Thursday, August 20, 2015

Ensuring security when your cloud is compromised

Photo by Nilesh: Nilesh (All Rights Reserved)


Ensuring security when your cloud is compromised
When your entire data is available at the hands of your adversary, how do you make sure that the adversary who now has access to your data, is not really able to do anything with your data. How do you actually make that happen?
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

Many of our clients typically worry about security of their information especially in the context of the cloud.


Premera Insurance data breach, IRS data breach, and this funniest thing that happened recently, this Ashley Madison data breach, that is just hilarious, but you know, data breaches happen and people worry about whether they should allow moving their business processes over to the cloud and that is a fundamental thing that people think about and people just generally worry about security and they tend to think that cloud is somewhat less secure, but actually, security has not really much to do whether you are in the cloud or in your premises in your own corporate datacenter. 


Security is a mindset. Its a way of protecting what you really want to protect at the same time allowing appropriate access based on certain roles and responsibilities that people have. Like the role can be your internal people, role can be outside business partners who interact with your information, it can be customers that access your information, it can be any body on the internet also.


So based on roles, roles based access to information and keeping certain things secure from certain types of roles is the fundamental way of thinking about security. 


Whether you put your information safe in your premises and put armed guards around it or whether you put that inside a virtual private cloud where it is conceptually similar to what you would have in your private data center except that the armed guards are actually managed by somebody else like AWS or Google or some one else like that who will manage that guarded data center. In that area, you will have a segment carved out for you in form of a private cloud. And it is conceptually similar. That is how you should think about security whether it is on-premises or in the cloud. 


People generally worry about security and hesitate to move their operations to the cloud for several reasons. One of the fundamental reasons is that they perceive that they lack physical control over their data. It is not in their hands – they can not touch the machines. Leaving their data in the control of some one else – some other third party company managing your machines, your storage devices, and other things kept far far away from you – you don’t even know exactly which building or which floor in that building or which computer has your data once it goes to the cloud – you have no idea. It is deliberately obscure by design. People may not feel super comfortable with the idea of letting their data, their crown jewels, going away from them and sitting somewhere else they don’t exactly know where. 


The other concern people seem to think of is from the perspective of legality – like who owns that building which will house the cloud and in case of a court order or a subpoena that third party company may be obliged to release their information to the courts or agencies representing the sovereign nations/countries they may be operating in. 


Companies can take some very specific steps to mitigate those specific concerns. And those steps involve, first of all doing a proper audit of where exactly are you moving when you move to the cloud. You need to know which cloud infrastructure is going to provide you assistance in actually taking your crown jewels in form of data, in form of code, in form applications, in form of business processes that you want to take away from your data center in your premises and move them to a cloud. So you need to know and understand exactly where they will land, who can access, what can go wrong, what are the extreme boundary conditions in which things can go wrong. because…let us be very clear…things will go wrong and I can guarantee that Murphy will strike at the worst possible time. You have to plan for these things. If something goes wrong, what will you do? How will you mitigate? How will you correct?


Imagine a case in which somebody actually gets hold of your data. What happens in that case…and there, a concept known as encryption comes into play where whatever you keep inside in a cloud environment…or just about any where including your own private data center locally…that you keep the whole thing encrypted – end to end. From the creation point through the storage point through retrieval and consumption and its eventual disposal – the end to end flow of data from creation to deletion/termination/extinction – that end to end pipe of information needs to be encrypted. Data in flight, data in store, data in retrieval, data being discarded, everything needs to be properly encrypted with the highest level of encryption algorithms available today. And the most important thing in encryption is to make sure that the decryption key is kept in your possession all the time.


Now if by accident, by Murphy’s law, or some other situation, you actually end up losing your data, your critical assets, your applications, critical information about your business, your crown jewels and some bad guy happens to have access to your data – They can not cause much damage because, they can not figure it out or decrypt your information – in their lifetime – they will have no clue – because the whole thing is encrypted. Only you, who has the decryption key, can actually decipher what it says and actually make meaning out of the data.


Encryption is one of the fundamentals things you need to ensure whether you keep data in house on premises or move it to the cloud – it does not really matter much. If it is encrypted, it can stay anywhere you like but make sure to keep the decryption key absolutely safe. Encrypting your data pipe end to end is the single best thing you can do from a security standpoint. And Remember… Never lose the decryption key.


