Maintaining Compliance in the New Era of Cloud Apps and Shadow

Maintaining Compliance
in the New Era of
Cloud Apps and Shadow Data
Introduction
In the 2H 2015 Shadow Data Report, Elastica Cloud Threat Labs analyzed over 63M documents stored in
popular file sharing apps like Office 365 and Box, and found that 26% of them were broadly shared – that
is shared broadly within the organization or externally. Of these, 1-in-10 were found to contain compliancerelated data, such as PII, PCI, PHI and source code. With partners, third parties and even employees rushing
to deploy cloud apps and services – often without the knowledge or sanction of IT – the risk to companies
from compliance violations resulting from the mishandling or leakage of this data will only continue to
increase. This paper will discuss cloud compliance regulations, the potential costs and risks of violating
them, and the critical steps necessary to ensure cloud data compliance.
Why is maintaining compliance in the cloud critical for today’s
businesses?
“... many [organizations]
IT departments are being forced
out of business necessity to quickly
move to the cloud.”
Software-as-a-Service (SaaS) delivered via the public cloud is one of
the fastest growing IT technologies being tracked by Forrester. They
report that worldwide spending on the SaaS market is expected to
grow at the rate of 21 percent over 2015, reaching $106 billion by
the end of 2016. It’s quite likely that SaaS growth projections could
be even higher if it weren’t for prospective users’ lingering concerns
about protecting sensitive data and compliance. According to
Forrester analyst Liz Herbert, “Security is the No. 1 reason preventing
firms from moving to SaaS.”
However, many IT departments are being forced out of business necessity to quickly move to the
cloud. Even though their #1 concern is governance and security, they’re still moving to the cloud without
an understanding of how they plan on governing and securing it, placing them at tremendous risk of
compliance violations and the resultant fines and remediation costs.
What are the regulations that govern compliance in the cloud?
When enterprises make the decision to adopt cloud apps and services, they are choosing to hand control
of their data to third-party cloud service providers. For some types of data, this is not a problem, but for
consumer financial data, patient medical records, sensitive product-related data, or personally identifiable
1
Copyright © 2014 Elastica, Inc. | www.elastica.net
information (PII), the cloud introduces a series of complex compliance challenges. As a result, data
compliance and privacy professionals take a keen interest in how data is being treated in cloud apps and
services. Violations of these regulations can result in heavy fines.
Compliance regulations fall into three broad categories:
Data residency/privacy legislation – laws in specific states, countries or governmental associations such
as the European Union (EU) that dictate that sensitive or private information may not leave the physical
boundaries of the country or region (residency), and that the information should not be exposed to
unauthorized parties (privacy). Example legislation includes:
•
The United Kingdom Data Protection Law
•
The Swiss Federal Act on Data Protection
•
Russian Data Privacy Law
•
The Canadian Personal Information Protection and
•
Electronic Documents Act (PIPEDA)
The EU Data Protection Directive is also an important piece of data privacy legislation that regulates how
data on EU citizens needs to be secured and protected. With the European Court of Justice’s ruling in 2015
that the Safe Harbor framework is inadequate to protect the privacy rights of EU citizens when their data is
processed in the United States, data privacy professionals expect to see additional data privacy legislation
and restrictions appear across Europe.
Industry-specific compliance requirements – laws or mandates covering a specific industry, type of
business or government agency that prescribe the appropriate treatment and security of private or sensitive
information. Examples of these types of requirements include:
•
The Health Information Portability and Accountability Act (HIPAA)
•
International Traffic in Arms Regulations (ITAR)
•
The Health Information Technology for Economic and Clinical Health (HITECH) Act
•
The Payment Card Industry Data Security Standards (PCI DSS)
Third party obligations – agreements among business partners that outline how a party such as a
contractor or vendor will handle and treat private or sensitive data belonging to another organization. Such
agreements often hold the external party accountable for securing the data in the same fashion as the
owner of the data, including adherence to all residency, privacy and compliance requirements. For example,
a contracted agency performing billing for a hospital in the U.S. must observe all the data protection
requirements mandated by HIPAA and HIT.
