14
THOUGHTS FROM THE CLOUD A selection of Cloud-Security Articles from the CloudAccess Blog Vol2 AUTHOR’S NOTE “Thoughts from the Cloud” is a weekly blog written by Kevin Nikkhoo, CEO of CloudAccess. It looks to discuss, dissect and debate the many pressing issues surrounding cloud computing with a special focus on cloud-based security and security-as-a-service. You can read all the blog entries at: http://cloudaccesssecurity.wordpress.com/ In this Volume you will find: Storming the Castle A Job for Man or Machine Shooting from the HIPAA: Compliance in the Cloud The Challenge of BYOD If a tree falls in your network, does anybody hear? STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than you might be able to otherwise afford. But let’s look beyond the cost factor for a moment and analyze a true best practice that gives an organization a true advantage within the cloud and an overall strategic deployment of security resources. And to look at the future of security configuration we have to look back 500 years into the mists of history to see a model that worked well Presented by: CloudAccess: CloudAccess provides comprehensive security-as-a-service from the cloud. Our suite of robust and scalable solutions eliminates the challenges of deploying enterprise-class security solutions including costs, risks, resources, time-to-market, and administration. By providing such integral services as SIEM, Identity Management, Log Management, Single Sign On, Web SSO, Access Management, Cloud Access offers cost- effective, high-performance solutions controlled and managed from the cloud that meet compliance requirements, diverse business needs and ensure the necessary protection of IT assets. www.CloudAccess.com 877-550-2568 CloudAccess, Inc 12121 Wilshire Blvd Suite 1111 Los Angeles, CA 90025

THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

THOUGHTS FROM THE CLOUD A selection of Cloud-Security Articles from the CloudAccess Blog Vol2

AUTHOR’S NOTE

“Thoughts from the Cloud” is a weekly blog written by Kevin Nikkhoo, CEO of

CloudAccess. It looks to discuss, dissect and debate the many pressing issues

surrounding cloud computing with a special focus on cloud-based security

and security-as-a-service. You can read all the blog entries at:

http://cloudaccesssecurity.wordpress.com/

In this Volume you will find:

Storming the Castle

A Job for Man or Machine

Shooting from the HIPAA: Compliance in the Cloud

The Challenge of BYOD

If a tree falls in your network, does anybody hear?

STORMING THE CASTLE

One of the true benefits of the cloud is

the ability to reconfigure and create a

stronger, more active asset protection

strategy than you might be able to

otherwise afford. But let’s look beyond

the cost factor for a moment and

analyze a true best practice that gives an organization a true advantage

within the cloud and an overall strategic deployment of security resources.

And to look at the future of security configuration we have to look back

500 years into the mists of history to see a model that worked well

Presented by:

CloudAccess:

CloudAccess provides comprehensive

security-as-a-service from the

cloud. Our suite of robust and scalable

solutions eliminates the challenges of

deploying enterprise-class security

solutions including costs, risks,

resources, time-to-market, and

administration. By providing such

integral services as SIEM, Identity

Management, Log Management, Single

Sign On, Web SSO, Access

Management, Cloud Access offers cost-

effective, high-performance

solutions controlled and managed from

the cloud that meet compliance

requirements, diverse business needs

and ensure the necessary protection of

IT assets.

www.CloudAccess.com

877-550-2568

CloudAccess, Inc 12121 Wilshire Blvd

Suite 1111 Los Angeles, CA 90025

Page 2: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

www.CloudAccess.com

CLOUDACCESS 877-550-2568 www.cloudaccess.com

SECURITY FROM THE CLOUD:

then…and works just as well today. I’m talking specifically of the castle. In

terms of a current strategic deployment let’s call it the layered prevention

model. In its day the castle was a state of the art defense strategy. In the

center you have the king (and the king’s most precious possessions).

Surrounding the king are his elite and trusted guards armed and armored.

Beyond the guards there are a variety of buildings in which the ministers

and other important assets are stored. Go a bit further and you have the

castle walls. In fact, some of the greatest medieval castles had an inner wall

(called a curtain wall) to ensure if the perimeter is breached, there was

another strong line of defense. Now along the tall, imposing and

impregnable walls, archers line the battlements and parapets scanning the

horizon for any intruders. More guards protect the gate monitoring

everyone coming in. Beyond the castle wall, there is typically a moat

containing nasty beasts ready to chomp on a leg of anyone trying to bypass

the drawbridge and sneak across. Now in the medieval world, protection

extended beyond the castle. There were miles and miles of land surrounding

the castle held by vassals promising fealty and soldiers to the king.

