Yes, my data is secure in the cloud.
Implementing a data-centric approach.
Today, data security has become a major issue, as millions of people hand over their personal and financial information to various organizations. What degree of trust should one have in these companies and their support staff as this sensitive information is handed over?
The best method to protect personal information from hackers is with a Data-Centric security approach.
Perimetric vs. Data-Centric
These days, most customer data are stored by SaaS (Software as a Service) vendors and social media companies on “public cloud servers,” which by definition, are accessible on public networks. The primary network security mechanism of these companies involves firewalls - also classified as perimeter security. Unfortunately, conventional network security alone is no longer sufficient with today’s traffic volumes and data sharing patterns observed between various systems. In effect, the sensitive data is vulnerable and misused by bad actors.
As evident by major organizational security breaches(Table A), there are various reasons as to why hackers attempt to gain access to the underlying data. These breaches are avoidable if the data is disguised and encrypted. This is where data-centric security comes into the picture. When data is encrypted, it ensures that hackers cannot make any sense of the information even if they get their hands on it while sitting in the operating systems or on storage devices. Encryption of this information thus plays a significant role in authentication, privacy, and access control mechanisms.
Every cloud service must be secured
Data-Centric Security Tools Provided by Public Cloud Vendors
Even though running cloud-based systems may seem challenging from a security perspective, in reality, cloud hosting companies, such as AWS, provide comprehensive and consistent tools to implement and manage data with security policies, doing so easily and cost-effectively. These tools facilitate every security aspect, such as user authentication, connectivity, data transfers, data processing, data storage, and related access control, thereby allowing customers to effectively monitor the systems' security.
Keeping the scope of this discussion limited to data storage in the cloud, let’s explore some tools offered by major public cloud providers. Beyond basic user authentication, data encryption plays a vital role in ensuring that data at rest does not get into the hands of hackers.
Securing Data Protection Layers
Data access layers are classified as Data in Motion and Data at Rest from a typical web application security perspective. Both data at rest as well as data in motion, must be protected.
Data in Motion
Data at Rest
Securing Databases
Fully Managed Services - Most concerning areas of data security are relational and non-relational databases, where the majority of sensitive data is commonly stored.
How are these databases secured?
No database Encryption - In many cases, relational databases (RDBMS) such as MSSQL Server, MySQL, etc. are setup by application vendors only with basic authentication and without any database encryption, leaving the customers’ data vulnerable. As data sensitivity increases, a variety of encryption technologies are used to encrypt the underlying data.
Transparent Data Encryption (TDE) - This technology facilitates encryption of all the data on databases, in addition to securing underlying devices. It ensures that hackers do not get access to data from RDBMS logs and backups. With TDE, as the name suggests, all the encryptions and decryptions are transparently handled by server engines, reducing the majority of overhead from the application layer from performance, as well as from a housekeeping perspective. Encryption of the user connection to the database is also handled by SSL implementation.
Database Column or Cell level encryption - This technique is performed for highly sensitive information to protect specific data from individual users at a very granular level. This type of encryption, in some cases, provides user-level access control only on certain columns. It can be a highly secure, yet cost-effective, solution with very low performance overhead.
Fully managed Relational Databases (RDS) and Data Warehouses - AWS extends their encryption services to RDS, and to warehouses, such as Redshift, or to NOSQL databases, such as Athena and Dynamo db. This gives a seamless and consistent experience for implementation engineers.
Is encryption an innovation?
Security of services is not a new problem to solve in the shared services environment like hotels, offices, libraries, gyms, etc. Let’s compare to see how today’s encryption techniques are astonishingly similar to real-life security mechanisms we have been using for decades to secure these shared services.
Note that data encryption levels vary from no encryption to very comprehensive levels of encryption. In most cases, the tools differ based on a simple question - who has the key?
Why is data at rest not encrypted? Due to a lack of awareness, tools, resources, or the cost of implementation, most sensitive data to date remains unencrypted and, therefore, vulnerable. In 2019, only 9.4% of cloud providers encrypted data stored at rest in the cloud. (ref: McAfee research)
Refer to the chart below of breaches that could have been prevented had the companies used simple encryption methods.
While in college, I interned as a junior and network admin for DbCom, a company with over 25 years of experience in FinTech and RegTech. Working on day-to-day infrastructure and network security management tasks allowed me to learn and grow. With a deep and rich understanding of cloud-based security, I now help companies become more aware, strategize, and implement best-practice solutions utilizing a data-centric security approach to help sustain their ecosystem.
Richa is a System Admin at DbCom specializing in Cloud Automation Services and a Certified AWS Engineer.
To reach Richa, send an email or connect with her via LinkedIn.
Email: richa.khanolkar@dbcomsys.com
LinkedIn: https://www.linkedin.com/in/richa-khanolkar-b33803143/