In view of all the residency and compliance requirements that companies face, it’s a challenge to strike a
balance between safeguarding sensitive data and attaining maximum benefit from SaaS applications. Given
the strict nature of compliance requirements and the penalties for exposing sensitive data, enterprises and
2
Copyright © 2014 Elastica, Inc. | www.elastica.net
organizations need to ensure that they meet specific requirements in the cloud.
CASB solutions are playing a critical role in helping compliance and security professionals achieve this by
ensuring:
•
cloud apps and services have the appropriate security certifications.
•
certain clouds are blocked from receiving specific types of regulated data.
•
regulated data, that does legitimately need to be placed in the cloud, is secured per
compliance guidelines.
If I restrict my employees to only use mainstream enterprisegrade SaaS apps, won’ít that solve the compliance problem?
To date, the security focus has been on unsanctioned third-party cloud services used inside the
organization – what we know as Shadow IT. But what is actually much more crucial from a data governance
and compliance perspective, is Shadow Data. Shadow Data refers to all the sensitive content that users are
uploading, storing and sharing via cloud apps—often without the oversight and knowledge of IT or security
personnel. In other words, just because an organization has selected a robust file sharing app, like Box or
Office 365, does not mean they are out of the woods in terms of data governance or compliance liability.
Even with the adoption of more secure cloud apps, we find that organizations often have no understanding
of where the actual data is, how it is classified, or how it is being shared. And this understanding is a
prerequisite to understanding what regulatory mandates are in scope and the potential risk exposure of that
data can pose to the organization. In the 2H Shadow Data Report, Elastica found that approximately 10%
of cloud-stored documents actually contain compliance related data. We can break that down even further.
48% of these compliance relevant files contain source code, 33% contain PII or personally identifiable
information, things like Social Security numbers. 14% contain PHI, or protected health information that might
constitute a violation of HIPAA, the health information portability and accountability act. 5% contain PCI, or
A user broadly shares
185 files
on average
SSN
CODE
48%
PII
33%
PHI
14%
PCI
5%
payment card information. And these statistics were taken from applications that were actually sanctioned
and approved.
Compliance in the context of public cloud is not just about understanding Shadow IT, but about having
visibility into Shadow Data.
3
Copyright © 2014 Elastica, Inc. | www.elastica.net
What role does tokenization and encryption play in cloud
compliance?
It is simply not an option to place clear text data in the cloud, as
this would violate the data protection tenets in a variety of ways.
For one, the SaaS provider may process or store data on servers
“... SaaS providers rarely accept full
(either primary or in backup locations) that are not physically located
accountability in their SLAs for the
in a region that is covered by strict data residency laws. Next,
security of their customers’ data,
employees of the SaaS provider have access to the data as they
leaving the customers with full
perform routine processes and maintenance, such as data backups
liability in the event of a breach.”
or server upgrades, and these employees are frequently located in
other regions. This incidental access, though necessary under the
SaaS provider’s service level agreement (SLA), still violates strict policies or regulations covering who is
authorized to view or handle the data. And finally, SaaS providers rarely accept full accountability in their
SLAs for the security of their customers’ data, leaving the customers with full liability in the event of a
breach.
Under these circumstances, organizations have a choice to make: say “no” to the cloud and its numerous
collaboration and efficiency benefits, or find the means to definitively address the residency and
compliance issues when working with sensitive data. Given that SaaS computing has become a multi-billion
dollar business globally, it’s clear that organizations are finding ways to protect their data in the cloud –
some more useful than others depending on the situation and the design.
The issues discussed above largely stem from data being “in the clear.” Anyone who can access the data,
whether they are authorized to do so or not, can clearly see the meaning and values of the data. The way
to resolve this problem is to “obfuscate” the data – that is, make it unreadable or meaningless so that if the
data is breached, it’s unusable by the intruder.
Encryption
Encryption is the process of using an algorithmic scheme to transform plain text information into a nonreadable form called ciphertext. The mathematical algorithm that turns plain text into ciphertext, or vice
versa, is called a key.
It’s possible to use a single key to both encrypt the information and to decrypt (or unencrypt) it and return
the information to its original plain text format. In practice, however, it’s much more secure to use one key to
encrypt data and another separate key to decrypt it. An even better practice is to use a unique pair of keys
for each field of data being encrypted. This multiple key practice provides an extra level of security, so that if
one field is compromised, the others around it aren’t.