Pretty imposing, right? These castles created multiple layers of defense and

kept themselves safe from attack. And it is also the best strategy to protect

your IT environment.

Ah, you say, there are always castles being attacked and overrun despite

these impressive defenses. But like any defensive strategy, you are only as

safe as your weakest link. If endpoints are left exposed, (a guard sleeping

on duty, a blight kills the man-eating fish in you moat, the slighted and

scurrilous minister gives a key to an assassin) the castle can fall. There is no

perfect system, but if you are not vigilant and are not watching every flank,

even the most layered defense is helpless. And the smartest of enemies is

not looking to knock on the front door, they are going to find and exploit

the entrance not being watched.

If you equate anti-virus software to your archers and your firewall to one

castle wall, there are still too many endpoints exposed to consider your

situation secure. What about log monitoring? What about SIEM, SSO and

other access management strategies, identity management? These are the

tools that build the double walls, arm the soldiers, lock the jewels in the

sub-dungeon.

SECURITY IN THE CLOUD

VERSUS SECURITY FROM THE

CLOUD…

Security IN the cloud frames the

overarching issue. It is the problems

often discussed by IT professionals

today. They range from questions

about the safety of data held within a

virtualized environment to that of

cyber hactivism or why do my users

keep insisting on using their

smartphones to access the network?

Security FROM the cloud is the

means to protect IT assets without

having the heavy investments in

servers, software and a variety of

other related costs. For some it is the

holistic application of best practices,

real time visibility and best of breed

solutions. “From” the cloud is

providing a scalable layer of security

that was typically reserved for trillion

dollar companies easily deployed for

any company of any size .Security

FROM the cloud answers the

questions posed by security IN the

cloud.

Page 3: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

www.CloudAccess.com

CLOUDACCESS 877-550-2568 www.cloudaccess.com

SECURITY FROM THE CLOUD:

There are many organizations out there that only build a single perimeter

and hope it is sufficient. In today’s corporate world, that is simply not

enough. It would be the equivalent of having the king sitting in the middle

of a little wooden cottage all by himself.

But there’s a cost to all these layers; in terms of solutions, licenses,

resources and the manpower to truly monitor and guard the castle gates.

Many companies need to sacrifice portions of security based on their

perceived risk assessments. And that’s where the cloud comes in!

Security-as-a-service allows companies with more modest budgets and/or

limited in-house resources to add layers of protection without adding

equivalent in-house costs. But more importantly, it provides a 24/7 layer

of monitoring, correlating, alerting escalating and remediating. It not only

scans the horizon watching for the horde of enemies, but more importantly

monitors the back door where the serfs deliver the wheat. It allows you to

add any combination of SIEM, SSO, log management , identity

management depending on the need. There are so many intrusions from

so many different corners of the network in so many different guises that it

is highly unlikely one person or even one department could spot them

unless these being specifically looked for. And if found, would it be

recognized as friend or foe? If all of a sudden a MAC address, does anyone

notice or know why it changed? It could be harmless, but it could also be

symptomatic of a larger issue. If a dormant network account suddenly gets

repeated pings at 2:30am, is it a problem? Cloud-based security gives you

enterprise-class tools and expertise to cover these bases and better

understand the flow of data in and out of your network. And it gives you

the bandwidth to deal directly with only the issues that truly pose threats

to your network.

Bottom line is that cloud-managed security allows you the freedom to run

the kingdom because you know that the all the nooks and crannies of the

castle are being watched and protected. So, when you think of the cloud,

don’t think of a vaporous mass that ruins sunny days, but a complex of

layers that can help support and drive a strong security initiative.

REACT: A UNIFIED SECURITY

PLATFORM…

REACT or Realtime Event and Access

Correlation Technology is a unified

security strategy that leverages the

cooperative functionality of key

toolsets and/or deployed solutions. It

creates a unique holistic approach to

security management and asset

protection by broadening the reach

and scope of enterprise monitoring,

strengthening access authentication

and centralizing control.

As part of the Unified Security

(UniSec) category, REACT enhances

and promotes 360o enterprise

visibility into an enterprise to see

who is doing what, when and where

to any part of the monitored IT

landscape. The key is that the data is

continuously monitored and

correlates in real time. This allows for

a higher, more responsive degree of

proactivity through security

administration and faster reactivity

to any actionable event. And as a

collective and comprehensive

forensic analytic, REACT provides the

level of automated reporting

(combining SIEM and Identity/Access

Management activity) required by

compliance agencies (HIPAA, PCI,

FFIEC, CIP, GLBA, etc…) as well as

internal proactive defense planning.

