Ebook Definitive Guide To Cloud Security
Ebook Definitive Guide To Cloud Security
Ebook Definitive Guide To Cloud Security
CLOUD SECURITY
The Definitive Guide to Cloud Security
Brought to you by
Brought to you by
Table of Contents
Chapter 1: Introduction Cloud Adoption and Risk Today
Page 1
Page 4
Page 7
Page 11
Page 16
Chapter 6: Shadow IT
Page 21
Chapter 7: CRM
Page 25
Page 28
Page 33
Page 36
Page 39
CHAPTER 1
The cloud (SaaS, PaaS, and IaaS) is transforming business for the better, making
employees more productive and businesses more agile. As the cloud market
matures, analysts and market researchers are discovering hard data supporting
the benefits of the cloud for enterprises. The latest numbers from Vanson Bourne
Research show that the cloud is providing organizations with a 21% reduction in
product time to market, a 17% reduction in IT maintenance costs, a 15% reduction
in IT spend, and an 18% increase in employee productivity.1 With these types of
metrics in hand, its no surprise that 60% of CIOs state that the cloud is their #1
priority this year.2
However, this enthusiasm for cloud adoption is tempered by security, compliance,
and governance concerns. Analyst firm IDC shows that security and privacy
remain the top inhibitors of cloud adoption.3 Given the seemingly endless supply
of headlines on data breaches, its understandable, if not expected, that security
of data in the cloud is now a board-level concern for 61% of organizations,
according to a recent study by the Cloud Security Alliance (CSA).
http://venturebeat.com/2012/08/07/google-cfo-cloud-study/
http://www.businessinsider.com/infographic-its-not-easy-to-be-a-cio-2012-2#!HqX9i
http://www.opendatacenteralliance.org/docs/1264.pdf
PAGE 1
PAGE 2
PAGE 3
In 2015, roughly
10% of overall IT
security enterprise
capabilities will
be delivered as a
cloud service.
Gartner
CHAPTER 2
Cloud Visibility
KEY STAT: 72% OF COMPANIES DONT KNOW THE SCOPE OF
SHADOW IT AT THEIR ORGANIZATION BUT WANT TO KNOW
Cloud services are incredibly easy to adopt, with most requiring only an email or a
credit card to sign up. The result is that individual users and business units often
begin using cloud services without any involvement from IT. The benefit is that
users and business units are able to readily and rapidly adopt services that drive
productivity and agility for the business. The downside is that IT often has little to
no visibility into the full scope of IT services employees are using. Without visibility,
it becomes very difficult for IT to manage both cost expenditure and risk in the cloud.
With regards to visibility, Gartner says that enterprises must protect their sensitive
data for various commercial and legal reasons. Regardless of whether the cloud
services in use are shadow IT or sanctioned IT, businesses need visibility into which
services employees are using, what data is stored in them and shared from them,
any anomalies in usage behavior that indicate a compromised account, and who is
using each service and from which devices and geographies.
Enterprises must also ensure that they dont cross a perceived ethical of legal
privacy boundary when monitoring the use of cloud services. For example, the
same methods that can be used to monitor sanctioned cloud services, could also
be used to monitor personal Facebook or Instagram accounts. Requirements for
privacy may vary greatly in different verticals and geographies.
PAGE 4
Enterprises must also integrate their cloud visibility into existing systems, such
as Security Information and Event Management (SIEM) products for continuous
monitoring and event management.5
The average employee uses 27 different cloud services at work6, including six
collaboration services, four social media services, and three file-sharing services.
Many of the services used in the office are consumer grade services and
security is not a given, so understanding which services employees are using,
what type of data is uploaded and shared through the services, and what
security capabilities the services have is a must.
30% of IT
Security teams
list concerns over
compromised
accounts and
insider threats as
a top challenge
holding back
cloud projects.
Cloud Security Alliance
Mind The SaaS Security Gaps: G00263947. Craig Lawson, Sid Deshpande. 2014
PAGE 5
PAGE 6
10
11
12
How do I track and log all user and admin actions for
compliance and investigations?