Tokenization
4
Copyright © 2014 Elastica, Inc. | www.elastica.net
Tokenization is the process of randomly generating a substitute value, or token, that is used in place of real
data, where the token is not computationally derived in any way, shape or form from the original data value.
The most common form of tokenization uses a highly secure lookup table (called a vault) to keep track of
the relationships between real data and the substitute token values.
Because tokens are totally random, there is no relationship among them. Guessing one token doesn’t get
an intruder any closer to figuring out any of the other tokens. There’s no key or computation that unlocks
all the tokens once an intruder has figured one out. Tokenization is viewed as the strongest way to use
replacement data for original clear text values. With encryption, the value of an encrypted field is reversible
to get to the original value; with tokens, there’s no reversibility.
Encryption vs. tokenization – which should I choose?
As they make plans to adopt SaaS applications, user organizations have to consider when to use each
of these two obfuscation techniques. There’s no clear indicator of when one solution is any better
than the other. Encryption and tokenization are not necessarily competing technologies; they are often
complementary to one another. In fact, encryption is an essential component of a tokenization solution
because every token server relies on encryption and associated key management to safeguard data in the
token vault.
An Organization Needs to Consider:
•
What are the objectives of the business process using the SaaS application?
•
What information needs to be secured?
•
How will that data be used?
•
What regulations, policies and other external requirements drive how we handle our data
and do they specify a certain obfuscation approach?
Some mandates and regulations dictate that encryption must be used to safeguard the data. This may
be more a factor of the newness of tokenization as an obfuscation technique than it is a statement of
the effectiveness of tokenization or encryption. While encryption has existed for decades, tokenization
as a viable technology has only existed since about 2005. As mentioned earlier, the most common use
of tokenization today is to meet PCI DSS compliance requirements. However, as of the writing of this
document the PCI DSS specifications do not say anything at all about tokenization. (The PCI Security
Standards Council is only now considering tokenization as an added security measure.) That said, a user
organization must still consider if it is under a mandate to use encryption as a specific security solution.
Encryption has advantages over tokenization in certain circumstances. As discussed earlier, organizations
willing to accept less stringent obfuscation approaches can weaken encryption algorithms in order to
support specific functionality in a SaaS application. (Note that this is not permissible for U.S. federal
government agencies or their contractors that must adhere to the FIPS 140-2 standard.) Tokenization
5
Copyright © 2014 Elastica, Inc. | www.elastica.net
solutions also require more storage capacity than encryption solutions, so this needs to be taken into
consideration for use with large databases.
Similarly, tokenization has its advantages over encryption in certain circumstances. It is most helpful in
meeting residency/privacy requirements which prohibit data – in the clear or as ciphertext – from crossing
a physical border. User organizations that must keep sensitive data
within a specific country or region can do so by securing the real
“Given the right security platform,
data in a token vault on premise while placing meaningless tokens
the organization may be able to
in the cloud. What’s more, for common SaaS data storage and data
validation, tokens are generally better than encryption at maintaining
use one product that can tokenize
format requirements such as field lengths and character validation.
one field or fields and encrypt
others based on specific business
needs.”
In addition, there are operational factors to consider. Encryption
requires key management, rotation, custodians, policies, and so on.
Tokenization requires the careful management of the token database
(and the infrastructure to support a token database). Many organizations find that tokenization is less taxing
to manage from an IT perspective, but others have automated key controls and existing policies and tools
that facilitate the use of encryption.
An organization can use a hybrid approach, using both tokenization and encryption to safeguard data; it
doesn’t have to be an either/or proposition. Given the right security platform, the organization may be able
to use one product that can tokenize one field or fields and encrypt others based on specific business
needs.
What is the liability companies have from using various
cloud apps, and should the cloud provider shoulder any
of this responsibility?
The most pressing security issue for cloud service providers is protecting the back-end infrastructure from
outside attacks. But organizations also have to be concerned about front door attacks. For example, user
accounts getting compromised via phishing attacks or through a device being lost or stolen are cause for
alarm. It is also important not to forget that not every threat originates from the outside. Malicious insiders
might try to access sensitive data. Or you could also have a situation where an employee accidentally
shares data with someone who wasn’t supposed to access it.