Page 4: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

www.CloudAccess.com

CLOUDACCESS 877-550-2568 www.cloudaccess.com

SECURITY FROM THE CLOUD:

A JOB FOR MAN OR MACHINE?

A Chief Technology Officer for a Midwest banking

holding company made a very interesting

observation earlier this week. In commenting about

the needed increase in fraud fighting resources, he

warned about the perils of overemphasizing

technology while ignoring training staff in using

manual fraud-detection processes.

Most of what he says is spot on in terms of ensuring the proper

prioritization, risk analysis and the blind reliance on technology to identify

and neutralize threats and breaches. In fact, as an officer in a technology

company, I happen to agree with him on almost everything he said.

He also noted that to prevent fraud, financial institutions need to go beyond

adopting the latest technologies and ensure they have trained staff to

identify fraud, such as by reviewing reports or spotting unusual activity

This is exactly the type of engagement I have been preaching for several

years. Now the key is how to cost effectively apply those resources, train

those departments in the latest detection protocols and remediation,

implement new layers of detection and correlation. Even for the largest

corporation, this has the earmarks of an expensive (but obviously

important) initiative. And I am certain the answer can be found (yes, you

guessed it) in the cloud.

It wasn’t too long ago that financial institutions were extraordinarily

skittish about capital expenditures. Yes, the belts have loosened just a bit,

but if an organization can find an equivalent alternative that saves 50% of

the costs, it would be in their best interests to investigate a bit deeper.

But here is the case for the cloud in this situation. This article did not say

anything about hiring additional help (with the incurred costs of hiring,

training, ramping, salary and benefits), it posited that the staffs need to

implement a protocol that included more manual review and action. I ask,

with what time? There are only still 24 hours in a day, only so many balls a

talented IT professional can keep in the air (especially considering the

resources needed for banking compliance including the new FFIEC

DOES SINGLE SIGN ON

IMPROVE OPERATIONS?

In a recent brand-agnostic survey by

the independent research firm

Ponemon Instituteregarding the

benefits and efficiencies of single

sign, the question was asked whether

SSO improved operations and in

what ways:

88% of surveyed CTOs believe SSO

improves the efficiency of

operations

82% note that access to key business

applications is improved

73% believe it improves the

effectiveness of administrative

activities (including help desk)

71% record that it improves

adoption of new applications and

technologies

More than 14.5 minutes per day are

saved by EACH user because of SSO

The bottom line is that SSO it

increases employee productivity,

reduces helpdesk calls, and

strengthens security.

Page 5: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

www.CloudAccess.com

CLOUDACCESS 877-550-2568 www.cloudaccess.com

SECURITY FROM THE CLOUD:

guidelines!) and most notably there is no such thing as 110%. IT

professionals, especially in the banking forum, are already being asked to

wear many hats. And the pressures to adapt to new complex guidelines,

threats and initiatives will only grow over time. So with what bandwidth

will this additional vigilance arise? Or more likely, what new vulnerability

gaps will occur because focus is diverted or further fragmented?

Make no mistake; I am still saying that the best way to combat fraud is more

manual oversight of the security environment. But, you can only ask so much

out of a staff without adding more human resources at the problem.

HOWEVER, the cloud allows you to use ready trained expert analysts to

monitor, review, escalate and remediate various channels in real time while

your on-premise staff attends to more significant priorities. The best part is

that this security initiative can usually be deployed at half the cost of doing

the same thing in-house. You not only gain the benefit of the latest

technologies, updates and advances of enterprise-class security solutions

(SIEM, Log Management, Identity and Access Management, SSO, etc…), but

you get the intellectual resources working on your specific needs…AND there

is no huge sea change (or additional architecture investment) because with

security-as-a-service, you can pick and choose which solution works for your

situation thereby leveraging your existing infrastructure.

"Technology has to evolve as the threats evolve, and technology will

always have to follow the evolution of those risks, because we don't know

what to expect next," the CTO said.

The idea that security-as-a-service is only a “set-it-and-forget-it”

automated gap-filler is selling the concept completely short. Just like all

technologies it provides a great deal of powerful automation options, but

cloud-security is considerably more that its technology; it is the integration

of additional manpower and cutting edge knowledge provided by virtual

team of professionals.