Never lose your decryption key.Nilesh
Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.




Ensuring security when your cloud is compromised

Wednesday, August 19, 2015

Ensuring security when your cloud is compromised

Photo by Nilesh: Nilesh (All Rights Reserved)


Ensuring security when your cloud is compromised
How to ensure security even when your data gets stolen.
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

Many of our clients typically worry about security of their information especially in the context of the cloud.


Premera Insurance data breach, IRS data breach, and this funniest thing that happened recently, this Ashley Madison data breach, that is just hilarious, but you know, data breaches happen and people worry about whether they should allow moving their business processes over to the cloud and that is a fundamental thing that people think about and people just generally worry about security and they tend to think that cloud is somewhat less secure, but actually, security has not really much to do whether you are in the cloud or in your premises in your own corporate datacenter. 


Security is a mindset. Its a way of protecting what you really want to protect at the same time allowing appropriate access based on certain roles and responsibilities that people have. Like the role can be your internal people, role can be outside business partners who interact with your information, it can be customers that access your information, it can be any body on the internet also.


So based on roles, roles based access to information and keeping certain things secure from certain types of roles is the fundamental way of thinking about security. 


Whether you put your information safe in your premises and put armed guards around it or whether you put that inside a virtual private cloud where it is conceptually similar to what you would have in your private data center except that the armed guards are actually managed by somebody else like AWS or Google or some one else like that who will manage that guarded data center. In that area, you will have a segment carved out for you in form of a private cloud. And it is conceptually similar. That is how you should think about security whether it is on-premises or in the cloud. 


People generally worry about security and hesitate to move their operations to the cloud for several reasons. One of the fundamental reasons is that they perceive that they lack physical control over their data. It is not in their hands – they can not touch the machines. Leaving their data in the control of some one else – some other third party company managing your machines, your storage devices, and other things kept far far away from you – you don’t even know exactly which building or which floor in that building or which computer has your data once it goes to the cloud – you have no idea. It is deliberately obscure by design. People may not feel super comfortable with the idea of letting their data, their crown jewels, going away from them and sitting somewhere else they don’t exactly know where. 


The other concern people seem to think of is from the perspective of legality – like who owns that building which will house the cloud and in case of a court order or a subpoena that third party company may be obliged to release their information to the courts or agencies representing the sovereign nations/countries they may be operating in. 


Companies can take some very specific steps to mitigate those specific concerns. And those steps involve, first of all doing a proper audit of where exactly are you moving when you move to the cloud. You need to know which cloud infrastructure is going to provide you assistance in actually taking your crown jewels in form of data, in form of code, in form applications, in form of business processes that you want to take away from your data center in your premises and move them to a cloud. So you need to know and understand exactly where they will land, who can access, what can go wrong, what are the extreme boundary conditions in which things can go wrong. because…let us be very clear…things will go wrong and I can guarantee that Murphy will strike at the worst possible time. You have to plan for these things. If something goes wrong, what will you do? How will you mitigate? How will you correct?


Imagine a case in which somebody actually gets hold of your data. What happens in that case…and there, a concept known as encryption comes into play where whatever you keep inside in a cloud environment…or just about any where including your own private data center locally…that you keep the whole thing encrypted – end to end. From the creation point through the storage point through retrieval and consumption and its eventual disposal – the end to end flow of data from creation to deletion/termination/extinction – that end to end pipe of information needs to be encrypted. Data in flight, data in store, data in retrieval, data being discarded, everything needs to be properly encrypted with the highest level of encryption algorithms available today. And the most important thing in encryption is to make sure that the decryption key is kept in your possession all the time.


Now if by accident, by Murphy’s law, or some other situation, you actually end up losing your data, your critical assets, your applications, critical information about your business, your crown jewels and some bad guy happens to have access to your data – They can not cause much data as they can not figure it out in their lifetime – they have no clue – because the whole thing is encrypted. Only you, who has the decryption key, can actually decipher what it says and actually make meaning out of the data.


