate technologists, mathematicians, data scientists and programmers in Silicon Valley with over 100 patents to their names. Big Data Federation was incorporated in 2015 and is ...