Cloud Security: Bringing Clarity to Common Myths and Misconceptions



Similar documents
Software As A Service

Microsoft Dynamics. The Business Benefits of Hosted ERP Solutions for Small & Midsize Organizations

Microsoft Dynamics. The Business Benefits of Hosted ERP Solutions for Small and Midsize Organizations

Five keys to a more secure data environment

How To Understand Cloud Computing

A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS

Take Your Vision to the Cloud

Client Security Risk Assessment Questionnaire

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

Dispelling the vapor around Cloud Security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Defining Data Security in 2015 and Beyond

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

( and how to fix them )

CloudCheck Compliance Certification Program

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

IBM Connections Cloud Security

IBX Business Network Platform Information Security Controls Document Classification [Public]

Cybersecurity Health Check At A Glance

In-House Vs. Hosted Security. 10 Reasons Why Your is More Secure in a Hosted Environment

GiftWrap 4.0 Security FAQ

CLOUD, SCHMOUD: CAN YOU SAY YOUR DATA S SAFE?

What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing.

How To Choose A Cloud Computing Solution

Privacy + Security + Integrity

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Cloud Contact Center. Security White Paper

Secure, Scalable and Reliable Cloud Analytics from FusionOps

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

BMC s Security Strategy for ITSM in the SaaS Environment

HITS HR & PAYROLL CLOUD MODEL WHITEPAPER

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Data Management Policies. Sage ERP Online

Cloud security with Sage Construction Anywhere

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Deltek First - The Business Case

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security

Open an attachment and bring down your network?

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Three Things to Consider Before Implementing Cloud Protection

custom hosting for how you do business

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Addressing Cloud Computing Security Considerations

The Protection Mission a constant endeavor

SERENA SOFTWARE Serena Service Manager Security

Internet threats: steps to security for your small business

RL Solutions Hosting Service Level Agreement

Cloud Computing for SCADA

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

External Supplier Control Requirements

Whitepaper. Best Practices for Securing Your Backup Data. BOSaNOVA Phone: Web:

Security Controls for the Autodesk 360 Managed Services

Debunking Security Concerns with Hosted Call Centers

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Security Issues in Cloud Computing

Application Security in the Software Development Lifecycle

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

BIG SHIFT TO CLOUD-BASED SECURITY

A clearer view. Security, compliance, and the cloud

Presented by Luke Downing

Nominee: Barracuda Networks

PCI DSS COMPLIANCE DATA

Is Your IT Environment Secure? November 18, Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Cloud Contact Center. Security White Paper

INFORMATION SECURITY PROGRAM

About Dorset Connects

GoodData Corporation Security White Paper

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Intel Enhanced Data Security Assessment Form

Security from a customer s perspective. Halogen s approach to security

Nine Steps to Smart Security for Small Businesses

ADVANCE YOUR MISSION WITH THE CLOUD DO MORE WITH LESS CLOUD SOLUTIONS CDW NONPROFIT

How On-Premise ERP Deployment Compares to a Cloud (SaaS) Deployment of Microsoft Dynamics NAV

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Sage ERP I White Paper. ERP and the Cloud: What You Need to Know

The Real SaaS Manifesto: Defining Real SaaS and how it can benefit your business

WhitePaper. Private Cloud Computing Essentials

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

FormFire Application and IT Security. White Paper

ProjectManager.com Security White Paper

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Cybersecurity and internal audit. August 15, 2014

Brainloop Cloud Security

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Cloud Security: An Independent Assessent

Network Security Landscape

HIPAA and Cloud IT: What You Need to Know

security in the cloud White Paper Series

Secure Your Source Code and Digital Assets

Managing internet security

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

DOWNTIME BREACHES DATA LOSS. SYMANTEC TECHNICAL SERVICES HELP YOU AVOID THEM.

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

AHLA. JJ. Keeping Your Cloud Services Provider from Raining on Your Parade. Jean Hess Manager HORNE LLP Ridgeland, MS

Transcription:

Presents: Cloud Security: Bringing Clarity to Common Myths and Misconceptions Authors: Dan McCue, Senior Vice President, Finance & Accounting, Sutherland Global Bill Burke, CEO, Merit Solutions Copyright 2012 Sutherland Global Services

INTRODUCTION Companies in today s economic environment are all facing the age-old business conundrum: how can we do more with less? To help improve capacity but drive down costs, organizations are increasingly turning to cloud-based technologies. Cloud-based Enterprise Resource Planning (ERP) can be deployed quickly, minimizes the initial investment, reduces the Total Cost of Ownership (TCO) and offers seamless upgrades. Although many CEOs, CFOs, CIOs and key stakeholders look to cloud computing to help realize tremendous savings, there are concerns about cloud-based data solutions. In the age of cyber attacks and the seemingly ever-growing list of online security threats, senior executives worry about the safety of their cloud-based information. Physical location, data transmission, access security and disaster recovery represent the four top-of-mind security concerns. This white paper will look at some of the key aspects of cloud security and examine some of the myths and misconceptions. Research also shows that while senior executives are apprehensive about cloudbased security, only a small percentage conduct due diligence on their providers. This white paper also includes a checklist of 10 questions that SMBs, mid-market companies and large organizations should ask their potential providers.