When considering cloud-managed security (public, private or hybrid), it is

important to look past the cost savings, the zero-day deployment and the

other general benefits of a SaaS-like solution, but look at the gained

expertise, the increased resources, the best-of-breed technologies, and

most important, the ability to evolve with the constantly changing

landscape of your security needs.

WHEN CONSIDERING AN IAM

STRATEGY, YOU MUST

CONSIDER…

• The risks associated with IAM and how they are addressed.

• The needs of the organization.

• How to start looking at IAM within the organization and what an effective IAM process looks like.

• The process for identifying users and the number of users present within the organization.

• The process for authenticating users.

• The access permissions that are granted to users.

• Whether users are inappropriately accessing IT resources.

• The process for tracking and

recording user activity.

Page 6: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

www.CloudAccess.com

CLOUDACCESS 877-550-2568 www.cloudaccess.com

SECURITY FROM THE CLOUD:

SHOOTING FROM THE HIPAA: COMPLIANCE IN THE CLOUD

As an IT professional, what visuals are

conjured when you hear the phrase

“HIPAA compliance;” Is it Sisyphus

having to push a heavy boulder up a

mountain only to have it roll back down?

Is it some hapless character from a Kafka

novel caught in some endless

bureaucratic labyrinth of requirements? Or is it just a giant hippopotamus

sitting on your lap?

Compliance is the necessary evil of any IT strategy. It has the best of

intentions, and in many cases, it ensures the right steps are followed to

protect sensitive data like patient records. However, that doesn’t mean the

multiple levels of auditing and reporting isn’t a drain on resources. And it

doesn’t mean approving wheel recreation just to satisfy one area of

administration.

Even HIPAA says it can be complex: “While the general concept of HIPAA

Compliance is very simple—protecting the privacy of each individual—

creating standard operating procedures that follow HIPAA requirements

can be rather complex and implementation of compliance procedures can

vary greatly from one covered entity to the next depending on the type of

business conducted at each entity.”

But the issue of whether or not to comply is moot. In fact we know that

you are dedicated to ensuring the privacy of patient records (PHI) and to

safeguard the integrity of your enterprise’s IT assets. The issue is how to

best comply. And with all the drags on your time and resources, the cloud

makes a sensible case to support the compliance efforts of the enterprise.

I’m not going to cover generalities such as what is required and what is a

covered entity... I figure you already know that. Let’s spend time on how

the cloud can make compliance a lesser burden while ensuring the privacy

of patients, customers, their transactions and personal data.

For this entry, let’s focus only on the technical assets (not the

administrative or physical control policies and procedures). In that respect,

THREAT VERSUS RISK…

In its simplest of terms, risk the probability or frequency of doing harm while threat is the actual or attempted infliction of that harm. Splitting hairs? It’s all about keeping your IT assets protected, right?

Although related, they are two different beasts altogether. Risk includes variables. It overviews vulnerabilities, weighs challenges and opportunities to come up with an outcome. And there is risk in every action you take; some of it is so low that it poses no challenge to your architectures.

And if you add “vulnerability” into the mix it creates a third dimension when assessing risk--vulnerability is a state of being--a weakness or gap in your security. A threat can exploit (intentionally or unintentionally) a vulnerability that is determined by a risk assessment.. Then of course you add likelihood. How realistic is this event to actually happen?

Page 7: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

www.CloudAccess.com

CLOUDACCESS 877-550-2568 www.cloudaccess.com

SECURITY FROM THE CLOUD:

HIPAA focuses on three areas: Access Control, Audit Control and

Transmission Security.

The greatest benefit of managing identity and access from the cloud is the

ease of administration of EPHI (Electronic Protected Health Information).

And with HIPAA, this means sharing and securing information with other

user repositories (such as referral networks, insurance, payment

processors and the patients/customers) as well as maintaining safeguards

across various applications, devices and systems. In most cases in the

health industry security breaches comes from roles and their cross

hierarchical access. Valid users usually get access to data that shouldn’t

and that just opens the door for data leakage. The key the cloud provides is

not just the ability to provision and deprovision on demand or the ability to

create enterprise-wide access rules based on roles or responsibilities, but

the capacity to enforce those rights across an entire enterprise and beyond

in real time.

