Securing your privileged identity

April 2011 Access Control & Identity Management, Information Security

There are those who argue that the age of cloud computing is merely in the minds of the more far-sighted IT visionaries. I have even met those whose businesses are indifferent to the cloud. This indifference may cost them dearly – and soon.

The UK’s new coalition government is implementing the ‘G-Cloud’ strategy (actually the strategy of the last government) and there are some who claim that it will save the government £3,2bn from its annual IT budget of £16bn. That is not just a big saving for the government – it is an obvious opportunity for suppliers who can ensure it is secure.

The proposal is to replace the present ad-hoc network of department-hosted systems with a dozen dedicated government secure data centres, costing £250m each. The G-Cloud plans could support everything from pooled government data centres to a communal e-mail solution and collaboration. By 2015, the plan is that 80% of government departments could be using this system. But will it be secure enough?

Safeguarding the IT infrastructure from unmonitored access, malware and intruder attacks grows more challenging as the operation evolves for cloud service providers. And as a cloud infrastructure grows, so too does the presence of unsecured privileged identities – those so-called super-user accounts that hold elevated permission to access sensitive data, run programs, and change configuration settings on virtually every component of IT. Privileged identities exist on all physical and virtual operating systems, on network devices such as routers, switches, and firewalls, and in programs and services including databases, line-of-business applications, Web services, middleware, VM hypervisors and more.

Left unsecured, privileged accounts leave an organisation vulnerable to IT staff members who have unmonitored access to sensitive customer data and can change configuration settings on critical components of your infrastructure through anonymous, unaudited access. It can also lead to financial loss from failed regulatory audits such as Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance, Portability and Accountability Action (HIPAA) of 1996, and the Sarbanes–Oxley Act of 2002 standards that require privileged identity controls.

One of the largest challenges for cloud service customers inside and outside of government is attaining transparency into how public cloud providers are securing their infrastructure. How are your identities being managed and secured? Many cloud providers will not give their customers much more of an official answer than a SAS 70 certification. How can we trust in the cloud if the vendors of cloud-based infrastructure neglect to implement both the process and technology to assure that segregation of duties are enforced, and customer and vendor identities are secured?

The cloud vendor’s challenge: accountability

Cloud computing has the potential to transform business technology, but it brings a spectrum of security issues that IT organisations should consider before trusting their sensitive data to the cloud. These issues cause security experts and auditors to rethink many fundamental assumptions about privileged identity management in terms of who is responsible for managing these powerful accounts, how they manage them, and who exactly is in control.

Historically, IT data centres have always been in secured physical locations. Now with cloud computing those locations are no longer maintained directly by the IT organisation. So the question comes down to this: how do you get accountability for management of physical assets that are no longer under your physical control, and exactly what control mechanisms are in place? Can you trust your cloud vendor to secure your most sensitive data? Moreover, if there is a security breach in the cloud, who is to blame? Is it the cloud vendor that disclaims all legal liability in its contract, or an enterprise that relinquishes control of its sensitive data in the first place?

From the vendor’s standpoint, cloud computing promises to reduce customer headcount, make IT more efficient and deliver more consistent service levels. However, there is a paradox that when it comes to security (and control over privileged identities in particular) cloud services are often among the least efficient. Many cloud service providers’ processes – based on ad-hoc techniques like scripting of password changes – are slow, expensive and unreliable. And that is dangerous.

Fortunately the industry is starting to move beyond paralysing discussions about the security and compliance problems that arise from cloud computing to address them head on. One example of this is the Trusted Cloud Initiative, which was launched at RSA Security Conference 2010. The goal of the initiative is “to help cloud providers develop industry-recommended, secure and interoperable identity, access and compliance management configurations, and practices.” However, only time will tell if it will help standardise cloud computing or turn out to be a technology certification of little use.

In addition, several major cloud vendors and ISPs have begun the difficult task of integrating security solutions that are capable of managing the large number of privileged identities that make up their infrastructure (hardware, VM hosts, VM Image OS, application stacks). This has really broken the fundamental model of IT being in control of security and has started to blur the lines between vendor and customer when it comes to the management of security.

The end user’s challenge: transparency

In my opinion, the cloud is a good, compelling idea. It can reduce the cost of IT dramatically. Given that cloud computing is available, the idea of building new data centres these days seems like a last-century way of doing things. On the other hand, for enterprises, the ability to see and touch your own systems in your secured data centre does give confidence that you have some measure control of your destiny. But most large corporations do not have enough IT people or security talent to manage the IT resources they have, and so are turning to outsourcing. Cloud computing is essentially the next generation of outsourcing, so that we are not only reducing man power, but we are getting rid of our hard assets entirely by moving them over to data centres anywhere on the planet that are going to manage this more cheaply than we ever could. And the idea of outsourcing security and liability is extraordinary compelling.

Enterprises should ask the right questions of their cloud providers before taking the leap into cloud and blindly assuming that their data is safe there. Every point of compliance that you are asked to meet an IT organisation and every question you have been asked by an auditor should apply to your cloud vendor – and needs to be asked of them. And because today’s cloud vendors offer literally no transparency and little information, do no be surprised if you do not like the answers you get. Most cloud vendors would say that for security purposes, it is on a ‘need to know’ basis, and you do not need to know. Others state that they are SAS 70 compliant, but that is really just a self-certification.

Here are some questions you must consider asking

* What kind of security does the cloud service provider have in place to protect your privileged accounts and most sensitive data?

* Do they have a privileged identity management technology in place?

* How do they control privileged accounts used in cloud infrastructure to manage sensitive systems and data?

* How do they manage cloud stacks at the physical layer and application stack layers?

* What is your access to audit records?

Whatever regulatory standards your organisation must meet, so too must your cloud vendor. So if you think that by venturing into the cloud you are saving yourself regulatory headaches, think again.

Conclusion

Security is the greatest barrier towards adoption of the cloud, and it is no great surprise that cloud security – managing, verifying and trusting it – was a major theme at the RSA Conference. Unfortunately, improvements in cloud security will not be seen as a priority until a major breach has a significant enough impact on one or more cloud service vendors and customers. That needs to change. When it comes to cloud security, it is the end-user’s duty to understand what processes and methodologies the cloud vendor is using to protect the customer’s most sensitive assets. We do not want the government’s ‘G Cloud’ to be compromised – that would be a public humiliation that would have cloud doubters in their own little heaven.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...