CHAPTER 3
Cloud Compliance
KEY STAT: 37% OF EMPLOYEES UPLOADED AT LEAST ONE FILE TO A FILE-SHARING
CLOUD SERVICE THAT CONTAINED SENSITIVE OR CONFIDENTIAL DATA LAST QUARTER
Todays enterprises have deployed cloud services to support CRM, ERP, HR,
Collaboration, and Backup operations. Applications like Salesforce, ServiceNow,
Workday, Box, and Office 365, support mission-critical business functions, and because
of this they often house sensitive or confidential information, such as customer data,
financial data, employee data, IP, or security infrastructure data. Locating this type of
data in the cloud is not a rare event; in fact, it is now commonplace.
For example, 22% of files uploaded to file-sharing services contain sensitive or
confidential data, including: PII (personally identifiable information) such as social
security number, date of birth, or address; payment information, such as credit card
numbers or bank account numbers; and PHI (protected health information) such as
medical record number or health plan beneficiary number.
Furthermore, 37% of employees uploaded at least one file to a file-sharing cloud
service that contained sensitive or confidential data over the course of a business
quarter.7 In order to drive compliance, IT leaders are looking for ways to identify
enterprise-ready cloud services that support various use cases, locate where
sensitive data is housed, audit how sensitive data is handled, and protect sensitive
data from loss. With regards to compliance, Gartner says that compliance will
always be a core security deliverable.
7
PAGE 7
Compliance
will always be
a core security
deliverable.
Gartner
Mind The SaaS Security Gaps: G00263947. Craig Lawson, Sid Deshpande. 2014
PAGE 8
As Gartner references, there are over 10,000 cloud applications today, all with
varying degrees of security, compliance, and governance capabilities. Despite this
diversity of offerings, companies across industries must ensure compliance with
PCI DSS, HIPAA, HITECH, GLBA, SOX, CIPA, FISMA, FERPA, and other regulations.
In order to do so they must ensure the protection of various types of personal
information, including:
Name
Address
Birthdate
URLs or IP address
Email address
While the cloud provider is responsible for the security of their product, compliance
is based on a shared responsibility model, whereby the enterprise using the cloud
service must also take measures to maintain the privacy of employee and
customer data. Within the enterprise, users, IT/Security, and Audit/Compliance all
share responsibility for compliance.
PAGE 9
80% or cloud
governance
committees
include IT
Security.
10
PAGE 10
CHAPTER 4
Cloud services, like on-premise systems, can be the target of attacks aimed at
stealing corporate data or damaging the business. Attacks typically leverage the
cloud in one of two ways: they use cloud services as sources of sensitive data to
steal, or they use cloud services to exfiltrate stolen data.
Some enterprise-ready cloud services have security capabilities that exceed
those of the enterprise data center, but that does not necessarily protect them
from insider threats or compromised identities. In fact, compromised identities
and insider threat are the two main drivers of the first threat vector (cloud
services as the source of data to steal), and they are far more common than
most IT professionals realize.
PAGE 11
30% of IT
Security teams
list concerns over
compromised
accounts and
insider threats as
a top challenge
holding back
cloud projects.
Cloud Security Alliance
10
PAGE 12
PAGE 13
31% of companies
are not sure if
they experienced
an insider threat
incident last year.
Cloud Security Alliance
11
Mind The SaaS Security Gaps: G00263947. Craig Lawson, Sid Deshpande. 2014
PAGE 14
Malware
leveraged Twitter
to exfiltrate
stolen data,
140 characters
at a time, over
a sequence of
86,000 tweets.
PAGE 15
CHAPTER 5
As many a CIO and CISO will tell you - IT Security, today, is all about protecting
data, not data centers and this is largely product of cloud. When considering
data security, it can be helpful to examine both the security of the service the
data lives in and the security of the devices that have access to the data.
Some cloud services have security capabilities that far exceed most corporate
data centers. However, with over 10,000 cloud services available today, there is a
large variation in the security capabilities offered. The good news is that an
increasing number of cloud services are investing in security, but a larger number
still do not offer even basic security features. Only 17% of cloud services provide
multi-factor authentication, only 5% are ISO 27001 certified and only 11% encrypt
data at rest. For this reason, it is important to look at the risk of services
individually and enable risk-based policies on acceptable usage.12
In services with high levels of built-in security, users and their devices can often
be the weakest link. Users frequently lose devices or leave them in insecure
locations and are prone to lose passwords as well. 12% of employees have at
least one corporate identity (username and password) for a cloud service that
has been compromised for sale on the darknet (online black markets) today.13
12, 13
PAGE 16
PAGE 17
Enterprises can improve the security of their data by employing access control
policies for cloud services that take into account the context of the user, data,
device, and location. For example, an executive may be able to view and
download important financial data to her laptop when in the office, but may be
restricted to viewing only when on her mobile device in a foreign country.