Unfortunately, we cannot reasonably expect that cloud service providers will assume responsibility for
providing more comprehensive data security capabilities for customers. Indeed, many cloud providers take
a shared responsibility approach – they are responsible for the infrastructure, the customer is responsible
for managing how documents are being shared.
In regulated industries, you have an obligation to manage compliance related data yourself. If you’re
6
Copyright © 2014 Elastica, Inc. | www.elastica.net
in banking, FFIEC says you should treat the cloud like any other third-party application – it needs to go
through a vetting process, it needs to go through security, and it needs to follow change management.
But there are also other things to be concerned about. For instance, using Dropbox and Google Docs can
cause compliance related data to end up on the Internet. The truth is, if they need to share a large data
file that won’t go out through corporate email, end-users will leverage these content sharing platforms
to solve the immediate business problem, not realizing or perhaps not caring that they are also creating
a compliance and/or security issue and introducing significant risk to the company. When sharing this
data over large portals like this where anybody can get it, cloud app
vendors will tell you they have no liability for the data loss – all of the
liability is yours. That poses a huge problem with respect to the FTC,
“[corporate IT compliance and
the most active federal agency actively regulating privacy and data
security professionals] are
responsible for data that is entirely
out of their control with users who
may or may not be following the
rules, even though they are flying
completely blind.”
security since the late nineties.
Virtually all cloud app vendors will tell you that if your company gets
breached, it’s your responsibility – not theirs. A lot of that is going to
change in Europe with regard to updates for EU privacy directives
that share culpability for data breaches and mandate violations with
both the data controller and data processor – it will also be the cloud
vendors’ problem, not just the European data owners’ problem. But,
that will probably not happen in the US, so organizations will not have as much leeway in risk transfer or risk
sharing as cloud application adoption grows.
So, the onus will continue to fall on corporate IT compliance and security professionals to make sure that
they are securing cloud apps. They are responsible for data that is entirely out of their control with users
who may or may not be following the rules, even though they are flying completely blind.
What industries are most affected by cloud compliance
issues?
Healthcare organizations, for one. Many healthcare organizations are looking to take advantage of new
cloud-based clinical and support applications that improve patient care and collaboration while reducing
costs. Yet, concern about patient data security is keeping many of these organizations from fully utilizing
these new solutions. Breaches of healthcare data are common due to the high value that stolen medical
records command – and the costs of a breach, at $359 per lost or stolen record, are especially high. Clouds
that aggregate information from many organizations only add to the concern because they make for bigger,
more lucrative targets. As a result, healthcare organizations either find themselves trapped on legacy
systems. or, when they do move to the cloud, they adopt private cloud solutions that are far more costly and
inefficient than their public-cloud counterparts.
Surprisingly, financial services firms have also begun adopting cloud quite heavily. Things like lower cost
and improved manageability have been their key drivers. Financial services firms are looking to the cloud
7
Copyright © 2014 Elastica, Inc. | www.elastica.net
for both state-of-the-art functionality and a pay-as-you-go model that will allow them to add new features
without capital expenses. Traditionally, a key inhibitor for migrating over to the cloud has been compliance,
mainly because any type of regulated industry like finance has to be able to have or maintain some level of
granular logging capability and must be able to provide details of how applications are being used.
That being said, virtually all industries are vulnerable to data compliance violations, as most organizations
have some compliance related data exposed in the cloud – be it customer PII, source code, IP or legal
documents.
How can I ensure my cloud vendors conform to the necessary
compliance guidelines?
Many internal and external compliance guidelines specify that regulated data can only be placed in clouds
that have baseline levels of security in place. Some representative examples of security certifications for
compliance include:
•
Statement on Standards for Attestation Engagements (Length SSAE) 16 Service
Organization Control (SOC) 2: The dimensions along which SOC2 compliance is
measured include security, availability, processing integrity, confidentiality, and privacy. An
organization that meets the relevant criteria is demonstrating to its customers that it offers
essential safeguards with regard to how it handles customer data.
