Welcome!

Java IoT Authors: Pat Romanski, Yeshim Deniz, Liz McMillan, Zakia Bouachraoui, Elizabeth White

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Containers Expo Blog

@CloudExpo: Article

The Four-Way Stop at the Cloud Security Crossroads

Will cloud security provisioning and protection keep pace with the general state of cloud data over the next five years?

Cloud security is in a state of flux. Actually it's not really, but discussion is rife across the industry regarding the general state of cloud data and application welfare. Questions flutter around whether particular services are secure, whether multi-tenant clouds can be locked down and whether "spun down" instances of cloud servers will remain secure so that old customer data is deleted and non-accessible.

Where are we headed with the general consensus on cloud security just now?

A Cloud Is Just a Server
Of course we should start out from first principles and look to comments made the big name cloud providers who have pointed out that the cloud is only as secure as the controls you place upon it, i.e., virtualized hosting services do not come with "security included" as some sort of free gift... and so a cloud server is really just a server but delivered as a service.

How do we now move to mitigate risks in any given cloud deployment scenario and at what point do we bring the shielding defenses to bear upon the data that we seek to protect? Should we look to endpoint security controls as a primary security consideration, or should we focus on network back doors themselves, or both?

Companies such as F5 Networks appear to already be working at the IP address layer to provide more tailored network architectures with better "resource visibility" as applications need to deal with the daily duress of real-world data flows.

Are IP intelligence and application delivery controls enough? These technologies seek to champion the "automation" of application protection mechanisms where they may be enforced. Vendors in this space are also fond of talking about "contextual awareness," i.e., not just for applications so that they can gauge user requirements more intuitively, but also for cloud network traffic controls that can identify and filter data via a Content Delivery Network (CDN) if it appears to be malicious.

The Basic Facts Are...
In basic terms, we have a multiplicity of application controls, data transport vectors and network gateways to deal with in a global cloud computing environment that is barely sure enough of itself to settle on one single agreed set of open architectural standards.

Julian Lovelock of identity assurance and authentication specialist company ActivIdentity sees four "roads" for data travel down in the cloud. Each of these virtual crossroad paths may give us some clues as to the best route to deliver an Identity and Access Management (IAM) solution he says.

  1. Open Access: Data is accessible on the public Internet where usernames and passwords are managed by SaaS providers - it's argued this solution offers the "least amount of protection for your data" with minimal control.
  2. Behind the VPN: This option enables remote users to first authenticate to the VPN (most likely via a One Time Password [OTP[ solution), then enter username and password.
  3. Federated Identity Management: The user authenticates to a central portal through which he gains access to multiple applications.
  4. Native Strong Authentication: Strong authentication deployed separately in each individual cloud software application.

ActivIdentity's laying down of these four crossroad paths is unlikely to be an exhaustive future-proofed definition of the complete who, when, why, what and where of how we need to approach this issue, but it's arguably a pretty good starting point in an arena largely bereft of clear definitive statements in this vein.

We must also look to the multifarious nature of threats that can develop here from Advanced Persistent Threats (APTs), to ad hoc hacking and onward to attacks that may originate from internal or former employees. While security vendors in this space would like us to believe that solutions do exist that don't compromise on usability or convenience in the face of the Bring Your Own Device (BYOD) phenomenon, to place complete trust in any perimeter defense at this stage still requires what appears to be a considerable leap of blind faith.

Are we being too skeptical and cynical here by far? HP's approach to cloud security appears to be somewhat more open ended than some; the firm's central cloud security portal says upfront that it exists to try and "determine future cloud computing requirements" as well as data center and application design principles.

Open Research Has the Answer
The answer to our worries and concerns in this space will most likely not come from any single vendor or solution provider of any kind. The real answers many purists would argue are most likely to come from lab research collaborations such as the Gnosis process simulation language and tool that seek nothing more than the truth without and brand-driven agenda.

Will cloud security provisioning and protection keep pace with the general state of cloud data and application hosting over the next five years? The answer is that is has to - otherwise we will fail to grasp the wider and deeper benefits of virtualization as they exist in full.

•   •   •

This post was first published on the Enterprise CIO Forum.

More Stories By Adrian Bridgwater

Adrian Bridgwater is a freelance journalist and corporate content creation specialist focusing on cross platform software application development as well as all related aspects software engineering, project management and technology as a whole.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
Early Bird Registration Discount Expires on August 31, 2018 Conference Registration Link ▸ HERE. Pick from all 200 sessions in all 10 tracks, plus 22 Keynotes & General Sessions! Lunch is served two days. EXPIRES AUGUST 31, 2018. Ticket prices: ($1,295-Aug 31) ($1,495-Oct 31) ($1,995-Nov 12) ($2,500-Walk-in)
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...