What the cloud truly brings to the party is the ability to scale up and down

as needs dictate and the cost-efficiencies built in to the fast deployment,

and lack of hardware and software to maintain. But most important is the

best-of-breed enterprise-class solutions you can use to track process and

improve performance across all the compliance requirements. Just the

savings alone towards password management self-service saves hundreds

of man hours per year.

There are several cloud-based solutions that can manage your identity

security, but HIPAA compliance is more than just IAM/IDM. There is the

matter of data correlation: the ability to determine when and whether any

event is a potential threat or simply authorized access. But today, even

authorized access is not so simple. What happens if a correct password is

applied against a dormant account? Are you notified? Is the account

immediately frozen? Certainly it could be a friendly error, but if the IP

address is traced back to Bulgaria are you concerned? What if it happens in

the middle of the night…or tries multiple times to modify records that go

beyond its original rights? How or when are you alerted? This is something

typically beyond the scope of IDM and the call for a SIEM and Log

Monitoring solution is needed. HIPAA requires this and the cloud delivers.

CYBER CRIME FACTS…

From the Ponemon Institute.

Cyber crimes are costly. The median

annualized cost of the 45

organizations in the study is $3.8

million per year, but can range from

$1 million to $52 million per year per

company.

The most costly cyber crimes are

those caused by web attacks,

malicious code and malicious

insiders. These account for more

than 90 percent of all cyber crime

costs per organization on an annual

basis. Mitigation of such attacks

requires enabling technologies such

as SIEM and enterprise threat and

risk management solutions.

SIEM is a strong deterrent

Companies that had deployed a SIEM

system achieved a 24 percent cost

savings when dealing with cyber

attacks versus those that had not.

Cyber Crimes are Intrusive and

Frequent

Page 8: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

www.CloudAccess.com

CLOUDACCESS 877-550-2568 www.cloudaccess.com

SECURITY FROM THE CLOUD:

Between audits, access, transmission and breach prevention, the cloud

integrates a risk mitigation program designed to meet not just HIPAA, but

Sarbanes Oxley, PCI and others. But the cloud is simply the platform. It is

the solutions that work on that cloud that create conditions for easier

compliance. It is the great equalizer in terms of affordability and

functionality. Ten years ago there were those that said a cloud-based ERP

application was foolhardy. Tell that to salesforce.com. They created a big

picture solution that allowed modest companies an opportunity to use

enterprise-class tools. The cloud has now evolved to the point where

security-as-a-service offers proven solutions that meet the strictest

federal and industry requirements.

To those on the fence, let’s say that the cloud-based solution has an

equivalent level of security features and control as those of any on premise

solution. Let’s also concede that those features meet or exceed HIPAA

requirements as well. What is left? Why go cloud? Benefits like scalability,

cost efficiencies, federated interoperability make for a perfectly rational

ROI argument and look good to those paying the bills. However, the usage

of a virtual security environment it makes a complex process simpler. There

are solutions in which the administration is done for you and for others the

cloud creates a consistent, concentrated platform to control all aspects of

compliance security.

HIPAA requirements are only going to become stricter as the evolution of

data access and transmission evolves. In the past two years, we have

already seen amendments and additions to the law making compliance

account for a larger percentage of your valuable time. The cloud allows for

you to safely divest some of the tasks through a combination of risk

intelligence correlation, automations, integrated processes, proven self-

service protocols and centralized management tools.

SEVEN SECURITY

VULNERABILITIES…

There are many different aspects to securing your IT infrastructure, and because of the complexity, over 70% of organizations are still not adequately securing their critical systems (according to the 2012 Echelon One Survey).

The following are seven of the “deadliest sins”…or holes inside or beyond your network perimeter:

1. Inaccurate access permissions

2. Reliance on password vaulting

3. Unprotected Windows Administrator accounts

4. Thinking that Identity Management alone will secure access to systems

5. Lack of centralization to SSH keys

6. Point solutions for access control

7. Lack of continuous monitoring

Page 9: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

www.CloudAccess.com

CLOUDACCESS 877-550-2568 www.cloudaccess.com

SECURITY FROM THE CLOUD:

THE CHALLENGE OF BYOD

“Don’t care how…I want it now!” -Veruca Salt (Willy Wonka and the Chocolate Factory)

We live and work in a world of

immediate gratification. In the name of

greater productivity if you need to check

inventory from a supplier’s

warehouse…click there it is. Share a file

on Dropbox, no problem. Add detail

about a meeting in the sales database… click! Update your Facebook or

LinkedIn status. Email a white paper to a potential client...click, click. Want

to see that flying pig meme…well, you get the picture.