•
Format ISO 27001: As a widely recognized industry standard, adherence to ISO 27001
represents that an organization’s Information Security Management System (ISMS)
complies with ISO 27002. Akin to SOC2, the best practices entail that organizations take a
systematic approach to evaluating their own information security risks and have accounted
for threats as well as vulnerabilities in the process. Beyond that, the standard entails the
design and implementation of information security controls and ongoing management
processes to mitigate these risks appropriately.
•
Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM): Drawing from other
standards, such as ISO 27001, the Cloud Controls Matrix developed by the Cloud Security
Alliance provides a cloud-centric security control framework geared towards helping
organizations assess the risk of the cloud services providers they use.
Companies need to ensure that their cloud providers conform to the company’s compliance guidelines.
For example, most information security-related compliance regimes include language around password
authentication. As part of that, they may mandate the use of mechanisms like strong passwords and twofactor authentication. If an organization needs to comply with one of these regimes, then they need to
ensure that the cloud service provider they employ also offers the same mechanisms.
8
Copyright © 2014 Elastica, Inc. | www.elastica.net
How do traditional compliance strategies fit into my cloud
compliance strategy?
If many of your applications are hosted in the cloud, you need to ensure identity and access management,
endpoint management, system development, and cycle management. Just because you migrated to the
cloud doesn’t mean you’re not responsible for these anymore. In fact, you have actually made your job a
little bit more difficult. At the end of the day you have no idea how Google runs Google. You have no idea
how Salesforce run salesforce.com. So you have to trust what they are doing is correct.
Trust, however, is not a control. So if you think the cloud is getting you out of doing all of the processes that
are required for compliance, it’s not. Now you have to deal with a third party to answer all of these questions
that you could’ve answered yourself had that application been in-house.
“The cloud is a shortcut to
provisioning, but it’s not a shortcut
to documenting the effective
implementation of data compliance
and security controls.”
The idea that you can provision a server in the public cloud in seven
minutes, that’s awesome. But where you may have saved two to
three days on getting a server live, you cannot cut corners on data
classification or risk management. It is still going to take you a lot of
time to figure out where this thing is going to go, how you’re going to
manage it, what kind of security you’re going to put it under, and what
kind of users can attach to it. The cloud is a shortcut to provisioning,
but it’s not a shortcut to documenting the effective implementation of
data compliance and security controls.
And if we talk about the migration requirement, the old strategies are not the same in the cloud. You can’t
just look at your business continuity and disaster recovery plan to determine what goes into the cloud,
because that would tell you development time doesn’t count. Nor can you say that business continuity and
disaster recovery are critical and should stay in-house, but everything else should go to the cloud. You have
to rethink this. How important is this data? Do you want production data in the public cloud with no controls
around it? Of course you don’t.
So you can’t think of your old traditional ways of what is important and what is not. You really have to
lean on data classification to sort that out. Classification in the cloud is entirely different, and monitoring is
absolutely important. You can’t manage what you don’t measure. You have to understand your classification,
and monitor what’s in the cloud, how it’s being used, where it ends up, and who has access to it. Without
this, you open yourself up to a level of risk that you probably can’t tolerate.
From a technical perspective, why can’t I simply use my
existing security and compliance tools in the cloud?
Traditional enterprise applications were typically deployed on-premises, sanctioned, and deployed by IT
organizations, and protected within a well-defined boundary. Security management was something like
9
Copyright © 2014 Elastica, Inc. | www.elastica.net
a security operation center (SOC), which in itself was fueled from data collected from a stack of security
offerings. Those security offerings included things like IDS/IPS, risk and vulnerability assessment tools, data
loss prevention (DLP), firewalls, SIEM solutions, eDiscovery, and network forensics.
Today we are seeing a world where applications like SAP, Oracle, SharePoint, and Exchange are being
replaced by cloud services like Salesforce, Box, Office 365, and Gmail. So on one hand, deployment is
simpler, but on the other, you lose visibility. Suddenly you have an
end-user using a non-enterprise owned device, transmitting data to
a non-enterprise managed server, over a non-enterprise controlled
“... we ultimately need to develop
network, and all of that is being facilitated by a non-enterprise app. It
the cloud analogs of all of the key
is a perfect storm of security concerns.
pieces of the traditional security
stack.”
