Welcome!

Java IoT Authors: Yeshim Deniz, Pat Romanski, Liz McMillan, Elizabeth White, Zakia Bouachraoui

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Containers Expo Blog

@CloudExpo: Article

The Four-Way Stop at the Cloud Security Crossroads

Will cloud security provisioning and protection keep pace with the general state of cloud data over the next five years?

Cloud security is in a state of flux. Actually it's not really, but discussion is rife across the industry regarding the general state of cloud data and application welfare. Questions flutter around whether particular services are secure, whether multi-tenant clouds can be locked down and whether "spun down" instances of cloud servers will remain secure so that old customer data is deleted and non-accessible.

Where are we headed with the general consensus on cloud security just now?

A Cloud Is Just a Server
Of course we should start out from first principles and look to comments made the big name cloud providers who have pointed out that the cloud is only as secure as the controls you place upon it, i.e., virtualized hosting services do not come with "security included" as some sort of free gift... and so a cloud server is really just a server but delivered as a service.

How do we now move to mitigate risks in any given cloud deployment scenario and at what point do we bring the shielding defenses to bear upon the data that we seek to protect? Should we look to endpoint security controls as a primary security consideration, or should we focus on network back doors themselves, or both?

Companies such as F5 Networks appear to already be working at the IP address layer to provide more tailored network architectures with better "resource visibility" as applications need to deal with the daily duress of real-world data flows.

Are IP intelligence and application delivery controls enough? These technologies seek to champion the "automation" of application protection mechanisms where they may be enforced. Vendors in this space are also fond of talking about "contextual awareness," i.e., not just for applications so that they can gauge user requirements more intuitively, but also for cloud network traffic controls that can identify and filter data via a Content Delivery Network (CDN) if it appears to be malicious.

The Basic Facts Are...
In basic terms, we have a multiplicity of application controls, data transport vectors and network gateways to deal with in a global cloud computing environment that is barely sure enough of itself to settle on one single agreed set of open architectural standards.

Julian Lovelock of identity assurance and authentication specialist company ActivIdentity sees four "roads" for data travel down in the cloud. Each of these virtual crossroad paths may give us some clues as to the best route to deliver an Identity and Access Management (IAM) solution he says.

  1. Open Access: Data is accessible on the public Internet where usernames and passwords are managed by SaaS providers - it's argued this solution offers the "least amount of protection for your data" with minimal control.
  2. Behind the VPN: This option enables remote users to first authenticate to the VPN (most likely via a One Time Password [OTP[ solution), then enter username and password.
  3. Federated Identity Management: The user authenticates to a central portal through which he gains access to multiple applications.
  4. Native Strong Authentication: Strong authentication deployed separately in each individual cloud software application.

ActivIdentity's laying down of these four crossroad paths is unlikely to be an exhaustive future-proofed definition of the complete who, when, why, what and where of how we need to approach this issue, but it's arguably a pretty good starting point in an arena largely bereft of clear definitive statements in this vein.

We must also look to the multifarious nature of threats that can develop here from Advanced Persistent Threats (APTs), to ad hoc hacking and onward to attacks that may originate from internal or former employees. While security vendors in this space would like us to believe that solutions do exist that don't compromise on usability or convenience in the face of the Bring Your Own Device (BYOD) phenomenon, to place complete trust in any perimeter defense at this stage still requires what appears to be a considerable leap of blind faith.

Are we being too skeptical and cynical here by far? HP's approach to cloud security appears to be somewhat more open ended than some; the firm's central cloud security portal says upfront that it exists to try and "determine future cloud computing requirements" as well as data center and application design principles.

Open Research Has the Answer
The answer to our worries and concerns in this space will most likely not come from any single vendor or solution provider of any kind. The real answers many purists would argue are most likely to come from lab research collaborations such as the Gnosis process simulation language and tool that seek nothing more than the truth without and brand-driven agenda.

Will cloud security provisioning and protection keep pace with the general state of cloud data and application hosting over the next five years? The answer is that is has to - otherwise we will fail to grasp the wider and deeper benefits of virtualization as they exist in full.

•   •   •

This post was first published on the Enterprise CIO Forum.

More Stories By Adrian Bridgwater

Adrian Bridgwater is a freelance journalist and corporate content creation specialist focusing on cross platform software application development as well as all related aspects software engineering, project management and technology as a whole.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...