The "No Network is 100% Secure" series
- Cloud Computing -
A White Paper
All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants
Contact Us
What is cloud computing?: In a sentence, cloud computing is software that's
hosted centrally in a shared environment that can be leased.
More specifically, cloud computing is a computing model in which
virtualized resources are provided as a service over the Internet.
The concept incorporates infrastructure as a service (IaaS), platform as a service
(PaaS) and software as a service (SaaS) as well as Web 2.0 and other recent
technology trends that have the common theme of reliance on the Internet for
satisfying the computing needs of the users. Cloud computing services usually
provide common business applications online that are accessed from a web browser.
Cloud computing characteristics: Customers engaging in cloud computing do not
own the physical infrastructure that hosts the software service. Instead, they
rent usage from a third-party provider. They consume resources as a service, paying
for only the resources they use or on a subscription basis. Sharing computing power
among multiple customers can reduce costs significantly. A cloud application often
eliminates the need to install and run the application on the customer's own computer,
thus alleviating the burden of software maintenance, ongoing operation, and support.
Cloud computing economics: Cloud computing users can avoid capital expenditure
on hardware, software and services, rather paying a provider only for what they use.
Consumption is billed based on resources consumed or on a subscription basis with
little or no upfront cost. Other benefits of this time sharing style approach are
low barriers to entry, shared infrastructure and costs, low management overhead and
immediate access to a broad range of applications. Users can generally terminate the
contract at any time (thereby avoiding return on investment risk and uncertainty)
and the services are often covered by service level agreements with financial penalties.
One of the key advantages that cloud computing offers is infrastructure agility.
IBM, Amazon, Google, Microsoft and Yahoo are some of the major, more well known
cloud computing service providers.
Cloud computing risks: Customers wishing to avoid data access and data loss
problems should research vendors' policies on data security
before using those services. The Gartner Group lists seven security issues which
one should discuss with a cloud-computing vendor:
- Privileged user access: who has root/Administrator access to data?
- Regulatory compliance: will vendor undergo external audits and security certifications?
- Data location: Does the provider allow for any control over the location of data?
- Data segregation: Is encryption available at all stages and were these encryption
schemes designed and tested by experienced professionals?
- Recovery: What will happen to data in the case of a disaster? Do they
offer complete restoration and, if so, how long that would take?
- Investigative Support: Does the vendor have the ability to investigate any
inappropriate or illegal activity?
- Long-term viability: What will happen to your data if the company goes out of
business; how will data be returned and in what format?
In practice, one can best determine data-recovery capabilities by experiment: asking
to get back old data, seeing how long it takes, and verifying that the checksums match
the original data. Determining data security is harder.
Probably the biggest risk relating to cloud computing is the obvious: a
total dependency that the Internet will always be available. Operations that are
highly mission critical could become vulnerable to service availability problems if
the Internet is disrupted in any meaningful way. This possibility certainly
exists due to State sponsored or rogue terrorism or several other methods described
in other white papers in this series.
Cloud computing key benefits:
Cost is greatly reduced and capital
expenditure is converted to operational expenditure. Pricing uses utility
resource usage or subscription options. Minimal or no IT skills
are required for implementation.
Device and location independence enable users to access systems using a web browser
regardless of their location or what device they are using, e.g., PC, mobile. Since the
infrastructure is typically provided by an off site third-party and accessed via
the Internet the users can connect from anywhere.
Security typically improves due to centralization of data, increased
security-focused resources, etc., but raises concerns about loss of control over
certain sensitive data. Security may be as good as or even better than traditional
systems, in part because providers are able to devote resources to solving security
issues that many customers cannot afford. Providers typically log accesses
and transactions, but
accessing the audit logs themselves can be difficult or impossible.
Cloud computing security issues:
1) Every breached security system was once thought secure
SaaS (software as a service) and PaaS (platform as a service) providers all trumpet
the robustness of their systems, often claiming that security in the cloud is tighter
than in most enterprises. But the simple fact is that every security system that has
ever been breached was once thought infallible.
Google was forced to make an embarrassing apology when its Gmail service collapsed in
Europe, while Salesforce.com is still smarting from a phishing attack in 2007 which
duped a staff member into revealing passwords.
