Security in the cloud
SaaS applications are changing the way agencies work - but new security approaches are needed when you no longer have a perimeter to protect.
As a former CIO, I have implemented and seen the significant benefits of cloud computing -- both the leverage of compute on demand and the use of software-as-a-service applications. In particular, SaaS-based applications increasingly are becoming the way organizations can quickly and easily leverage new capabilities. This is driving tremendous growth and innovation – AngelList has more than 11,000 SaaS start-ups listed in the U.S., and IDC predicts the SaaS-based market will surpass $112 billion by 2019.
While cloud computing and SaaS business models can enable IT organizations to lower infrastructure costs and enable more agility to support customers, it also increases the complexity in dealing with IT security. Not only is the IT organization giving up control (and visibility) into some of its IT infrastructure, to the degree it is leveraging SaaS-based applications, it is also having third parties store and control sensitive data.
Not so long ago, IT security staff would work to protect the organization's IT perimeter. With today's new computing and service models, one has to admit that a traditional perimeter no longer exists. Or if it does, that perimeter might include protecting dozens of third-party cloud service and SaaS-application providers.
To address these new IT security realities, I think of this is as a two-fold challenge. First, in regards to the use of third-party IT cloud service providers (to include more traditional outsourced data center services), organizations need to have confidence these providers are implementing the proper security controls. Those controls should match, or at least be very similar to, what the organization would implement within its own data centers and networks. These controls range from physical access for personnel, identity management for system administration access and appropriate network encryption.
A number of non-profit organizations have been working on standardizing these controls for the industry. Notably, the Cloud Security Alliance (cloudsecurityalliance.org) has developed the Cloud Controls Matrix, a security controls framework specifically designed for cloud computing. Leveraging CCM, the CSA has developed an auditing, certification, and registry program for cloud service providers known as Security, Trust & Assurance Registry. In a similar model, the U.S. Federal Government has developed its FedRAMP program, a means for cloud service providers to meet minimum security control requirements at three different levels as defined by the NIST 800-53 security control suite.
Yet even if an IT security manager has faith in the control suite of the underlying cloud service provider, what about the case of an organization leveraging a SaaS application? In this case, it is likely that sensitive data will be stored and controlled by the third party and used by organization's customers or partners in ways that the data never touches the organization's network, firewalls or other directly controlled security devices or processes.
As a CIO or CISO, this situation gives one significant concerns, as SaaS applications can leave one with little visibility and control regarding security of the application and its data. Hence the second challenge is how to extend an organization's security policies and controls to public clouds and SaaS applications.
This challenge has given rise to what are known as cloud access security brokers. These products serve as security enforcement points sitting on premise or in the cloud and logically exist between the organization and the cloud service provider to provide a range of services to include identity authentication and authorization, device profiling, application whitelisting, encryption, alerting, malware detection, etc. Some of the leading vendors in the CASB market include Bitglass, Blue Coat/Symantec, Cloudlock/Cisco and Skyhigh Networks. The use of CASB solutions is growing rapidly, with Gartner Group reporting that by 2020, 85 percent of large organizations will use CASB solutions, up from less than 5 percent in 2015.
On the positive side, the CASB vendors have significant capabilities and are filling a void in the market. As a former CIO, however, I have a jaded view of solving enterprise IT security challenges by continuing to add tools and then working internally to integrate them. I have rarely seen this strategy work well.
Instead, I have become a proponent of the view that the best approach to address enterprise IT security challenges is the use of an IT security platform that provides the range of capabilities to help prevent and, when necessary, detect breaches in the enterprise. In this market, Palo Alto Networks, Cisco and Check Point Software provide integrated platform solutions (disclosure: I am member of Palo Alto Networks Public Sector Advisory Council).
As an example of the value of a platform, Palo Alto Networks has recently extended its platform capabilities into cloud solutions and SaaS applications. What is particularly intriguing (and operationally appealing) is that I can set my security controls for a type of data (for example, tailor the controls according to the data's sensitivity), and the technology enables me to enforce those policies throughout its platform, irrespective of whether that data is residing in my own data center, an outsourced data center, or in a SaaS application on a public cloud. This greatly simplifies administration of security policies throughout an enterprise and offers advanced threat prevention.
Furthermore, one of the growing exploits used by attackers aims to infect users with malware via SaaS-based applications, since adversaries know that most organizations do not have the same ability to monitor those SaaS applications the way they do internally based tools. A key component of these platforms is the ability to bring threat detection and prevention capabilities to all aspects of the IT infrastructure and applications, including those residing in the cloud.
The use of SaaS-based applications is becoming a preferred approach for rapidly delivering new capabilities for organizations. The demand is coming from the business users, and as such, IT organizations must accept and plan for continued expansion in the number and use of SaaS. Accordingly, IT organizations need to develop a comprehensive approach for addressing the security challenges that come with relying on third-party computing and applications, even though the user and data may never traverse the organization's own network or data centers.