It’s still your data

April 2017 Editor's Choice, Information Security, Infrastructure, Security Services & Risk Management

The forecast is cloudy with a chance of security breaches. Fortunately, the state of cloud security is not as lame as that opening line. Yet, as more companies entrust their data and applications, and almost everything else to cloud service providers, one must wonder just how secure it all is.

Let’s be honest, if you watch the media, it seems that hackers don’t really have a hard time breaking into computer systems and taking what they like. There is, of course, a bias in the media to only reporting the juicy news of hacking and breaches while ignoring the boring stuff like a company that protects its data effectively. Nevertheless, there are enough breaches and technology failures to be a cause for concern when it’s your data at risk.

Just how secure can companies feel entrusting their information, which may include sensitive client and employee information, to the cloud.

Caitlin Harrison.
Caitlin Harrison.

Caitlin Harrison, senior security consultant at MWR InfoSecurity Johannesburg says that the security standard offered by different cloud providers can and does vary across the board. Consequently, it is not possible to give a single, comprehensive answer about the state of cloud security in general.

“It would be similar to trying to comment on the security of operating systems as a whole,” she adds. “The security will depend on how the product is implemented, who developed and maintains it, and the security of the environment surrounding the deployment.”

You can’t let go

Paul Ruinaard, regional sales manager, sub-Saharan Africa, at Nutanix confirms that the financial risk and fiduciary duty around data security remain with the company whose data it is. “You can outsource your servers to the cloud, but you still need to make sure the cloud is secure – you can’t outsource governance and risk because you’ve put it in the cloud. That means you have to drive quite a rigorous SLA (service-level agreement) and ensure there is governance and risk reporting from the cloud provider.”

Paul Ruinaard.
Paul Ruinaard.

He continues that all local cloud service providers view security as a major issue, but there are some horror stories. Part of the problem is that you must ensure that, if you put data in a cloud and it is not onsite, you have the correct disaster recovery and other services included in your SLA with the cloud provider. “Around two years ago, for instance, a major local ISP was providing virtual machines (VMs) to many large corporates, but the standard SLA did not include disaster recovery or uptime. So, when those VMs fell over, the clients had no recourse around data loss – the ISP was within the SLA of simply providing virtual machines.

“The most recent example is the Amazon S3 outage which affected many companies that make use of Amazon’s cloud services.”

Companies must make sure they’re getting what they pay for and align the services they’ve purchased with what they require – it will come down to price and this is why cloud can actually be quite expensive. “Large corporates simply have to factor high availability, security and disaster recovery into their SLAs with cloud providers, which makes the cloud expensive in certain industries,” says Ruinaard.

Should cloud users sleep at night?

The benefits of cloud computing are touted as a cost saving and the ability to buy or rent as much storage or processing power, or whatever IT component you need, as you need it. You save on having to buy and maintain all the resources under your own roof, and you don’t have to worry about hiring the right IT skills as the cloud provider will have enough to take care of your needs and its other clients.

While that sounds good since it’s another responsibility taken away from the company so the business can focus on its core competencies, in a digital world where data is critical you can’t ignore the importance of and ability to quickly access your information.

Harrison compares cloud services to other outsourcing projects. She says many functions in a business will need to be outsourced. “Where a business lacks the resources and experience to focus completely on a specific function, it may well be safer to rely on companies who specialise in that field than to try to manage it alone.”

As to responsibility, she adds that using cloud services does not mean handing everything over to someone else and washing your hands of what may happen. “It is worth noting that choosing a third party to manage your security does not necessarily amount to abdicating responsibility where security is concerned. Using a third party does not prohibit ongoing engagement with them to ensure they maintain their standards throughout the relationship.”

Ruinaard echoes this, noting, “IT security is encoded into regulations like the Basel II accords and King IV guidelines. Those frameworks all mean that IT security remains primarily your responsibility to your customer, worldwide.

“Similarly, you can’t outsource risk under South African law. So if you are a bank and you put your apps in the cloud, you’re still responsible for the risk attached to your own customer database. You can’t say because it is in the cloud, it is somebody else’s problem.”

He explains there is no regulatory framework in South Africa under which you can defer or devolve risk unless the cloud provider accepts such risk contractually, which means your SLA has to be watertight. “And once an SLA starts including 99.99999% (yes, five nines after the decimal point) uptime and a requirement for no data breaches, it will be a very complex and expensive outsourced contract.”

Moving to the cloud has many benefits, but also a few caveats for the buyer. No matter how many nines one has in the contract or what the service provider promises, it’s worth remembering that it’s your assets under the spotlight and you are still responsible for them – and let’s not forget that you want to keep them because you need them. Make sure the contract you sign takes care of the security issues, as well as backup and recovery. And make sure your data is yours, stays yours and can be retrieved quickly and easily in the format you choose.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
South African fire standards in a nutshell
Fire & Safety Editor's Choice Training & Education
The importance of compliant fire detection systems and proper fire protection cannot be overstated, especially for businesses. Statistics reveal that 44% of businesses fail to reopen after a fire.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
LidarVision for substation security
Fire & Safety Government and Parastatal (Industry) Editor's Choice
EG.D supplies electricity to 2,7 million people in the southern regions of the Czech Republic, on the borders of Austria and Germany. The company operates and maintains infrastructure, including power lines and high-voltage transformer substations.

Read more...
Standards for fire detection
Fire & Safety Associations Editor's Choice
In previous articles in the series on fire standards, Nick Collins discussed SANS 10400-T and SANS 10139. In this editorial, he continues with SANS 322 – Fire Detection and Alarm Systems for Hospitals.

Read more...
Hydrogen is green but dangerous
Fire & Safety Infrastructure Power Management
Hydrogen infrastructure is developing quickly, but it comes with safety challenges. Hydrogen is flammable, and its small molecular size means it can leak easily. Additionally, fires caused by hydrogen are nearly invisible, making them difficult to detect and respond to.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.