Encryption is one of the fundamentals things you need to ensure whether you keep data in house on premises or move it to the cloud – it does not really matter much. If it is encrypted, it can stay anywhere you like but make sure to keep the decryption key absolutely safe. Encrypting your data pipe end to end is the single best thing you can do from a security standpoint. And Remember… Never lose the decryption key.


Never lose your decryption key.Nilesh
Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.



Ensuring security when your cloud is compromised

Friday, August 14, 2015

It"s not yours any more if...

Photo credit: Paul at Flickr (CC BY-SA 2.0)


It"s not yours any more if…
5 cases when your device is not yours any more…
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

  1. It is not your device anymore if…
    • a bad person person has unrestricted physical access to your device


  2. It is not your device anymore if…
    • a bad person can alter its operating system

    • you ignore to update in time and apply patches to known vulnerabilities


  3. It not solely your device if…
    • someone can persuade you to run their app on your device

    • you give permission to install apps from untrusted app stores


  4. You are not in total control your device any more if..
    • you give permission to access your microphone

    • you give permission to access your camera

    • you give permission to access your location/GPS

    • you give permission to vibrate your phone


  5. Your encrypted data is not secure any more if..
    • you manage to lose its decryption key.


Privacy is kind of dead (thanks to social networks)…but don’t let security go out of your control.Nilesh
Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.


The Show Notes


List of app stores


Nilesh on LinkedIn, TwitterGoogle+Facebook

Cloud Genius on LinkedIn, Twitter, Google+, Facebook




It"s not yours any more if...

Thursday, August 13, 2015

It"s not yours any more if...

Photo credit: Paul at Flickr (CC BY-SA 2.0)


It"s not yours any more if…
5 cases when your device is not yours any more…
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

  1. It is not your device anymore if…
    • a bad person person has unrestricted physical access to your device


  2. It is not your device anymore if…
    • a bad person can alter its operating system

    • you ignore to update in time and apply patches to known vulnerabilities


  3. It not solely your device if…
    • someone can persuade you to run their app on your device

    • you give permission to install apps from untrusted app stores


  4. You are not in total control your device any more if..
    • you give permission to access your microphone

    • you give permission to access your camera

    • you give permission to access your location/GPS

    • you give permission to vibrate your phone


  5. Your encrypted data is not secure any more if..
    • you manage to lose its decryption key.


Privacy is kind of dead (thanks to social networks)…but don’t let security go out of your control.Nilesh
Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.


The Show Notes


List of app stores


Nilesh on LinkedIn, TwitterGoogle+Facebook

Cloud Genius on LinkedIn, Twitter, Google+, Facebook




It"s not yours any more if...

Wednesday, August 12, 2015

It"s not yours any more if...

Photo credit: Paul at Flickr (CC BY-SA 2.0)


It"s not yours any more if…
5 cases when your device is not yours any more…
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

  1. It is not your device anymore if…
    • a bad person person has unrestricted physical access to your device


  2. It is not your device anymore if…
    • a bad person can alter its operating system

    • you ignore to update in time and apply patches to known vulnerabilities


  3. It not solely your device if…
    • someone can persuade you to run their app on your device

    • you give permission to install apps from untrusted app stores


  4. You are not in total control your device any more if..
    • you give permission to access your microphone

    • you give permission to access your camera

    • you give permission to access your location/GPS

    • you give permission to vibrate your phone


  5. Your encrypted data is not secure any more if..
    • you manage to lose its decryption key.


Privacy is kind of dead (thanks to social networks)…but don’t let security go out of your control.Nilesh
Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.


The Show Notes


List of app stores


Nilesh on LinkedIn, TwitterGoogle+Facebook

Cloud Genius on LinkedIn, Twitter, Google+, Facebook




It"s not yours any more if...

It"s not yours any more if...

Photo credit: Paul at Flickr (CC BY-SA 2.0)


It"s not yours any more if…
5 cases when your device is not yours any more…
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

  1. It is not your device anymore if…
    • a bad person person has unrestricted physical access to your device


  2. It is not your device anymore if…
    • a bad person can alter its operating system

    • you ignore to update in time and apply patches to known vulnerabilities


  3. It not solely your device if…
    • someone can persuade you to run their app on your device

    • you give permission to install apps from untrusted app stores


  4. You are not in total control your device any more if..
    • you give permission to access your microphone

    • you give permission to access your camera

    • you give permission to access your location/GPS

    • you give permission to vibrate your phone


  5. Your encrypted data is not secure any more if..
    • you manage to lose its decryption key.


Privacy is kind of dead (thanks to social networks)…but don’t let security go out of your control.Nilesh
Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.


