Thursday, August 20, 2015

Ensuring security when your cloud is compromised

Photo by Nilesh: Nilesh (All Rights Reserved)


Ensuring security when your cloud is compromised
When your entire data is available at the hands of your adversary, how do you make sure that the adversary who now has access to your data, is not really able to do anything with your data. How do you actually make that happen?
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

Many of our clients typically worry about security of their information especially in the context of the cloud.


Premera Insurance data breach, IRS data breach, and this funniest thing that happened recently, this Ashley Madison data breach, that is just hilarious, but you know, data breaches happen and people worry about whether they should allow moving their business processes over to the cloud and that is a fundamental thing that people think about and people just generally worry about security and they tend to think that cloud is somewhat less secure, but actually, security has not really much to do whether you are in the cloud or in your premises in your own corporate datacenter. 


Security is a mindset. Its a way of protecting what you really want to protect at the same time allowing appropriate access based on certain roles and responsibilities that people have. Like the role can be your internal people, role can be outside business partners who interact with your information, it can be customers that access your information, it can be any body on the internet also.


So based on roles, roles based access to information and keeping certain things secure from certain types of roles is the fundamental way of thinking about security. 


Whether you put your information safe in your premises and put armed guards around it or whether you put that inside a virtual private cloud where it is conceptually similar to what you would have in your private data center except that the armed guards are actually managed by somebody else like AWS or Google or some one else like that who will manage that guarded data center. In that area, you will have a segment carved out for you in form of a private cloud. And it is conceptually similar. That is how you should think about security whether it is on-premises or in the cloud. 


People generally worry about security and hesitate to move their operations to the cloud for several reasons. One of the fundamental reasons is that they perceive that they lack physical control over their data. It is not in their hands – they can not touch the machines. Leaving their data in the control of some one else – some other third party company managing your machines, your storage devices, and other things kept far far away from you – you don’t even know exactly which building or which floor in that building or which computer has your data once it goes to the cloud – you have no idea. It is deliberately obscure by design. People may not feel super comfortable with the idea of letting their data, their crown jewels, going away from them and sitting somewhere else they don’t exactly know where. 


The other concern people seem to think of is from the perspective of legality – like who owns that building which will house the cloud and in case of a court order or a subpoena that third party company may be obliged to release their information to the courts or agencies representing the sovereign nations/countries they may be operating in. 


Companies can take some very specific steps to mitigate those specific concerns. And those steps involve, first of all doing a proper audit of where exactly are you moving when you move to the cloud. You need to know which cloud infrastructure is going to provide you assistance in actually taking your crown jewels in form of data, in form of code, in form applications, in form of business processes that you want to take away from your data center in your premises and move them to a cloud. So you need to know and understand exactly where they will land, who can access, what can go wrong, what are the extreme boundary conditions in which things can go wrong. because…let us be very clear…things will go wrong and I can guarantee that Murphy will strike at the worst possible time. You have to plan for these things. If something goes wrong, what will you do? How will you mitigate? How will you correct?


Imagine a case in which somebody actually gets hold of your data. What happens in that case…and there, a concept known as encryption comes into play where whatever you keep inside in a cloud environment…or just about any where including your own private data center locally…that you keep the whole thing encrypted – end to end. From the creation point through the storage point through retrieval and consumption and its eventual disposal – the end to end flow of data from creation to deletion/termination/extinction – that end to end pipe of information needs to be encrypted. Data in flight, data in store, data in retrieval, data being discarded, everything needs to be properly encrypted with the highest level of encryption algorithms available today. And the most important thing in encryption is to make sure that the decryption key is kept in your possession all the time.


Now if by accident, by Murphy’s law, or some other situation, you actually end up losing your data, your critical assets, your applications, critical information about your business, your crown jewels and some bad guy happens to have access to your data – They can not cause much damage because, they can not figure it out or decrypt your information – in their lifetime – they will have no clue – because the whole thing is encrypted. Only you, who has the decryption key, can actually decipher what it says and actually make meaning out of the data.


Encryption is one of the fundamentals things you need to ensure whether you keep data in house on premises or move it to the cloud – it does not really matter much. If it is encrypted, it can stay anywhere you like but make sure to keep the decryption key absolutely safe. Encrypting your data pipe end to end is the single best thing you can do from a security standpoint. And Remember… Never lose the decryption key.


Never lose your decryption key.Nilesh
Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.




Ensuring security when your cloud is compromised

Wednesday, August 19, 2015

Ensuring security when your cloud is compromised

Photo by Nilesh: Nilesh (All Rights Reserved)


Ensuring security when your cloud is compromised
How to ensure security even when your data gets stolen.
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

Many of our clients typically worry about security of their information especially in the context of the cloud.


