Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Gartner's state of cloud security: Outages are bigger risk than breaches

Brandon Butler | Nov. 15, 2012
Security remains a chief inhibitor to enterprise adoption of cloud computing resources and one Gartner analyst says the biggest concern should not be that data could be compromised in the cloud, but rather that there may be a cloud outage that could lead to data loss.

Buyers could do more too though, he says. One of the first things users need to do is classify which data really needs to be protected. Incomplete or nonexistent data classification is a common problem. "If the buyer doesn't know what the security requirements are for a specific piece of data compared to other data, it's difficult to assess whether the provider can meet provide adequate security," he says.

Third-party organizations are working to create standards and certifications for this area, but Heiser says those are still weak at this point. The Cloud Security Alliance, for example, has undertaken broad measures to address a variety of topics, but he questions how in depth those efforts have been at drilling down into specific areas.

RELATED: Amazon opens up about its cloud security practices, joins CSA registry 

FedRAMP is a program by the federal government that seeks to have a common set of security criteria for each provider the federal government uses for cloud computing, but it's in the early stages and may not be operational until 2014, he says. "We're beginning to get glimpse of what we need," Heiser says, but more work is needed to have standard controls, evaluation practices and global consensus. Buyers are in the best position to put pressure on vendors to be as transparent as possible on these issues, he adds.

So what's an enterprise cloud user supposed to do? "Choose your battles over data control," Heiser says. The macro trend is that more data is going to more end-user devices, which makes controlling the data more difficult and creating more vulnerabilities. With a data classification scheme, organizations can prioritize which data needs to be heavily secured. For most organizations that extremely sensitive data will be less than 20% of data, and could be as little as 5% or less. That data should be given "heroic efforts" to protect it - encryption, tokenization, data loss prevention systems or keeping it on site and not in a public cloud. Anti-virus, anti-malware and other security protections and controls should be in place to ensure the rest of data is not egregiously vulnerable. Ultimately, in today's world, the reality is, Hesier says that "most data will have to protect itself."

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.