Now that’s not necessarily a bad thing…unless you’re an IT professional

and the those accessing and storing your network assets use

unsecured/unauthorized devices while potentially bypassing security

protocols. But unlike Veruca Salt quoted above, it isn’t the user who falls

into the garbage chute—the risk is to the security of the network. And it's

happening more often than you think.

Many organizations are now allowing employees to use their personally-

owned devices for work purposes with the goal of achieving improved

employee satisfaction and productivity. However, this comes at an IT price.

Users love the mobility and the immediacy of smart phones and tablets,

but forget these devices are just hand-held computers prone to the same

intrusions, attacks, viruses and risks as the computers used in the office.

The larger problem is many users don’t see that, so every time they sign on

to your network or download an app, it creates a wider and wider

vulnerability gap for the enterprise network.

This issue is not unique to a company of any particular size or one vertical

market, however the solution, whereas not simple, is clear. There are

several moving parts that require elements of identity management, access

management, SIEM, WebSSO and SaaS SSO. It incorporates a suite of

integrated answers that together can let you rest a little better at night.

The idea that if you build a strong perimeter or have users install anti-virus

on their devices, the problem goes away. It simply puts the finger in the

REDUCED COMPLEXITY AND

COST

With CloudAccess SIEM there’s no maintenance or management overhead, and minimal administration. As a true security-as-a-service solution, the impact on IT resources is truly limited. This allows you to redeploy your focus on other priorities. When managed from the cloud, many of these time-consuming, resource-draining activities are taken care of automatically. There is a definitive cost savings realized without sacrificing any of capabilities, compliance requirements, scope or strength of your IT security strategies.

As realized with cloud-based applications, migrating centralized control of the security features to the cloud realizes an equivalent savings. The cost reductions can be staggering. Just the implementation costs alone (a 2:1 or 3:1--sometimes higher-- of professional services costs to software licenses in traditional physical deployments) are cost prohibitive for many organizations. Cloud-based security can be the great equalizer. With no hardware burdens or software licensing issues, any-sized company can enjoy the same degree of protection as the largest enterprise.

Page 10: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

www.CloudAccess.com

CLOUDACCESS 877-550-2568 www.cloudaccess.com

SECURITY FROM THE CLOUD:

dyke, and the overriding issue still exists. Your proprietary assets are still

exposed.

First off, regardless of whether you approach the solution from the cloud

or more terrestrial confines, you need to rethink the risk, revise the policy

and enforce the rules. You have to consider how best to maintain

compliance (PCI, HIPAA, and/or Sarbanes-Oxley), and you need to

incorporate the answer holistically. To this end you need new protocols to

authenticate and credential users, define authorization rules based on

very specific rights and profiles and monitor traffic patterns to identify,

alert and act on any unusual activity.

This takes time, money and manpower. All of which are typically in short

supply for new IT initiatives. That is why I advocate security-as-a-service.

BYOD is a threat that will only grow exponentially and the longer you wait

to address the issue head on, the greater the vulnerability gap. However,

by taking advantage of the integrated solutions managed from the cloud,

organizations gain the benefit of cost-effective, seamless, on-demand,

scalable coverage. If you already have a strong SSO, then you don’t add it.

If all you require is additional resources to improve intrusion detection

and/or password management, the cloud solution exists to leverage your

existing architecture. Essentially cloud-based security fills the vulnerability

gap with proven and tested solutions monitored 7/24/365.

Managing security in the cloud provides the resource bandwidth to create

the rules, easily provision or deprovision devices, automate the alerts and

incorporate a more comprehensive and layered protection strategy that

includes the BYOD crowd.

But whatever your decision, you need to address the issue sooner than

later, becasue if you don’t take charge, your employees will self-serve

based on their own needs. There’s a prescient blog by Joe Onisick of

Network Computing who said:

“If you don’t support a particular device, employees will begin to find ways

to self-support it. They will bypass corporate IT and, with that, bypass

security, compliance, change management and audit logging. It’s a

problem that will continue to get worse, and, as with any problem, an

ounce of prevention is worth a pound of cure.”

THE TEN COMMANDMENTS OF

BYOD

Developed by Fiberlink

The rapid proliferation of mobile

devices entering the workplace is

undeniable. This raises the inevitable

question: how will you support

workforce desire to use personal

apps and devices while allowing

them to be productive in a secure

environment that protects corporate

data?

