|By Gilad Parann-Nissany||
|May 21, 2014 12:00 PM EDT||
The reality is that a public cloud provider is likely investing more in infrastructure security and P3 (People, Process, Products) than your organization.
Does that mean that you can safely move your data to a public IaaS cloud? Not necessarily.
Any public cloud vendor will tell you off the bat that public cloud security requires a “shared responsibility” model.
It is confusing: on one hand, we tell you that public cloud security is likely safer, while on the other, we tell you it’s not necessarily safe to migrate to a public cloud. So let’s get down to details and clear up the confusion.
Private Cloud Security vs Public Cloud Security Comparison
Most enterprises are strategically looking at public clouds, while nurturing (and sometimes extending) the corporate private cloud. There are many reasons for that approach, but when it comes to data security, hardening and securing each cloud type is a fundamentally different task.
Private clouds are more secure in the sense that your servers and data are guarded behind the walls of a location managed and hopefully guarded by the enterprise. But implementing and maintaining the IT security is a daunting and resource-intensive task. You’ll need to build and maintain perimeter security, application security, and operating systems security. You must educate your employees. You will require IT personnel to handle the workload.
In a public infrastructure cloud, the responsibility for physical access, virtualization level security, and standardization is shifted to the cloud provider (who actually does a great job most of the time). You, the customer, are still responsible for operating system security, application security, and complying with specific regulatory standards such as HIPAA and PCI.
The cloud key management dilemma
As a cloud encryption vendor, we’re often asked about the “value” of cloud encryption. Cloud encryption can be cheap (if your cloud provider manages the encryption keys). But cheap encryption is, most times, insecure. Also, cheap encryption raises compliance issues as you allow someone else to manage the encryption keys for you.
The alternative, traditional way of encrypting, takes you back to the “pre-cloud” days by managing encryption keys yourself using Hardware Security Modules (HSMs). An HSM is certainly a highly secure option for key management; but, in a cloud (private or public), HSMs are challenged with two major issues.
- HSMs limits many of the cloud benefits, specifically around auto provisioning, orchestration and geographic dispersion (after all – it is hardware)
- The encryption keys are insecure the moment they leave to the cloud (to encrypt a disk or any other cloud resource).
- Needless to say, HSMs are far more expensive.
Now, let’s leave the dilemma in the past and look to the future for a solution.
The future – cloud encryption stronger than hardware
There’s a need for a fresh, fundamentally new approach to cloud encryption.
To deal with the complexity of cloud encryption while not compromising the enterprise trust, companies like Porticor Cloud Security leverage innovative cloud encryption techniques like split-key encryption and homomorphic key management (read more about it in this white paper).
These technologies enable public cloud customers to consume encryption as a service, without compromising the security of the encryption keys. As illustrated in this short video, split-key encryption is based on the concept used by Swiss banks’ safety deposit boxes: two owners hold keys, and only the combination of both keys can open or lock a safe.
Porticor splits the encryption key in half, providing one half for the customer, and keeping the second half with the “banker” – a Porticor key management service. Using split-key encryption technologies, no “secrets” are stored in the cloud key management system, as the Porticor’s key management system holds only half of the secret (half of the encryption key), and the cloud customer holds the second half.
Better Security in the Cloud
To declare a winner in the private cloud vs public cloud security rivalry would be remiss. In fact, better security is not a question of which cloud type you pick. Your data and applications can be totally secure in a private cloud, with an HSM and IT personnel to properly build, update, and maintain your security protocol. But that security may come at a higher price.
In the pubic cloud, because the provider maintains part of the security responsibility, the financial burden of securing your apps and data is lessened. However, you still share the responsibility and must not take your part lightly. If you take the proper precautions with your data encryption keys, you can be totally secure (and, as an added bonus, compliant with regulations and restrictions) in a public cloud too.
The post Private vs Public Cloud Security: Top Security Issues appeared first on Porticor Cloud Security.
- Mainstream Business Applications and In-Memory Databases
- Findly Enhances Recruiting Efficiency With New Single Sign-on Portal
- Ukraine Has Potential in Midst of Chaos
- “Entisys 02” Finishes in Top 20 at the 2014 NASCAR K&N Pro Series West Race at the Sonoma Raceway
- Complete Surface Pro 3 Review - 3 days later
- Flexera Software Increases Commitment to Europe with Germany-based Datacenter to Host FlexNet Manager Suite Cloud for European Customers
- CORRECTING and REPLACING Android and the Open Automotive Alliance Shift into the Next Gear
- June 2014 Server and StorageIO Update newsletter
- Research and Markets: Global Industrial Control Systems (ICS) Security Market 2014-2018 with Cisco, Fortinet, General Dynamics, Juniper Networks, McAfee, Raytheon & Symantec Dominating
- MongoDB World in NY City this week
- Book Review: Learning Mobile App Development
- Grabbing the Supply Chain Bull by the Horns
- Mainstream Business Applications and In-Memory Databases
- The Odd Couple: Marrying Agile and Waterfall
- Fanning the Flames of Agile
- Big Data, Cloud and Mobile - Converging Technology Trends
- April and May 2014 Server and StorageIO Update newsletter
- WSO2 Introduces Industry’s First Enterprise Identity Bus With the Launch of WSO2 Identity Server 5.0
- Big Data Expo 2014 Silicon Valley Call for Papers Now Open
- Jim Miller at ImageWare Systems, George Romas at HP, Jody Ross at AMAG, + March Networks and StrikeForce Featured in SecuritySolutionsWatch.com Interviews
- Microsoft SharePoint at a Crossroads – Opportunities & Challenges Abound
- The Butterfly Effect Within IT
- The Linux Foundation's Core Infrastructure Initiative Announces New Backers, First Projects to Receive Support and Advisory Board Members
- Setting the Bar for Agile Architecture
- Google Maps and ASP.NET
- Converting VB6 to VB.NET, Part I
- How to Write High-Performance C# Code
- Where Are RIA Technologies Headed in 2008?
- Crystal Reports XI & How It Has Changed
- Creating Controls for.NET Compact Framework in Visual Studio 2005
- Programmatically Posting Data to ASP .NET Web Applications
- Implementing Tab Navigation with ASP.NET 2.0
- AJAX World RIA Conference & Expo Kicks Off in New York City
- The Top 250 Players in the Cloud Computing Ecosystem
- i-Technology Viewpoint: "SOA Sucks"
- .NET Archives: Getting Reacquainted with the Father of C#