It’s still your data

April 2017 Editor's Choice, Information Security, Infrastructure, Security Services & Risk Management

The forecast is cloudy with a chance of security breaches. Fortunately, the state of cloud security is not as lame as that opening line. Yet, as more companies entrust their data and applications, and almost everything else to cloud service providers, one must wonder just how secure it all is.

Let’s be honest, if you watch the media, it seems that hackers don’t really have a hard time breaking into computer systems and taking what they like. There is, of course, a bias in the media to only reporting the juicy news of hacking and breaches while ignoring the boring stuff like a company that protects its data effectively. Nevertheless, there are enough breaches and technology failures to be a cause for concern when it’s your data at risk.

Just how secure can companies feel entrusting their information, which may include sensitive client and employee information, to the cloud.

Caitlin Harrison.
Caitlin Harrison.

Caitlin Harrison, senior security consultant at MWR InfoSecurity Johannesburg says that the security standard offered by different cloud providers can and does vary across the board. Consequently, it is not possible to give a single, comprehensive answer about the state of cloud security in general.

“It would be similar to trying to comment on the security of operating systems as a whole,” she adds. “The security will depend on how the product is implemented, who developed and maintains it, and the security of the environment surrounding the deployment.”

You can’t let go

Paul Ruinaard, regional sales manager, sub-Saharan Africa, at Nutanix confirms that the financial risk and fiduciary duty around data security remain with the company whose data it is. “You can outsource your servers to the cloud, but you still need to make sure the cloud is secure – you can’t outsource governance and risk because you’ve put it in the cloud. That means you have to drive quite a rigorous SLA (service-level agreement) and ensure there is governance and risk reporting from the cloud provider.”

Paul Ruinaard.
Paul Ruinaard.

He continues that all local cloud service providers view security as a major issue, but there are some horror stories. Part of the problem is that you must ensure that, if you put data in a cloud and it is not onsite, you have the correct disaster recovery and other services included in your SLA with the cloud provider. “Around two years ago, for instance, a major local ISP was providing virtual machines (VMs) to many large corporates, but the standard SLA did not include disaster recovery or uptime. So, when those VMs fell over, the clients had no recourse around data loss – the ISP was within the SLA of simply providing virtual machines.

“The most recent example is the Amazon S3 outage which affected many companies that make use of Amazon’s cloud services.”

Companies must make sure they’re getting what they pay for and align the services they’ve purchased with what they require – it will come down to price and this is why cloud can actually be quite expensive. “Large corporates simply have to factor high availability, security and disaster recovery into their SLAs with cloud providers, which makes the cloud expensive in certain industries,” says Ruinaard.

Should cloud users sleep at night?

The benefits of cloud computing are touted as a cost saving and the ability to buy or rent as much storage or processing power, or whatever IT component you need, as you need it. You save on having to buy and maintain all the resources under your own roof, and you don’t have to worry about hiring the right IT skills as the cloud provider will have enough to take care of your needs and its other clients.

While that sounds good since it’s another responsibility taken away from the company so the business can focus on its core competencies, in a digital world where data is critical you can’t ignore the importance of and ability to quickly access your information.

Harrison compares cloud services to other outsourcing projects. She says many functions in a business will need to be outsourced. “Where a business lacks the resources and experience to focus completely on a specific function, it may well be safer to rely on companies who specialise in that field than to try to manage it alone.”

As to responsibility, she adds that using cloud services does not mean handing everything over to someone else and washing your hands of what may happen. “It is worth noting that choosing a third party to manage your security does not necessarily amount to abdicating responsibility where security is concerned. Using a third party does not prohibit ongoing engagement with them to ensure they maintain their standards throughout the relationship.”

Ruinaard echoes this, noting, “IT security is encoded into regulations like the Basel II accords and King IV guidelines. Those frameworks all mean that IT security remains primarily your responsibility to your customer, worldwide.

“Similarly, you can’t outsource risk under South African law. So if you are a bank and you put your apps in the cloud, you’re still responsible for the risk attached to your own customer database. You can’t say because it is in the cloud, it is somebody else’s problem.”

He explains there is no regulatory framework in South Africa under which you can defer or devolve risk unless the cloud provider accepts such risk contractually, which means your SLA has to be watertight. “And once an SLA starts including 99.99999% (yes, five nines after the decimal point) uptime and a requirement for no data breaches, it will be a very complex and expensive outsourced contract.”

Moving to the cloud has many benefits, but also a few caveats for the buyer. No matter how many nines one has in the contract or what the service provider promises, it’s worth remembering that it’s your assets under the spotlight and you are still responsible for them – and let’s not forget that you want to keep them because you need them. Make sure the contract you sign takes care of the security issues, as well as backup and recovery. And make sure your data is yours, stays yours and can be retrieved quickly and easily in the format you choose.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
Fastest PCIe Gen 5.0 NVMe SSD
Products & Solutions Infrastructure
Sandisk has unveiled the WD_BLACK SN8100 NVMe SSD with PCIe Gen 5.0 technology, an internal SSD delivering speeds up to 14 900 MB/s and capacities up to 4 TB, with 8 TB solutions available soon.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Unified storage solution
Products & Solutions Infrastructure
CASA Software has announced the local availability of Nexsan’s upgraded unified storage solution, Unity NV4000, which is ideal for mixed workloads, from virtualisation and video surveillance to secure backup and recovery.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Winners of the 2025 Southern Africa OSPAs
Editor's Choice
The winners of the 2025 Southern Africa Outstanding Security Performance Awards (OSPAs) were revealed on Wednesday, 4th June, at Securex South Africa. Winners from all categories (except the Lifetime Achievement) will be featured in the second Global OSPAs set to take place in 2026.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.