Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

The Intersection of Cloud And Internet of Things And What It Means For Security

Securing The Internet of Things Using Cloud

Securing The Internet of Things Using Cloud

Last month, Salesforce.com and Philips announced their plan to build an open cloud-based healthcare platform. In the initial application, this “platform” will allow healthcare software developers, producers of medical services, insurance companies, and healthcare providers to monitor patients with chronic conditions. Healthcare information utilizing digital patient-sensing devices (internet of things) send information to the cloud to be remotely processed and monitored, allowing healthcare providers to prioritize care.

The choice of healthcare as the first industry play by a customer management software-as-a-service (SaaS) company like Salesforce.com makes sense as the healthcare industry requires the most collaboration.

It’s also a bold choice from a security perspective. If you’ve ever sat down and filled out insurance and healthcare provider forms, you know that there is a lot of confidential information that is shared – from social security numbers, bank information to personal healthcare history. The healthcare industry was warned by the FBI in April that they were “not as resilient to cyber intrusions compared to the financial and retail sectors, therefore the possibility of increased cyber intrusions is likely”, and attacks have already been documented, in this example of the Romanian hacker who attacked the Vermont health exchange.

The reality is that the healthcare industry is just one of many that will tap into the innovation possibilities of the cloud and Internet of things. The world of cloud computing will become infinitely more interesting and at the same time more challenging. Imagine mass transit networks with thousands of sensors that send information about the status of buses, trains and light rail environments to the cloud to be processed, or remote oil, gas and mining stations with management sensors because of their hard-to-get-to locations. Application enablement platforms for the Internet of things are being developed as we speak.

Privacy and Security Concerns

Of course, this means that the intersection of cloud and Internet of Things (IoT) will also usher in a new era of privacy and security concerns.

Today, significant enterprise files, spreadsheets and proprietary intellectual data already reside in cloud applications like Salesforce.com, Google Apps and Box. As the era of Internet of Things dawns, the amount of data within these applications and other cloud applications developed for unique industries will increase, and be accessed by an interconnected ecosystem of organizations, networks and devices.

In order to truly embrace this intersection of cloud and Internet of things, security is a key requirement that requires collaboration between cloud providers and enterprises.

Advertisement. Scroll to continue reading.

Understanding the Responsibilities

The division of security responsibilities between cloud providers and enterprises need to be understood. Attacks at the physical or infrastructure layer–physical security, data center security, denial-of-service attacks–these are all the domain of the cloud provider. Cloud providers that offer software-as-as-a-service provide additional application layer capabilities like protection against web vulnerabilities, SQL injection attacks and configuration error vulnerabilities. As part of the due diligence to identity the right cloud provider application, enterprises can investigate the security controls that have been deployed, and negotiate for access to incident and vulnerability data.

However, access to, usage and security of the data being hosted at the cloud provider continues to be the responsibility of the enterprise. Think of it like making sure your cars are locked and valuables hidden when you park at a parking garage. Or locking your door and windows even when you have signed up for a burglar alarm service at your house.

Rethinking Security

Unfortunately, while some legacy security controls can extend to infrastructure-as-a-service (think virtualized firewalls on Amazon EC2), they fall short for software-as-a-service. Existing security solutions like firewalls may provide some visibility into the cloud application, for example, when user “John Doe” accesses salesforce.com, but will not understand the myriad of transactions within the application, how data can be exfiltrated, and the unique attack vectors. VPN solutions enable secure access to the cloud application, but are completely blind when the user is accessing via an unmanaged mobile device or unsecured networks.

Security for SaaS applications is also different from legacy malware and APT prevention solutions. The likely culprits for a breach will be insiders – malicious insiders downloading inappropriate data, errant insiders that accidentally expose files to the public, and compromised insiders whose credentials have been stolen. This can only be detected with anomaly detection capabilities that can set the baseline for normal behaviors (and transactions) and detect deviations from the norm.

Enterprises (and any entity planning on using cloud exchanges or cloud applications delivered as a service) MUST consider new cloud security solutions that provide visibility into user activities, application transactions, and deliver governance and security. For example:

Data Sharing Management – ensure content is being used and shared in a safe manner

User Management – monitor user activities, monitor users with excessive privileges and deprovision users who have left the company

Compliance Management – comply with regulatory mandates and legal eDiscovery mandates

Security Management – understand vulnerabilities, and risky and anomalous behaviors that may be indicative of a breach

It is only when we start looking at security for cloud and IOT differently from traditional enterprise security challenges can the promises of innovation truly become a reality.

Written By

Danelle is CMO at Ordr. She has more than 20 years of experience in bring new cybersecurity technologies to market. Prior to Ordr, she was CMO at Blue Hexagon (acquired by Qualys), a company using deep-learning to detect malware, and CMO at SafeBreach where she helped build the marketing organization and define the Breach and Attack Simulation category. Previously, she led strategy and marketing at Adallom, a cloud security company acquired by Microsoft. She was also Director, Security Solutions at Palo Alto Networks, driving growth in critical IT initiatives like Zero Trust, virtualization and mobility. Danelle was co-founder of a high-speed networking chipset startup, co-author of a Cisco IP communications book and holds 2 US patents. She holds an MSEE from UC Berkeley.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...