Additionally, enterprises can take extra steps to ensure the security of their data
by employing encryption and tokenization and controlling their own keys.
Encryption can be tricky, and several considerations must be made when
evaluating encryption options.
First, enterprises must avoid proprietary algorithms in favor of encryption
algorithms that are both peer- and academia-reviewed to ensure that they are up
to modern cryptographic standards.
Second, enterprises must also verify that the algorithms used can support the
required functionality of their application since there is a trade-off between the
security of an algorithms and the functionality that it can support. To better
understand the specific tradeoffs, read The Cloud Encryption Handbook:
Encryption Schemes and Their Relative Strengths and Weaknesses. Finally, to
maximize data security, enterprises must own their own encryption keys. By taking
ownership of their keys, they prevent a malicious insider at a cloud service or an
inquiring government agency from gaining access to their data.
PAGE 18
Enterprises must
avoid proprietary
algorithms
in favor of
encryption
algorithms that
are both peerand academiareviewed to
ensure that they
are up to modern
cryptographic
standards.
With regards to data security, Gartner says that data is mission-critical to the
enterprise and that securing that data is the primary goal of any IT Security
organization. Therefore, if the enterprise is moving its data into cloud services,
IT Security must:
14
Mind The SaaS Security Gaps: G00263947. Craig Lawson, Sid Deshpande. 2014
PAGE 19
73% of IT Security
teams list security
of their data in
the cloud as a top
challenge holding
back cloud
projects.
Cloud Security Alliance
PAGE 20
CHAPTER 6
Shadow IT
KEY STAT: THE AVERAGE EMPLOYEE USES 27 DIFFERENT CLOUD SERVICES.
ON AVERAGE, IT IS AWARE OF 3 OF THEM.
Shadow IT refers to information technology that is managed outside of, and
without the knowledge of, the IT department. At one time Shadow IT was limited
to unapproved Excel macros and boxes of software employees purchased at office
supply stores. It has grown exponentially in recent years, with advisory firm CEB
estimating that 40% of all IT spending at a company occurs outside the IT department.15
This rapid growth is partly driven by the quality of consumer applications in
the cloud such as file-sharing apps, social media platforms, and collaboration
tools, but its also increasingly driven by lines of business deploying enterpriseclass SaaS applications. In many ways Shadow IT is helping to make
businesses more competitive and employees more productive.
When employees and departments deploy SaaS applications, it can also reduce
the burden on IT help desks to take calls. However, while IT is no longer
responsible for the physical infrastructure or even managing the application, its still
responsible for ensuring security and compliance for the corporate data employees
upload to cloud services. Instead of seeing Shadow IT as a threat, Ralph Loura,
CIO of HP Enterprise, sees it as an opportunity to leverage employees to identify
the applications they want to use so IT can enable the ones that have gained
traction and are enterprise-ready.
15
http://www.forbes.com/sites/tomgroenfeldt/2013/12/02/40-percent-of-it-spending-is-outside-cio-control/
PAGE 21
| CHAPTER 6 | SHADOW IT
We embrace
the idea of
this shallow
exploration of
new technologies,
new tools, and
new processes
by our users.
Ralph Loura,
CIO, Enterprise Group,
HP
PAGE 22
| CHAPTER 6 | SHADOW IT
When IT examines the use of cloud services across the organization, they
generally find Shadow IT is 10 times more prevalent than they initially assumed,
with the average organization today using 897 different cloud services.16 Often IT
departments discover many services in use that they have never heard of before.