But those concerns are ultimately predicated on the lack of visibility
that traditional enterprise technologies had. When it comes to the use
of cloud services hosted on public cloud infrastructure, we ultimately
need to develop the cloud analogs of all of the key pieces of the traditional security stack. For example, we
need the cloud analog of discovery and network forensics. That would constitute some kind of investigative
application that would provide continuous monitoring and logging capabilities, helping answer important
questions around how cloud related incidents took place.
And when it comes to things like firewall and DLP capabilities, the cloud based analog could be some type
of application that would enable you to do policy enforcement at a level of granularity that the typical Next
Gen Firewalls don’t give you.
For something like IDS/IPS, the analogous functionality in the cloud would be some kind of application that
would help you to detect whether an outsider had compromised a cloud account, where a legitimate cloud
session was somehow corrupted by malware, or whether you an insider engaging is nefarious behaviors.
What are best practices for managing compliance risk with
regards to the cloud?
How do you secure your sensitive customer information? The following best practices will help you get
started.
Ensure your cloud apps and services are certified.
Make sure your cloud apps and services have the necessary certifications and security functionality. You
can use a Cloud Access Security Broker (CASB) solution to analyze the credentials of existing sanctioned
and unsanctioned (shadow IT) cloud apps to make sure they comply with any external or internal data
security requirements.You should also restrict access to those cloud applications that cannot be brought
into compliance.
10
Copyright © 2014 Elastica, Inc. | www.elastica.net
Understand your cloud data.
Understand if regulated data is being placed in cloud applications and make sure there is a legitimate
business reason for placing it there. a CASB solution that uses data science and natural language
processing to classify Shadow Data. This can help ensure that sharing of regulated data or information that
has been classified as sensitive is properly controlled and managed. In situations where the data does not
need to be there, use the CASB to set policies that block it from being placed in the cloud. This limits the
organization’s points of exposure and reduces the chances of running into costly and complicated data
compliance issues.
Make sure the right security policies are in place when business needs dictate that regulated data must
be stored and processed in cloud apps.
To assist with compliance, put additional data protection policies in place such as tokenization or encryption.
In addition, take advantage of solutions that limit access to this data to only those business users that really
need to see it. Monitor actions taken against this data and maintain these logs for auditors and compliance
assessors.
Do as much awareness training as you can.
The idea that everybody knows the cloud because we all have an iPhone, is not true. We call awareness
training ‘engaging the human firewall’.
Adopt a solid security framework.
As far as regulations are concerned, FedRAMP is one of those you want to pay attention to as it talks about
virtualization hypervisors, privacy in shared data centers, and it is a requirement if you are a cloud provider
today. And if you want to work with the federal government, you have to be FedRAMP compliant. FedRAMP
compliance is a little over 1,100 data audit points – 1,100 different tests that need to be performed on the
environment. It takes about six months to get compliant. Right now there are only 23 companies that are
actually FedRAMP compliant – that’s how hard it is to do. The federal government won’t go into a data
center that’s not FedRAMP compliant.
Security frameworks are another great way to see if we are doing what we are supposed to be doing. The
one that counts here is the Cloud Security Alliance. This is the UK’s version of the FedRAMP document, and
there is actually a 100% overlap. The CSA one is more from a practitioner perspective, rather than an auditor
perspective. Together those two documents tell you exactly what with the expectation should be for a cloud
provider, or your own data center where you are using it as a private cloud.
Understand what data assets you need to have in the cloud.
You need a clear understanding of what data you need to have in the cloud. If you must keep sensitive or
regulated data in the cloud, classify it with the correct sensitivity level. Later, perform an audit to confirm that
the proposed security treatment and risk mitigation strategies have been implemented.
Implement data classification and link management.
Understand what is in the cloud and the associated risks, and mitigate them. We can mitigate risk by
monitoring the cloud and making sure we have single sign-on and dual authentication.
11
Copyright © 2014 Elastica, Inc. | www.elastica.net
Define what systems, people and processes need access.
To select appropriate technical controls and activities to protect confidential data that must be accessed via
the Cloud, map out how the information flows over time and how multiple applications and people access
and process it for various purposes.
