Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Elizabeth White, Yeshim Deniz, Liz McMillan, Pat Romanski

Related Topics: Microsoft Cloud, Containers Expo Blog, @CloudExpo

Microsoft Cloud: Article

Is Using the Cloud Information Security Suicide for Enterprises?

Connectivity is here to stay and I hope the Sarah Palin hack helps us think about the human elements

The CTO Blog

On the face of it, the apparent hacking of Sarah Palin’s Yahoo mail account may have hurt the cloud’s onward march into enterprise credibility. By using services in the cloud to hold corporate data, as opposed to within our corporate walls, the concern is we are automatically exposing the corporate to additional risk. And it is a concern we must take seriously. But this is far from the full story. Computer hacking is as old as computers, and social engineering as old as, well, people.

With thanks to the head of enterprise architecture of one of the organizations I’m collaborating with for sharing the link, here’s a well written perspective on the hack itself. I’ve also had a couple of colleagues mention, quite rightly, that this high profile event serves as a timely reminder for us to think very carefully about the cloud’s enterprise viability.

The argument often goes that by definition a service in the cloud has ubiquitous potential access for both the authorised and the hackers alike, whereas the corporate network has restricted access (to employees) and so hacking is intrinsically harder.

The reality is somewhat different.

In fact, when you assume any real level of connectivity (and which business can afford not to be connected), the security model of the Web is intrinsically more secure than the security model pre-Web most corporates have in place today – ask your trusted security expert about application centric and moat security compared with document centric and de-perimeterisation security.

Many years ago, the best and brightest security experts figured out that, while there are many levels of security (as they went on to describe in the Orange Book), if you want the best level of security over your data, you have to put your computer in a bunker with cameras recording who uses it and whatever you do you never ever, under any circumstances, connect it to a network.

Back in the mainstream world, the technical aspects aren’t perhaps the most important factors here. The real issue is not with the cloud, it is of course with us, the ‘wetware’.

Let’s flip this around and imagine for a moment you’ve responsibility for information security for your organisation. (Go on, really try it…!)

Imagine it’s your first day in the job and you’re sat in front of a big, horizontal slider control.

It’s the security control for the corporation and it can be set to ‘default deny’ – which means no-one can do anything unless they have explicit permission signed in triplicate and approved by a corporate bureaucracy prized for its ‘beware of the leopard’ signs, or default allow which means anyone can access and share absolutely anything, and everyone is given 24 hour access to a good corporate lawyer.

The slider is set bang in the middle. On the left the label says ‘default deny’, and on the right label says ‘default allow’.

Which way do you move the slider and how far?

This is perhaps one of the toughest decisions faced by corporate and government information security policy makers - just where does security policy start on this security continuum?

What we do know is that too much technical security is as risky as too little – perhaps even more so. When corporate IT takes too much of a default deny stance, people getting on with their jobs tend to find workarounds which unwittingly weaken security.

If you’ve been following events in the UK recently, memory sticks come very much front of mind.

In the end, people tend to behave more responsibly when given more responsibility. And not connecting to the world for a business or government is a non-option. So for me, if I had my hands on the lever, we'd embrace the cloud while sliding the slider to the right. This might sound like information security suicide, but I think it’s the way go.

But wherever you’re at personally in the debate, connectivity is here to stay and I hope the Sarah Palin hack helps us think about the human elements before we get too lost in the technical mist of the cloud.

More Stories By Carl Bate

Carl Bate is Vice President & UK Chief Technology Officer, Capgemini. He contributes to The CTO blog. He is a leading contributor to Capgemini’s thought leadership in business technology and also helps facilitate Capgemini’s IT leadership community - a community of ex-CIOs, CTOs and IT Leaders who’ve personally faced the challenges of IT in business - whose goal is to provide support to executives and their leadership teams. Prior to the CTO role at Capgemini Carl ran its Technology Consulting business (TCG). Bate is co-author of the book ‘Lost in Translation’ - a 5-star rated handbook designed to offer new, practical insights to business and technology leaders seeking to make a step-change difference in addressing the ‘business/IT divide’ – www.LiThandbook.com.

Carl is a fellow of the British Computer Society and chair of its Futures Group.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, insiders, government compulsion, and network hackers? Join Ambuj Kumar (CEO, Fortanix) to discuss best practices and technologies for enterprises to securely transition to a multi-cloud hybrid world.
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right provider and with the proper expectations. In his session at 18th Cloud Expo, Christo Kutrovsky, a Principal Consultant at Pythian, compared the NoSQL and SQL offerings from AWS, Microsoft Azure and Google Cloud, their similarities, differences and use cases for each one based on client projects.
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Big Data teams at Autodesk. He is a contributing author of book on Azure and Big Data published by SAMS.
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also received the prestigious Outstanding Technical Achievement Award three times - an accomplishment befitting only the most innovative thinkers. Shankar Kalyana is among the most respected strategists in the global technology industry. As CTO, with over 32 years of IT experience, Mr. Kalyana has architected, designed, developed, and implemented custom and packaged software solutions across a vast spectrum o...