Where, for example, is my data really being stored? What happens when I delete it - is it really deleted, or is there a backup somewhere I'm not aware of? These are questions that need to be asked by the audit team before negotiations with the cloud service provider begin.
We are at the start of a huge learning curve with cloud security and many organizations are contracting with cloud service providers without undertaking the due diligence that their board of directors - and where appropriate, shareholders - are looking for.
Generally speaking there are four main cloud services that companies of all sizes are looking for - applications, data storage, infrastructure and platform - and they all are linked. Most cloud services are offered on a shared server basis, that is, the IT resources on a given server are shared between multiple organizations. Some companies are going down the route of signing up for non-shared cloud services that are offered on a secure basis by the likes of IBM and Unisys.
Even though this effectively means a company's data storage facilities are installed remotely, the economies of scale of major data centers make such services cost-effective - though not as highly cost-effective and environmentally friendly as shared cloud services.
Introducing risk analysis to the cloud selection process
Virtually all company IT systems are engineered to support physical drives, so integrating a cloud environment into the IT resource usually involves a lot of work on the software and integration front. In the real world, you can see your PC or drive has been stolen, but in the virtual world, there are no such comforts. As a result, meeting compliance and regulation issues is very difficult. Even secure cloud services have an increased risk of data going walkabout - for any reason - than having your organization's data neatly tucked up on your own servers.
To counter these issues, it is necessary to employ a carefully defined risk analysis of IT systems and procedures before a decision on which cloud technology and service is the best option for your organization, before later steps such as the creation of service level agreements, remediation procedures and penalty clauses are started. The four main stages in this analysis are as follows:
1. ID management and Access Control - who is authorized to do what and when.
2. Regulatory requirements – Basel II, SOX, PCI, SAS70
3. Data handling processes - where is the company's data located? And how is it managed?
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.