After auditing the risk of each service and its security controls, IT teams can make
informed choices about what services to promote or enable. This is more than
just an exercise in risk management. The average company uses nearly 30
different file-sharing services, and using this many different services can impede
collaboration between employees. Standardizing on enterprise licenses for 2-3
services not only improves collaboration, but also reduces cost. Below are key
questions related to shadow IT that IT Security should be able to answer:
VISIBILITY
THREAT DETECTION
COMPLIANCE
DATA SECURITY
16
PAGE 23
| CHAPTER 6 | SHADOW IT
11
12
13
14
15
16
17
18
19
10
PAGE 24
| CHAPTER 6 | SHADOW IT
CHAPTER 7
CRM
PAGE 25
| CHAPTER 7 | CRM
Enterprises must not rely solely on the security capabilities of the CRM service
itself, as users may not always be using cloud products in ways that meet your
security, compliance, and governance requirements. For example, users may
be storing sensitive data such as payment card data and protected health
data in Salesforce as part of their normal workflow outside of policy, putting
the organization at risk of compliance violations. Or, consider the example of a
salesperson that downloads all the companys opportunities before leaving to join
a competitor. Below are key questions related to CRM services that IT Security
should be able to answer:
VISIBILITY
THREAT DETECTION
COMPLIANCE
DATA SECURITY
PAGE 26
| CHAPTER 7 | CRM
CRM is expected
to grow to a $36.5
billion market
worldwide within
the next three
years.
Gartner
10
11
12
Detailed activity monitoring of all user, admin, and thirdparty application activities including uploads, downloads,
views, edits, and deletes
13
14
15
16
17
Ability to apply encryption while preserving enduser functions such as search, sort, and format
PAGE 27
| CHAPTER 7 | CRM
CHAPTER 8
17
PAGE 28
The average
company uses
27 different filesharing services,
inhibiting
collaboration and
creating risk.
Q4 2014 Cloud Adoption
and Risk Report
In addition to the security risk, companies must evaluate the compliance risk
as well. 22% of files uploaded to file-sharing cloud service contain sensitive or
confidential data, including: PII (personally identifiable information) such as social
security number, date of birth, or address; payment information, such as credit card
numbers or bank account numbers; or PHI (protected health information) such
as medical record number or health plan beneficiary number. Organizations must
ensure that their valuable data is protected and that the use of file-sharing and
collaboration services is in compliance with industry regulations such as PCI DSS,
HIPAA, HITECH, GLBA, SOX, CIPA, FISMA, and FERPA.
PAGE 29
Additionally, many cloud services offer more than just file syncing across devices;
theyre platforms for collaborating with other people. No matter how secure a
cloud provider is, end users can always use their service in risky ways. Naturally,
users share files with other people at their companies, but files are also frequently
shared via public links, which can be accessed by anyone without restriction.
PAGE 30
Files are
frequently shared
via public links,
which can be
accessed by
anyone without
restriction.
In fact, 11% of all documents shared via file-sharing services were shared outside the
company. The majority of these external collaborators turned out to be business
partners, but 18% of external collaboration requests went to third party email
addresses such as Gmail, Hotmail, and Yahoo! Mail.18 Organizations must ensure
that their governance policies, dictating who has access to services and their data,
are enforced. Below are key questions related to file-sharing and collaboration
that IT Security should be able to answer:
VISIBILITY
THREAT DETECTION
COMPLIANCE
DATA SECURITY
18
PAGE 31
18% of external
collaboration
requests went to
third party email
addresses such
as Gmail, Hotmail,
and Yahoo! Mail.
Q4 Cloud Adoption
and Risk Report
10
12
Detailed activity monitoring of all user, admin, and thirdparty application activities including uploads, downloads,
views, edits, and deletes
13
14
15
16
17
18
PAGE 32
11
CHAPTER 9
What is a CASB?
KEY STAT: NINETY PERCENT OF SAAS ADOPTERS EXPECT SAAS TO CONSTITUTE MORE
THAN 50% OF THEIR SPENDING ON ENTERPRISE APPLICATIONS BY 2018, CREATING
SIGNIFICANT NEED FOR CASB PROVIDERS. (GARTNER)
With cloud adoption accelerating every year, enterprise IT is looking for ways to
partner with the business to enable secure utilization of the cloud. Increasingly,
these enterprises are turning to a new breed of technology, referred to by Gartner
as Cloud Access Security Brokers (CASB), in order to do this.