While cloud service providers face similar security issues as other sorts of
organizations, analysts warn that the cloud is becoming particularly attractive to
cyber crooks. The richer the pot of data, the more cloud service providers need to
do to protect it.
2) Data and information security
In the realm of multi-tenant data, you need to trust the cloud provider that your
information will not be exposed. For their part, companies need to be vigilant
about how passwords are assigned, protected and changed as examples. Cloud service
providers typically work with numbers of third parties, and customers are advised to
gain information about those companies which could potentially access their data.
However, realistically, this could be easier said than done.
An important measure of security often overlooked by companies is how much downtime
a cloud service provider experiences. Ask to see service providers' reliability
reports to determine whether these meet the requirements of the business. Exception
monitoring systems is another important area which companies should ask their service
providers about.
An important consideration for cloud service customers, especially those responsible
for highly sensitive data, is to find out about the hosting company used by the
provider and if possible seek an independent audit of their security status.
Customers typically do not seem to be as stringent about data and information
security as one might think they should in many cases.
3) Distributed cloud computing issues
Let's say that you use a particular cloud provider for your eCommerce web presence.
But your checkout and credit card transaction capabilties may be carried out using
different servers in different data centers or even by different cloud providers.
This may be happening with or without the customer's knowledge. This type of
computing distribution is a very common cloud provider model. Cloud providers may
have dozens of servers in dozens of data centers in dozens of Countries. If
communications between the various cloud provider services is not strongly encrypted
and extremely secure, your data and information could be at risk.
We maintained all of our own web and mail servers for many years (decades, actually).
But the web page you are reading now is hosted on a cloud provider server. We
were very careful to locate a provider that has strong ethics, is very competent
and is likely to not go out of business tomorrow. We were particulary fortunate
to find a provider that has it's offices and data center right here locally.
But in our research, we found that this situation is the exception rather than
the rule. Many cloud providers are located in Third World Countries and have
questionable competency to say that least. One large provider that we looked at was
so bad that their entire netblock was blacklisted by most SPAM e-mail black list
authorities. We don't know (or care) whether this is because the cloud provider
in question has a lot of open relay servers that have been hacked or whether they
actively sell services to known spammers. And as for support... you'll come to value
USA-based cloud providers and support teams the first time you have to contact
them with issues or questions. Personally, we would think that trusting vital
service applications to a company that was in Russia, China or India (as examples)
would be a fundamentally bad idea. And just because the company headquarters are
in the American heartland is no guarantee that the computers that are hosting your
services aren't in Bangalore!
4) Security standards
In most SaaS offerings, the applications are constantly being tweaked and revised,
a fact which raises more security issues for customers. Companies need to know, for
instance, whether a software change might actually alter its security settings.
The cloud is still very much a new frontier with very little in the way of specific
standards for security or data privacy. In many ways cloud computing is in a similar
position to where the recording industry found itself when it was trying to combat
peer-to-peer file sharing with copyright laws created in the age of analogue.
In terms of legislation, there's very little that is specifically written for cloud
computing. As is frequently the case with disruptive technologies, the law lags behind
the technology development for cloud computing. What's more, many are concerned that
cloud computing remains at such an embryonic stage that the imposition of strict
standards could do more harm than good. IBM, Cisco, SAP, EMC and several other leading
technology companies created an 'Open Cloud Manifesto' calling for more consistent
security and monitoring of cloud services. But the fact that none of the main cloud
providers agreed to take part suggests that broad industry consensus may be some way
off.
There are a handful of existing web standards which companies in the cloud should know
about. Chief among these is ISO27001, which is designed to provide the foundations for
third party audit, and implements OECD principles governing security of information
and network systems. The SAS70 auditing standard is also used by cloud service providers.
5) Local law and jurisdiction where data is held
Possibly even more pressing an issue than standards in this new frontier is the
emerging question of jurisdiction. Data that might be secure in one country may not
be secure in another. In many cases though, users of cloud services don't know where
their information is held. Currently in the process of trying to harmonise the data
laws of its member states, the EU favors very strict protection of privacy, while in
America laws such as the US Patriot Act invest government and other agencies with
virtually limitless powers to access information including that belonging to companies.