Premera Insurance data breach, IRS data breach, and this funniest thing that happened recently, this Ashley Madison data breach, that is just hilarious, but you know, data breaches happen and people worry about whether they should allow moving their business processes over to the cloud and that is a fundamental thing that people think about and people just generally worry about security and they tend to think that cloud is somewhat less secure, but actually, security has not really much to do whether you are in the cloud or in your premises in your own corporate datacenter. 


Security is a mindset. Its a way of protecting what you really want to protect at the same time allowing appropriate access based on certain roles and responsibilities that people have. Like the role can be your internal people, role can be outside business partners who interact with your information, it can be customers that access your information, it can be any body on the internet also.


So based on roles, roles based access to information and keeping certain things secure from certain types of roles is the fundamental way of thinking about security. 


Whether you put your information safe in your premises and put armed guards around it or whether you put that inside a virtual private cloud where it is conceptually similar to what you would have in your private data center except that the armed guards are actually managed by somebody else like AWS or Google or some one else like that who will manage that guarded data center. In that area, you will have a segment carved out for you in form of a private cloud. And it is conceptually similar. That is how you should think about security whether it is on-premises or in the cloud. 


People generally worry about security and hesitate to move their operations to the cloud for several reasons. One of the fundamental reasons is that they perceive that they lack physical control over their data. It is not in their hands – they can not touch the machines. Leaving their data in the control of some one else – some other third party company managing your machines, your storage devices, and other things kept far far away from you – you don’t even know exactly which building or which floor in that building or which computer has your data once it goes to the cloud – you have no idea. It is deliberately obscure by design. People may not feel super comfortable with the idea of letting their data, their crown jewels, going away from them and sitting somewhere else they don’t exactly know where. 


The other concern people seem to think of is from the perspective of legality – like who owns that building which will house the cloud and in case of a court order or a subpoena that third party company may be obliged to release their information to the courts or agencies representing the sovereign nations/countries they may be operating in. 


Companies can take some very specific steps to mitigate those specific concerns. And those steps involve, first of all doing a proper audit of where exactly are you moving when you move to the cloud. You need to know which cloud infrastructure is going to provide you assistance in actually taking your crown jewels in form of data, in form of code, in form applications, in form of business processes that you want to take away from your data center in your premises and move them to a cloud. So you need to know and understand exactly where they will land, who can access, what can go wrong, what are the extreme boundary conditions in which things can go wrong. because…let us be very clear…things will go wrong and I can guarantee that Murphy will strike at the worst possible time. You have to plan for these things. If something goes wrong, what will you do? How will you mitigate? How will you correct?


Imagine a case in which somebody actually gets hold of your data. What happens in that case…and there, a concept known as encryption comes into play where whatever you keep inside in a cloud environment…or just about any where including your own private data center locally…that you keep the whole thing encrypted – end to end. From the creation point through the storage point through retrieval and consumption and its eventual disposal – the end to end flow of data from creation to deletion/termination/extinction – that end to end pipe of information needs to be encrypted. Data in flight, data in store, data in retrieval, data being discarded, everything needs to be properly encrypted with the highest level of encryption algorithms available today. And the most important thing in encryption is to make sure that the decryption key is kept in your possession all the time.


Now if by accident, by Murphy’s law, or some other situation, you actually end up losing your data, your critical assets, your applications, critical information about your business, your crown jewels and some bad guy happens to have access to your data – They can not cause much data as they can not figure it out in their lifetime – they have no clue – because the whole thing is encrypted. Only you, who has the decryption key, can actually decipher what it says and actually make meaning out of the data.


Encryption is one of the fundamentals things you need to ensure whether you keep data in house on premises or move it to the cloud – it does not really matter much. If it is encrypted, it can stay anywhere you like but make sure to keep the decryption key absolutely safe. Encrypting your data pipe end to end is the single best thing you can do from a security standpoint. And Remember… Never lose the decryption key.


Never lose your decryption key.Nilesh
Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.



Ensuring security when your cloud is compromised

Friday, August 14, 2015

It"s not yours any more if...

Photo credit: Paul at Flickr (CC BY-SA 2.0)


It"s not yours any more if…
5 cases when your device is not yours any more…
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

  1. It is not your device anymore if…
    • a bad person person has unrestricted physical access to your device


  2. It is not your device anymore if…
    • a bad person can alter its operating system

    • you ignore to update in time and apply patches to known vulnerabilities


  3. It not solely your device if…
    • someone can persuade you to run their app on your device

    • you give permission to install apps from untrusted app stores


  4. You are not in total control your device any more if..
    • you give permission to access your microphone

    • you give permission to access your camera

    • you give permission to access your location/GPS

    • you give permission to vibrate your phone


  5. Your encrypted data is not secure any more if..
    • you manage to lose its decryption key.


Privacy is kind of dead (thanks to social networks)…but don’t let security go out of your control.Nilesh
Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.