Gartner analysts Neil MacDonald and Peter Firstbrook first defined the Cloud
Access Security Broker category in May 2012 in their report, The Growing
Importance of Cloud Security Brokers." Other firms, such as Forrester, Securosis,
and 451 Research have defined similar categories, alternatively referring to the
technology as Cloud Security Gateways and Cloud Access Controllers. Since
then, Gartner has elevated the importance of CASB and now lists it as #1 in the
top ten technologies for information security.19
19
http://www.information-age.com/technology/security/123458169/gartners-top-10-security-technologies-2014
PAGE 33
Cloud access security brokers (CASBs) are on-premise or cloudbased security policy enforcement points, placed between cloud
service consumers and cloud service providers to combine and
interject enterprise security policies as the cloud-based resources
are accessed. CASBs consolidate multiple types of security policy
enforcement. Example security policies include authentication, single
sign-on, authorization, credential mapping, device profiling, encryption,
tokenization, logging, alerting, malware detection/prevention and so on.
Gartner
PAGE 34
10
A common element of all Cloud Access Security Brokers is they interject security controls by brokering access to a cloud
service. This enables IT to securely enable the use of cloud services within their organizations without compromising
compliance or security. By bundling security functions with a single enforcement point, CASBs also reduce the complexity
of securing data in the cloud.
20
Mind The SaaS Security Gaps: G00263947. Craig Lawson, Sid Deshpande. 2014
PAGE 35
CHAPTER 10
2.
PAGE 36
4. Subscription consolidation
5. Elimination of orphaned subscriptions
6. Accelerated response to breaches
and vulnerabilities
Below is a chart depicting the average hard-dollar cost savings across these six categories. Summing the savings, we see that
the average organization saved $1,514,251 annually by managing their shadow IT and sanctioned IT usage with Skyhigh, a
leading cloud access security broker.21
$530,001
21
Quantifying the Value of a Cloud Access Security Broker. Skyhigh Networks. 2014
PAGE 37
$36,800
$1,514,251
In addition to cost savings, cloud access security brokers can also mitigate risk in
the enterprise. Risk mitigation from the use of a CASB is typically comprised by
the following four factors:
1.
2.
Attribute
Before
After
Improvement
16%
8%
50%
31GB
6.7GB
79%
1.3
78%
16GB
.5GB
97%
32
87.5%
Low-Risk Service %
12%
22%
83%
6.4
3.8
59%
High-Risk Service %
Monthly Data Sent to High-Risk Services
High-Risk File Sharing Services
Monthly Data Sent to High-Risk File Sharing Services
How 200 Enterprises Flipped Shadow IT from Concern to Opportunity. Jim Reavis, Brandon Cook. 2014
PAGE 38
Organizations
using a CASB
decreased the
volume of data
sent to highrisk file-sharing
services by 97%.
CHAPTER 11
When evaluating different CASB vendors, there are several factors IT leaders
must consider. In addition to understanding whether the capabilities offered
match the business requirements, IT leaders must determine whether the
deployment model fits with their organization. For example, organization should
consider whether they want their CASB to be cloud-based or if they prefer to
manage all of the infrastructure and maintenance of an on-premise solution
themselves.
Additionally, organizations should consider whether they are looking for a
frictionless approach requiring no agents or if they would prefer a solution
that installs agents or PAC files on users work and personal devices. Finally,
organizations should consider whether the CASB vendor has supported other
companies in similar verticals and of similar size.
Many CASB vendors are emerging and have not yet deployed their solution at
scale. This may be acceptable to a smaller organization, but this is likely to be an
area of concern for a larger enterprise. To get started, Gartner offers a
framework for evaluating CASB vendors organized around the types of cloud
services the enterprise is aiming to enable. This framework is provided below for
your reference:
PAGE 39
SHADOW IT:
Ask CASB vendors to generate a cloud visibility report with your data during
the proof-of-value process.
Analyze the categories and individual cloud services in use, and identify the risk
associated with the service and its usage.
Create a corporate policy about which cloud services to block orallow, and
then determine the depth of security controls and API integrations the CASB
vendor can enforce for your permitted cloud services.
Select only those CASB vendors whose solution fits with your company vision
on cloud and mobility.
Evaluate only the CASB vendors that are the least disruptive to
your current environment.
PAGE 40
61% of enterprises
say that cloud
security is now
a board level
concern.
Cloud Security Alliance
Include CASB and identity management products when budgeting for new
cloud services and account for them in enterprise architecture discussions
23
Mind The SaaS Security Gaps: G00263947. Craig Lawson, Sid Deshpande. 2014
PAGE 41