Companies need to be confident that they have immediate access to all of their data
should their cloud provider contract be terminated for any reason, so that their
information can be quickly relocated. Part of this includes knowing in which
jurisdiction the data is held.
European concerns about about US privacy laws led to creation of the US Safe Harbor
Privacy Principles, which are intended to provide European companies with a degree of
insulation from US laws. Some suspect that "Counter terrorism legislation" is
increasingly being used to gain access to data for other reasons.
Cloud computing data privacy:
Everything communicated on the web has a long shelf life. A really, really long shelf
life, making it virtually impossible to leave the past in the past. Once someone uses
the Internet to send a message or document, they have little to no control over the
data. Cloud computing is becoming more common as more people opt to use web-based word
processors and e-mail programs, such as Google's online word processor, Docs, or
Microsoft's forthcoming online version of Office. People tend to put a lot, and perhaps
too much trust in the Internet.
People go online to write notes to themselves, manage their calendars, share photos and
manage contacts. And although storing information online means it's accessible from any
computer, it also means it's in the "cloud," an enormous data center in cyberspace. In
the Internet world, data never disappears. It has a potential to stay around forever.
Much of the data is stored by third parties and because storage is so cheap, there's no
reason to ever delete data. Hackers could potentially breach the stored data,
compromising thousands of people's personal information. And as soon as that data has
left the servers, where it goes could be anyone's guess.
In July, 2009, a hacker calling himself Hacker Croll successfully infiltrated 310
business documents belonging to social networking site Twitter that were stored in
Google Docs. The hacker then sent that information, including what he claimed were
PayPal, Gmail, and Amazon accounts, to various technology blogs. And while a person has
some control over information contained on their home computers, they should never
believe that deleting a file actually means it's gone. The truth is that bits from the
file still remain in the computer and can be recovered. The Internet is even more
indestructible, leaving people with little control over information transmitted online.
About the Author
Frank Saxton is a computer network security engineer and Easyrider LAN Pro principle.
Home-based in Portland, Oregon, Frank has been designing remote diagnostic and
network enterprise monitoring centers since the late 1970s. Prior to becoming a
professional systems engineering consultant in 1990, Frank had a 20 year career
in computer systems field engineering and field engineering management. Frank
has a BSEE from Northeastern University and holds several certifications including
Network General's Certified Network Expert (CNX). As a NOC design engineer and
architect, Frank works regularly with enterprise-class monitoring tools such as
HP Openview Operations, BMC Patrol and others. In his enterprise security
audit work, Frank uses sniffers and other professional grade monitoring tools on a
daily basis.
Next in the security white paper series:
How Cyber Criminals will mature over the next ten years
Are you vulnerable to drive-by exploits?
High value sites recent hacks
IT employment challenges of the 21st century
Employment reference checking white paper
Competency Certifications White Paper
Firewall White Paper
Virus White Paper
GhostNet White Paper
Password White Paper
Digital Identification Certificates White Paper
Cryptography White Paper
OpenID White Paper
Intrusion Detection Systems IDS White Paper
Rootkit White Paper
Unnecessary Windows XP Services White Paper
Scareware White Paper
Exaflood Internet Brownout White Paper
Proxy Server White Paper
Personal Computer PC Security White Paper
Phishing White Paper
DNS Poisoning White Paper
Conficker White Paper
SPAM White Paper
Best Practices White Paper
Denial of Service DoS White Paper
Trojan Virus Attacks White Paper
Port Scanning White Paper
Monitoring Basics 101 White Paper
Monitoring Basics 102 White Paper
Monitoring Basics 103 White Paper
Virtual Machine Security White Paper
Aurora vulnerability White Paper
Shelfware White Paper
Outsourced IT White Paper
Easyrider LAN Pro Consulting services:
Network Security Audit and PC Tune-up service
- Proxy server installation and configuration
- Enterprise security consultations
- Disaster recovery planning
- Disaster recovery services
- Capacity, migration and upgrade planning
- Build and deploy central syslog server
- Build trouble ticket systems
- Design and build monitoring environments
- Design and build Network Operations Centers (NOC)
- HP Openview, BMC Patrol consulting
Last modified March 25, 2009
Copyright 1990-2009 Easyrider LAN Pro