The Show Notes


List of app stores


Nilesh on LinkedIn, TwitterGoogle+Facebook

Cloud Genius on LinkedIn, Twitter, Google+, Facebook




It"s not yours any more if...

It"s not yours any more if...

It"s not yours any more if…
5 situations when your device is not your any more…
All Clouds Considered is brought to you by Cloud Genius®
Rated among the top 10 cloud programs, Cloud Genius the fastest way for you to be highly productive on your job with cutting edge technologies.

Take a test drive at https://be.a.cloudgeni.us

### 1. It is not your device anymore if…

* a bad person person has unrestricted physical access to your device


### 2. It is not your device anymore if…

* a bad person can alter its operating system

* you ignore to update in time and apply patches to known vulnerabilities


### 3. It not solely your device if…

* someone can persuade you to run their app on your device

* you give permission to install apps from untrusted app stores


### 4. You are not in total control your device any more if…

* you give permission to access your microphone

* you give permission to access your camera

* you give permission to access your location/GPS

* you give permission to vibrate your phone


### 5. Your encrypted data is not secure any more if..

* you manage to lose its decryption key.


Summary:


Privacy is kind of dead (thanks to social networks)…

but don’t let security go out of your control.


Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.




It"s not yours any more if...

Monday, August 3, 2015

Secure your devices - Here is how I do it

Secure your devices
Here is how I do it.
All Clouds Considered is brought to you by Cloud Genius®
Cloud Genius is a top 10 rated institution built by industry experts focused on helping businesses succeed with the cloud and helping you transform your professional career.

Take a test drive at https://be.a.cloudgeni.us

In the last couple we discussed password management, specifically using unique passwords that are strong and supplemented that with two factor authentication so that even if your password is compromised there is another layer of protection. And also making sure that all your passwords are stored inside a system which helps you manage your passwords. And Just last week a new research got published comparing how security experts and non – experts stay safe online. That paper outlines the results of two surveys, one conducted with a group of security experts and another with web users who are not necessarily security experts and the survey is actually very interesting because it compares and contracts responses from these two groups and tries to understand the differences as to why these differences exist.


There were several common grounds in the two groups. One of the fundamental ones was careful password management. And that is a priority for both types of people and it should be a priority for everybody because that is a critical thing to access and control your information that you want to keep safe. However, these two groups differed on their approaches to password management. Security experts relied heavily on password managers whereas the non-experts group did not.


This difference was primarily due to lack of education about benefits of using password managers. And perceived lack of trust in these programs. In fact, one of our podcast listeners commented that he makes the passwords so difficult that only he can remember and that no body else can hack his mind. And that is his security strategy. However, a password that people can remember is not secure enough.


A password that people can remember is not secure enough. Nilesh

Some of the key differences in the two approaches turned out to be around software updates and use of antivirus software. Experts in the security domain recognized the benefits of updates. Patch. Every time the operating system vendor or the software vendor provides a patch, it is important to receive the patch and apply it. And that is the standard approach that experts tend to take. Where as the non-experts are not clear on whether they should take this update or not. People tend to wonder whether updating software is always safe. What if some bad software comes down through the automatic update pipe? What if somebody misuses that channel to send malicious software down to my computer. That is a concern people have. I suggest that you read that paper and I am dropping a link in the show notes below.


I think that paper is a fascinating read. And here is something that I did with my phones and my devices after reading that paper. With my iPhone, I completed erased all the documents and settings and then installed new operating system straight from the source which is Apple iOS and I made sure not to restore from iCloud backup or any other back. Now this gave me a clean, freshly installed iPhone. and I had no other applications on that. So I began installing each and every application. And as I installed every application I made sure that I check the application settings. I made sure that I use a unique strong password with each of the services that I am installing and also back them up with a two factor authentication. I also removed any approved apps with Facebook, Twitter, Gmail. Each of these services had a bunch of approved apps that I may have approved in the past I removed approvals for all those that I don’t actually use. Now this has resulted in a dramatically improved experience. The phones are actually a little bit faster than I expected which is amazing. And also I know that each of these service connections that I have now established are secure the way that I expect them to be.