1. Create Thy Policy Before Procuring Technology 2. Seek The Flocks’ Devices 3. Enrollment Shall Be Simple 4. Thou Shalt Configure Devices Over the Air 5. Thy Users Demand Self-Service 6. Hold Sacred Personal Information 7. Part the Seas of Corporate and Personal Data 8. Monitor Thy Flock—Herd Automatically 9. Manage Thy Data Usage 10. Drink from the Fountain of ROI

Page 11: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

www.CloudAccess.com

CLOUDACCESS 877-550-2568 www.cloudaccess.com

SECURITY FROM THE CLOUD:

IF A TREE FALLS IN YOUR NETWORK, DOES ANYBODY HEAR?

When I started scribbling notes as to what

to write about this week, my first thought

was to address some of the claims that

cloud wasn’t “ready for prime time,” by a

some survey done by Wisegate. Everyone

is entitled to an opinion, and those who

wish to turn a blind eye to the maturation

of the cloud do so at their own risk. Before I move on to the subject at

hand, I will simply remind doubters that these same voices were shouting

the same thing from the rooftops about SaaS 10 years ago. Now these

same doubters incorporate many SaaS solutions into their architecture. It’s

okay to be skeptical, and in terms of security, it’s necessary to be cautious.

However, once you cut through the hype that the cloud is some kind of

“silver bullet,” and the myopia of the status quo, you will see that the cloud

is the latest step in the evolution of IT asset protection.

If you claim that the cloud is too risky, then one also must equally consider

that adequate security of an existing on-premise network, or lack thereof,

could also be a root cause. If lack of compliance is the issue, then do some

more homework…compliance in the cloud is real. Again, not wishing to

impose my obvious bias regarding the cloud on any doubter, but just like any

product in any industry, you need to judge solutions on their independent

merits. I am sure there are less-than-stellar cloud-based products, but to

label the whole movement as risky is much like saying all cars are gas-

guzzling rolling death traps or all online banking is playing financial Russian

Roulette. What is it they say about babies and bath water???

Alright, I am stepping down from the soapbox to respond to another, less

inflammatory, yet as business critical, article regarding the difficulty of

separating log data from actionable events. The issue at hand is a network

is pinged potentially millions of times a day. Most of it innocuous-the

legitimate log on and off of employees, genuine transactions of data, etc…

But what gets lost amidst all this “white noise,” are the red flags that

indicate breaches or worse malicious activities.

It can be overwhelming. In fact, the article Struggling to Make Sense of Log

Data, points out a study by the SANS Institute that the biggest critical

THE PARADIGM CHANGE IS

HAPPENING NOW

According to Forrester Research, it is

estimated that the managed cloud

services security (MSS) market stands

at $4.5 billion.

Gartner, the nationally respected IT

research firm predicted that the total

worth of the cloud computing market

will rise to more than $150 billion by

2013.

In 2015, public cloud services will

account for 46% of net new growth

in overall IT spending.

Morgan Stanley estimates that by

2015, the mobile web will be bigger

than desktop internet. With user

expectations about where and how

they access information changing

dramatically, there'll be growing

pressure on IT to make enterprise

applications available in similar ways.

Page 12: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

www.CloudAccess.com

CLOUDACCESS 877-550-2568 www.cloudaccess.com

SECURITY FROM THE CLOUD:

concern for security is the ability to discern usable and actionable data

from log files.

How Important is Collecting Logs?

I asked a top notch engineer developing in the cloud and he wryly quipped

if a tree falls in the forest, does it make a sound? He added, just because

you set intrusion detections software system to find malware and the like,

you still require the human intelligence to review/interpret the logs and

create the baseline of normalcy. So I said, that is the problem…there’s just

so much to review. To which he reminded me about the concept of

situational awareness. He posits the idea that a singular event might be

seen as generally low-level and harmless, but when it is put into context

and correlated against various rules and diverse enterprise silos, a very

different picture emerges. For instance, your network logs an access

attempt from Bangladesh. Is this normal? Do you have customers,

suppliers and employees who originate there? If so, is it happening during

regular business hours? Is it following “normal” traffic patterns? If so, are

they using dormant passwords or bypassing any protocols? If so, is the

accessible data through this breach?

The study author Jerry Shenk said, "Even when we look at the 22 percent of

respondents who are using SIEM (security information and event management

systems) for collecting logs and processing them, nearly the same percentage

say it is difficult to prevent incidents and detect advanced threats."

