Bank Systems & Technology is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Infrastructure

11:15 AM
Connect Directly
Facebook
Twitter
Google+
RSS
E-Mail
50%
50%

Making the Cloud Secure for Sensitive Data

A new report shows that while more and more organizations are putting sensitive data in the cloud, few say that the data is being encrypted.

The cloud offers undeniable economic benefits for IT organizations, and those benefits seem to be overwhelming any security concerns about using the cloud, according to a new studyfrom Thales e-Security and the Ponemon Institute. The eighth annual “Global Trends in Cloud Encryption” study found that 53% of the more than 4,000 respondents from eight countries and more than a dozen industry verticals are currently sending sensitive data to the cloud. But 36% of the respondents sending sensitive data to the cloud admitted that doing so had a negative impact on their security posture.

One reason that those respondents may be right is that most of the sensitive data these organizations are storing in the cloud is unencrypted. More than half of the organizations in the study that are sending sensitive data to the cloud said that their data is completely readable. That broke down to 59% of the organizations using the cloud for infrastructure-as-a-service and platform-as-a-service, and 45% of them using the cloud for software-as-a-service, that said their data in the cloud was unencrypted.

[For More of Our Cloud Coverage, Check Out: Banking in the Cloud: 4 Hot Initiatives]

So why is so much data going to the cloud being stored without encryption? Much of that could be caused by a lack of understanding about what security in the cloud actually means, says Richard Moulds, VP of product marketing and strategy at Thales e-Security. Many companies using the cloud don’t know much about the security measures their provider has in place. Only one-third of the respondents in the study said they know what steps their provider is taking to secure their sensitive data.

This problem of opaqueness could me more acute in banking, Moulds added. “Banks don’t like to talk about their security, and neither do cloud providers. They don’t want to give up their security secrets,” he explained.

Beyond being unwilling to talk openly about security measures, it’s also difficult for cloud providers to explain those measures to other organizations, Moulds said. “With SaaS there’s so many moving parts in terms of security, there’s a lot of baggage with the platform that the cloud provider uses and the employees working for the provider. So quantifying the security posture of a cloud provider is difficult,” he noted.

And cloud providers also face completely different threats than those that banks have to deal with because they're multi-tenant, according to Moulds. “The bank security professionals know how to secure their infrastructure against the threats they face, but they don’t know about securing a cloud environment,” Moulds shared. “I know how to secure my own house, but if someone asked me to secure a battleship or a space station, I’d be completely lost."

Many of the larger banks that are currently building their own private clouds will eventually acquire more of the knowledge and expertise needed to understand the security situation of a cloud provider, Moulds noted.

Another issue facing organizations that send unencrypted is lack of centralized management for encryption keys, Moulds said. “Some of these organizations have millions of keys, and if you lose one then key retrieval and provisioning can be a real problem area. Then if you think about encryption in the cloud, it becomes even more complicated because you have to share those keys with different cloud providers,” he remarked.

New standards are being developed though that could help in this area such as the OASIS Key Management Interoperability Protocol, which will allow keys to be managed in a centralized location outside of the system they are used in. This will help organizations break down key management silos, Moulds predicted.

Jonathan Camhi has been an associate editor with Bank Systems & Technology since 2012. He previously worked as a freelance journalist in New York City covering politics, health and immigration, and has a master's degree from the City University of New York's Graduate School ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Bank Systems & Technology Newsletters
Slideshows
Video
Bank Systems & Technology Radio
Archived Audio Interviews
Join Bank Systems & Technology Associate Editor Bryan Yurcan, and guests Karen Massey and Jerry Silva from IDC Financial Insights, for a conversation about the firm's 11th annual FinTech rankings.