And an interesting fall out of all this… was that I have less applications. It is intrinsically difficult to set this up like this. and so in the process, I ended up with less number of applications on my phone which actually is a good thing. Less is more.


So this is what I did and I would suggest you give this a try. I know it is difficult. But give this a try and I know you will stand to benefit. Not only from a security perspective but also your phones and devices and computers will actually work faster. Give that a shot and let me know how it goes.


Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.




Secure your devices - Here is how I do it

Sunday, August 2, 2015

Secure your devices - Here is how I do it

Secure your devices
Here is how I do it.
All Clouds Considered is brought to you by Cloud Genius®
Cloud Genius is a top 10 rated institution built by industry experts focused on helping businesses succeed with the cloud and helping you transform your professional career.

Take a test drive at https://be.a.cloudgeni.us

In the last couple we discussed password management, specifically using unique passwords that are strong and supplemented that with two factor authentication so that even if your password is compromised there is another layer of protection. And also making sure that all your passwords are stored inside a system which helps you manage your passwords. And Just last week a new research got published comparing how security experts and non – experts stay safe online. That paper outlines the results of two surveys, one conducted with a group of security experts and another with web users who are not necessarily security experts and the survey is actually very interesting because it compares and contracts responses from these two groups and tries to understand the differences as to why these differences exist.


There were several common grounds in the two groups. One of the fundamental ones was careful password management. And that is a priority for both types of people and it should be a priority for everybody because that is a critical thing to access and control your information that you want to keep safe. However, these two groups differed on their approaches to password management. Security experts relied heavily on password managers whereas the non-experts group did not.


This difference was primarily due to lack of education about benefits of using password managers. And perceived lack of trust in these programs. In fact, one of our podcast listeners commented that he makes the passwords so difficult that only he can remember and that no body else can hack his mind. And that is his security strategy. However, a password that people can remember is not secure enough.


A password that people can remember is not secure enough. Nilesh

Some of the key differences in the two approaches turned out to be around software updates and use of antivirus software. Experts in the security domain recognized the benefits of updates. Patch. Every time the operating system vendor or the software vendor provides a patch, it is important to receive the patch and apply it. And that is the standard approach that experts tend to take. Where as the non-experts are not clear on whether they should take this update or not. People tend to wonder whether updating software is always safe. What if some bad software comes down through the automatic update pipe? What if somebody misuses that channel to send malicious software down to my computer. That is a concern people have. I suggest that you read that paper and I am dropping a link in the show notes below.


I think that paper is a fascinating read. And here is something that I did with my phones and my devices after reading that paper. With my iPhone, I completed erased all the documents and settings and then installed new operating system straight from the source which is Apple iOS and I made sure not to restore from iCloud backup or any other back. Now this gave me a clean, freshly installed iPhone. and I had no other applications on that. So I began installing each and every application. And as I installed every application I made sure that I check the application settings. I made sure that I use a unique strong password with each of the services that I am installing and also back them up with a two factor authentication. I also removed any approved apps with Facebook, Twitter, Gmail. Each of these services had a bunch of approved apps that I may have approved in the past I removed approvals for all those that I don’t actually use. Now this has resulted in a dramatically improved experience. The phones are actually a little bit faster than I expected which is amazing. And also I know that each of these service connections that I have now established are secure the way that I expect them to be.


And an interesting fall out of all this… was that I have less applications. It is intrinsically difficult to set this up like this. and so in the process, I ended up with less number of applications on my phone which actually is a good thing. Less is more.


So this is what I did and I would suggest you give this a try. I know it is difficult. But give this a try and I know you will stand to benefit. Not only from a security perspective but also your phones and devices and computers will actually work faster. Give that a shot and let me know how it goes.


Join our discussion in the Cloud Genius community and chat with us on our chat channel where we hangout and learn from each other.

 


 

Want us to create an episode on a topic of your interest? Let us know and we gladly develop one. I am your host Nilesh. Look forward to seeing you online.




Secure your devices - Here is how I do it