But the most disconcerting statistic is (according to the study): "With or

without tools, many organizations don't spend much time analyzing logs.

35% of respondents said their organizations allot no time to less than one

day a week on log analysis. The smaller the organization, the less likely

EMPLOYEE CARELESSNESS

CAN PUT YOUR COMPANY

AT RISK

A company’s greatest asset—its employees—can also be its weakest link, especially in an era wherein mobility and accessibility play a huge role in enhancing productivity.

The top reasons cited for data loss were SMB employees’ tendency to open attachments to or click links embedded in spam, to leave their systems unattended, to not frequently change their passwords, and to visit restricted sites. This negligence puts critical business data at risk from data-stealing cybercriminals and malicious insiders.

Page 13: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

www.CloudAccess.com

CLOUDACCESS 877-550-2568 www.cloudaccess.com

SECURITY FROM THE CLOUD:

they would spend on log data analysis. Many companies recognize that

SIEM is part of the answer, however 58% of the companies in the survey

noted they are "not anywhere close to that level of automation."

This alone is a perfect situation to incorporate security-as-a-service to help

manage monitoring. Instead of once per week (if at all), monitoring occurs

7/24/365. Instead of catching just the most obvious threats, the

automations combined with the sourced human analysis significantly

shrink the vulnerability gap. Instead of looking at a singular network, it

links, correlates, analyzes all the aspects of the enterprise. And cloud-based

security does it at a fraction of the on-premise cost. The cloud allows

organizations to expand their resources and therefore solidify its coverage.

Attacks, intrusions and abnormalities are issues aren’t solved by ostriches.

Putting heads in the sand isn’t the answer. Neither is throwing your hands

up saying so what can I do about it? And if you are one of those people

who, at the top of this blog, consider the cloud too risky of a proposition,

how much riskier is the status quo? To be effective, you need to have all

the facts in order to formulate a stronger prevention plan. I can’t stress

enough how important it is to understand regular traffic patterns in order

to recognize when something requires greater attention or action. And to

do that you need to review logs. However, with so many other priorities

sometimes it is a considerable challenge to be proactive.

Trees will continue to fall in the forest. However, if you look down from the

cloud, you are better attuned to hear it, and if necessary, act.

So how does this intersect with the cloud? It all goes back to resources. Do

you have the technology, the budget, and/or the manpower to analyze every

blip or define/escalate every event? Security–as-a-service helps lift that

burden by employing 24/7/365 monitoring and using your applying your risk

assessments to best defend your IT assets in real time. Once you define what

events that pose the greatest threats, you can prioritize response and take

appropriate action without impacting your departmental staff.

In short, even the best risk assessment and mitigation measures leave a

certain amount of residual risk, either because one can’t mitigate totally

against all the risks or because of the element of chance. But, by better

understanding the difference between ‘threat’ and ‘risk’ can help you make

decisions that will keep your systems safer and avoid unnecessary costs.

DID YOU KNOW…

What are your employees

doing?!!!!

Well over half of consumers - 58

percent - using smart mobile

devices employ location-based

apps despite concerns about

safety and third-party use of their

personal information, according

to ISACA. Forty-three percent say

they don't read agreements when

downloading mobile apps; 25

percent respond that the

agreement language is unclear. A

mere 8 percent of respondents

say they don't download apps.

Page 14: THOUGHTS FROM THE CLOUD...STORMING THE CASTLE One of the true benefits of the cloud is the ability to reconfigure and create a stronger, more active asset protection strategy than

www.CloudAccess.com

CLOUDACCESS 877-550-2568 www.cloudaccess.com

SECURITY FROM THE CLOUD:

MENTION THIS WHITE PAPER AND WE WILL EXTEND A FREE MONTH OF SERVICE WHEN YOU SIGN UP FOR A YEAR OR MORE PAY-AS-YOU-GO SUBSCRIPTION

CONTACT CLOUDACCESS FOR A

LIVE ONLINE DEMONSTRATION OF OUR SIEM AND LOG MANAGEMENT SOLUTIONS DELIVERED AND MANAGED FROM THE CLOUD.

MORE INFORMATION:

CONTACT: 877-550-2568

Read Our Blog: http://cloudaccesssecurity.wordpress.com/

LIKE Us on Facebook Follow Us On Twitter Join us on LinkedIn

The sky is no longer the limit

with secure, affordable cloud

security solutions from

CloudAccess.

WANT TO LEARN

MORE ABOUT

COMPLIANCE?

www.CloudAccess.com