The Show Notes


List of app stores


Nilesh on LinkedIn, TwitterGoogle+Facebook

Cloud Genius on LinkedIn, Twitter, Google+, Facebook




It"s not yours any more if...

Thursday, August 13, 2015

It"s not yours any more if...

Photo credit: Paul at Flickr (CC BY-SA 2.0)


It"s not yours any more if…
5 cases when your device is not yours any more…
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

  1. It is not your device anymore if…
    • a bad person person has unrestricted physical access to your device


  2. It is not your device anymore if…
    • a bad person can alter its operating system

    • you ignore to update in time and apply patches to known vulnerabilities


  3. It not solely your device if…
    • someone can persuade you to run their app on your device

    • you give permission to install apps from untrusted app stores


  4. You are not in total control your device any more if..
    • you give permission to access your microphone

    • you give permission to access your camera

    • you give permission to access your location/GPS

    • you give permission to vibrate your phone


  5. Your encrypted data is not secure any more if..
    • you manage to lose its decryption key.


Privacy is kind of dead (thanks to social networks)…but don’t let security go out of your control.Nilesh
Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.


The Show Notes


List of app stores


Nilesh on LinkedIn, TwitterGoogle+Facebook

Cloud Genius on LinkedIn, Twitter, Google+, Facebook




It"s not yours any more if...

Wednesday, August 12, 2015

It"s not yours any more if...

Photo credit: Paul at Flickr (CC BY-SA 2.0)


It"s not yours any more if…
5 cases when your device is not yours any more…
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

  1. It is not your device anymore if…
    • a bad person person has unrestricted physical access to your device


  2. It is not your device anymore if…
    • a bad person can alter its operating system

    • you ignore to update in time and apply patches to known vulnerabilities


  3. It not solely your device if…
    • someone can persuade you to run their app on your device

    • you give permission to install apps from untrusted app stores


  4. You are not in total control your device any more if..
    • you give permission to access your microphone

    • you give permission to access your camera

    • you give permission to access your location/GPS

    • you give permission to vibrate your phone


  5. Your encrypted data is not secure any more if..
    • you manage to lose its decryption key.


Privacy is kind of dead (thanks to social networks)…but don’t let security go out of your control.Nilesh
Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.


The Show Notes


List of app stores


Nilesh on LinkedIn, TwitterGoogle+Facebook

Cloud Genius on LinkedIn, Twitter, Google+, Facebook




It"s not yours any more if...

It"s not yours any more if...

Photo credit: Paul at Flickr (CC BY-SA 2.0)


It"s not yours any more if…
5 cases when your device is not yours any more…
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

  1. It is not your device anymore if…
    • a bad person person has unrestricted physical access to your device


  2. It is not your device anymore if…
    • a bad person can alter its operating system

    • you ignore to update in time and apply patches to known vulnerabilities


  3. It not solely your device if…
    • someone can persuade you to run their app on your device

    • you give permission to install apps from untrusted app stores


  4. You are not in total control your device any more if..
    • you give permission to access your microphone

    • you give permission to access your camera

    • you give permission to access your location/GPS

    • you give permission to vibrate your phone


  5. Your encrypted data is not secure any more if..
    • you manage to lose its decryption key.


Privacy is kind of dead (thanks to social networks)…but don’t let security go out of your control.Nilesh
Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.


The Show Notes


List of app stores


Nilesh on LinkedIn, TwitterGoogle+Facebook

Cloud Genius on LinkedIn, Twitter, Google+, Facebook




It"s not yours any more if...

It"s not yours any more if...

It"s not yours any more if…
5 situations when your device is not your any more…
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

### 1. It is not your device anymore if…

* a bad person person has unrestricted physical access to your device


### 2. It is not your device anymore if…

* a bad person can alter its operating system

* you ignore to update in time and apply patches to known vulnerabilities


### 3. It not solely your device if…

* someone can persuade you to run their app on your device

* you give permission to install apps from untrusted app stores


### 4. You are not in total control your device any more if…

* you give permission to access your microphone

* you give permission to access your camera

* you give permission to access your location/GPS

* you give permission to vibrate your phone


### 5. Your encrypted data is not secure any more if..

* you manage to lose its decryption key.


Summary:


Privacy is kind of dead (thanks to social networks)…

but don’t let security go out of your control.


Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.




It"s not yours any more if...