Cloud security tips and tricks

Securing hybrid clouds one step at a time

Users and security consultants familiar with the process of securing hybrid clouds have one steady piece of advice to offer: the only way to go is one step at a time.

"Managing hybrid security is a matter of setting policy across all of the security touch points IT is already used to managing. It's about being consistently diligent at every turn," says Joe Coyle, CTO of IT consultancy giant Capgemini North America.

 

Hybrid clouds pose new security challenges

Cloud security tips and tricks

12 hybrid security products to watch

Enterprise Cloud Services archive

Coyle advises clients to regard their hybrid cloud usage as an extension of their network perimeter. "You have to tweak firewall policy, watch IDS traffic more carefully, employ encryption, set up multiple levels of authentication for management access and demand high levels of physical security at providers' sites," Coyle says.

[CLOUD SECURITY: Hybrid clouds pose new security challenges

12 hybrid security products to watch]

In terms of securing the link between your data center - virtualized as a private cloud or not - you can go with a direct route or establish a tunnel. Garrett Leap, CTO at Direct Insite, a company that delivers on-demand accounts payable and accounts receivable solutions to more than 100,000 corporations across 100 countries, says his company went for a 100MB direct fiber connection for both the increased security it offers and the fact that one of the company's data centers was already collocated at Terremark's Miami facility.

Direct Insite now hosts its customer facing front end in the cloud and all of the client data is hosted and processed in the company's collocated data center. Direct Insite's Leap says knowing that Terremark's virtualized data centers were already rated as Tier IV meant there was a very high comfort level in terms of who has physical access to the servers there.

To secure the direct link, Direct Insite uses a Cisco ASA box. "We only let what we want to come in and we don't let any data out that should not be allowed out," Leap says.

On top of the physical layer security defined by locked server cages and things of that nature, security consultant Joel Snyder of Opus One in Tucson, Ariz., says it's also crucial for customers to understand the provider's access control mechanism for management of those servers.

"These carriers have all the tools to make sure the ankle biters out on the Internet keep away from your data but have they guarded against having one of their guys being bribed by your competitor to pull down all of your sales data?" asks Snyder.

Snyder says companies looking to build hybrid clouds should demand from their service providers proof of two-factor authentication for all server management purposes.

And they should be demanding that all of the security parameters of the hybrid deployment should be manageable from the same pane of glass, says Kevin Jackson, vice president and general manager of NJVC, an IT consultancy catering to highly secure government clients. Jackson contends that unified management is going to be even more necessary as customers evolve to use multiple cloud services providers in the future. He suggests that customers look to cloud service brokerages to provide those management links.

Every practitioner interviewed for this story said that employing encryption in a hybrid cloud is a no-brainer decision both for data at rest and in motion. But one of the major issues with encryption in a hybrid situation is where to hold the key as data and access to data can be spread across both places and routine security practice dictates that you don't store the keys where the data resides.

Segal McCambridge, a Chicago-based law firm, opted to go with maintaining its own keys and storing the data for its hybrid applications on Nasuni's cloud-based storage offering.

[ALSO: 2013: The year of the hybrid cloud]

The firm's CTO, Matt Donehoo, explains that all of his firm's litigation files stored electronically must be managed in a way that guarantees absolute defensibility in a court of law - anything else would render it inadmissible. By design, the Nasuni storage controller installed at Segal McCambridge's site fully encrypts any data or metadata that leaves a customer's office and keeps that data encrypted both on the wire and at rest in the Nasuni cloud.

The customer controls the keys to the encrypted data, by design. From there it's up to the enterprise to pick whether to employ a key management product on premise or use a third-party key management service.

The two depths of security that come into play for virtualized networks - whether private, public and private - address virtual machine security.

"Sometimes the enterprise security team doesn't have a say in how virtual machines get spun up within a provider's cloud. But they should, because that is a fundamental point of security in the cloud. You want to push to make sure your security policy travels with your virtual image no matter where it is running," says Rand Wacker, vice president of products for CloudPassage, a cloud server security vendor.

NJVC's Jackson says Intel's Trusted Execution Technology (TXT) could help IT departments in the near future with the basic issue of being able to trust the servers running your applications in the cloud. TXT is a hardware-based security measure built into all Intel Xeon servers which is designed to detect and prevent BIOS attacks and evolving forms of stealthy malware, such as rootkits.

The main benefit, Jackson says, is an understanding that your virtual instances will be spinning up on a trusted machine.

Tags ecsCloudsecurityenterprise cloud serviceshybrid cloud computinginternetcloud computingCapgemini

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Christine Burns

Network World

Comments

Comments are now closed.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?