Develop internal data governance and risk management policies.
Clearly define your firm’s privacy and security policies. These policies should determine what data you
need to protect – and what you don’t need to protect. Never compromise internal security best practices
designed to ensure data control, confidentiality and privacy when using shared IT infrastructure through a
Cloud Service Provider.
Determine the relevant external data privacy security requirements.
One example of the many types of regulations that apply to the financial services industry is Gramm Leach
Bliley. GLB requires firms to establish standards for protecting security and confidentiality of customers’
personal information. Section 501 (b) says these standards must secure privacy of customer info and
records; provide ongoing protection against threats and prevent unauthorized access and use of customer
data. The Financial Privacy Rule requires firms to provide an annual notice to customers explaining how
their data is maintained and shared as well as the steps they take to protect it. The Safeguards rule requires
them to implement an information security program.
While the act does not prescribe methods for meeting these requirements, one of the measures it
recommends is encryption of electronic customer information.
Similarly, in Australia, the Office of the Australian Information Commissioner has set out the National Privacy
Principles (NPP) that cover the process of collection, use, disclosure, access, correction and identification
of personal information. These require reasonable security and rigorously control data that flows across
Australian borders.
Separate duties.
Putting encryption or tokenization in the hands of cloud service providers can leave your enterprise open to
additional risks of data disclosure. A best practice for data privacy and governance is segregation of duties.
If you encrypt/tokenize data, don’t give the provider (where the data resides) access to the encryption key
or token vault.
Secure data at rest, in-motion and during cloud-processing.
Discussions about cloud security and privacy often focus on the service itself, as well as the cloud service
provider’s privacy and security quality and practices. But it is essential to also secure data as it flows in and
out of the cloud as well as when it is being processed in the cloud. Thus, another best practice is to secure
not only data at rest but also and data in motion (while it is traversing to the cloud as well as when it is
moving within the cloud). Data at rest is data in storage – whether that’s in the cloud, on premises or when
using a Cloud Data Protection Platform, in the platform. Data in motion is data in transit between the end
user and the application as well as when it is being processed within the cloud application (i.e. a report is
being generated).
12
Copyright © 2014 Elastica, Inc. | www.elastica.net
Ensure that your applications will remain fully usable.
In some cases, adding security makes the application unusable for business users. Server-based
encryption can “break” application functionality that end users depend on, such as the ability to search and
sort information or to create reports and send cloud-based e-mails. Make sure security preserves all of the
functionality your users need from the cloud application.
Take advantage of existing investments.
The solution should leverage your existing infrastructure as much as possible. It should interoperate with
the other security layers within your enterprise, such as SSO/IAM. In addition, make sure it supports multiple
cloud applications. This allows you to use the same deployment hardware and software to protect all your
cloud applications and centralize and automate data protection policy management for consistency.
Leverage existing training and expertise.
Organizations have existing investments not only in technology but also in training people on that
technology. For example, they may already have a key management system in place. Be sure that the
solution allows you to leverage any investments you’ve made in your human capital.
Conclusion
Ultimately, cloud adoption is only going to grow and the trend is not going to be reversed. But adoption can
only be done securely if you maintain visibility and control over the authorized and unauthorized cloud apps
and services running within your organization, classify the data stored in them, and maintain an effective use
policy that ensures that sensitive and compliance related data isn’t maliciously or inadvertently exposed.
About Blue Coat & Elastica
Blue Coat is a leader in advanced enterprise security, protecting 15,000 organizations. Through the Blue
Coat Security Platform, Blue Coat unites network, security and cloud, providing customers with maximum
protection against advanced threats, while minimizing impact on network performance, and enabling cloud
applications and services. Blue Coat acquired Elastica, the leader in Data Science Powered™ Cloud Access
Security, in November 2015. The Elastica CloudSOC™ platform from Blue Coat empowers companies to
confidently leverage cloud applications and services while staying safe, secure, and compliant. Blue Coat
was acquired by Bain Capital in March 2015.
For additional information, please visit bluecoat.com and elastica.net
13
Copyright © 2014 Elastica, Inc. | www.elastica.net