THE RISE OF CLOUD COMPUTING A 2011 survey by CDW found that 28% of US-based organizations are using cloud computing today, and 73% of those organizations took their first step by implementing a single cloud application. Interestingly, the vast majority of the survey respondents (84%) say they have already employed at least one cloud application. So, in essence, there are a lot of first steps being taken, and wider cloud adoption is foreseeable. There s no doubt the cloud is garnering attention as companies cautiously explore cloud applications. According to an April 2011 Forrester Research report titled Sizing the Cloud the global cloud computing market is estimated to reach $241 billion in 2020. Yet, despite the rise of cloud computing, there are a number of misconceptions floating around, with security at the top of the list. Top 5 Cloud ERP Misconceptions 1. With a cloud ERP solution, our data isn t as secure as it is onsite. 2. Cloud ERP solutions provide only basic ERP functionality. 3. Cloud ERP solutions can t be customized. 4. It s difficult to integrate cloud ERP systems with other systems. 5. If the Internet goes down, the business goes down. As companies transition from low-risk testing the waters to taking the plunge with cloud ERP for more mission-critical functions like Finance and Accounting, the issue of cloud security is inevitable. The question most often asked is, Just how secure is our data? It s a legitimate question. It was only a few short years ago that cloudbased ERP systems were the exception rather than the norm for most companies. The idea of not having all data, infrastructure, software and hardware on-site was new, intriguing and fraught with concerns. Entrusting private business data and applications to an outside hosting service made (and continues to make) some organizations uncomfortable.

Despite the cloud s shift into the mainstream, security and compliance still top the list of apprehensions inhibiting cloud adoption. Some of this apprehension is caused in part by confusion around a lack of industry standards; expectations and definitions of security can vary from industry to industry. Different regions and countries are subject to different data protection policies and legislation that could compromise data privacy. Companies need to conduct due diligence on their prospective cloud providers. Data security and privacy issues are very real concerns no matter whether SMBs implement a cloud ERP solution or on-premise ERP. Both require knowledge of data: which data is sensitive, the degree of sensitivity and the protocols required to protect it. Yet, the pervasive myth that cloud-based ERP simply isn t as secure as on-premise solutions continues to linger. The myth persists based on four misconceptions about the security of physical location, transmission, access security, and disaster security. PHYSICAL LOCATION The Misconception: A cloud-based solution is nebulous and can t be secured. The Reality Cloud computing is new, unknown and eyed suspiciously. It has the appearance of being risky because you cannot secure its perimeter where are a cloud s boundaries? A May 2010 study by the Ponemon Institute found that IT professionals believed security risks were more difficult to curtail in the cloud, including securing the physical location of data assets and restricting privileged user access to sensitive data. Yet, as CIO Magazine pointed out:

respondents only gave the on-premise alternative a 56% positive rating! In other words, nearly half the respondents believe that their own internal data centers do not do a good job of securing the physical environments of their data centers. 1 The reality is that often on-premise ERP security does not measure up to the same standards as a world-class data state-of-the-art facility. An ideal data center should be secure, free of windows, and built with cement or steel fortifications with 24/7 on-site security. Most SMB IT departments reside in a department or on a floor of commercial buildings and office towers, which rarely have these conditions. In comparison, MAXCloud data centers are housed in multi-million dollar facilities with building fortifications. The main data center is housed underground in a facility that is designed to withstand an 8.3 magnitude earthquake. The data centers also have 24/7/365 security, monitored by staff as well as security guards. TRANSMISSION Misconception: Cloud-based solutions are more vulnerable to hacking and other attacks. The Reality SMBs typically invest in hardware, software and applications to thwart specific security challenges: spam, security breaches, malware, noncompliance, and so forth. Unfortunately, many of these products have limited life cycles, are difficult to scale and, from a security point of view, often only produce single points of failure. Additionally, the latest technologies to scramble and encrypt data RSA, Secure Socket Layer (SSL), Data Encryption Standard (DES), or Triple DES, etc. can quickly drain SMB IT budgets. 1 Golden, Bernard. "Cloud Computing Security: IT's Take on State of Play." CIO Magazine. N.p., 17 May 2010. Web.

With traditional licensed ERP software, organizations typically must wait for the next release to benefit from the latest features, upgrades, or security patches. Sometimes limited resources can mean that upgrades aren t always deployed in a timely manner. In fact, twothirds of mid-size businesses are running outdated versions of their ERP software 2. This can leave these companies vulnerable. Under the SaaS (Software as a Service) delivery model that forms the basis of cloud ERP, the provider continuously and unobtrusively adds the latest features and upgrades, which means that users can be assured that they re actually using rather than waiting for the latest security technology. By their very nature, external applications like cloud-based technologies must adopt a trust no one approach. Layers of security controls, encryption of all sensitive data and security testing at the application level, as well as countless other safeguards are necessary for cloud security. A world-class cloud ERP provider will perform rigorous internal vulnerability scans, log threats, and are audited for SSAE 16 Type 2 compliance. Data is fully secured, both in transmission and at rest. For example, MAXCloud runs on a Microsoft Dynamics AX platform. It uses the RPC_C_AUTHN_LEVEL_PKT_PRIVACY call, which provides the highest security level available through a remote procedure call (RPC). There are no software or hardware purchases, and updates are seamless. ACCESS SECURITY 2 "Why Cloud Computing Matters to Finance," Ron Gill, CMA, CFM: Strategic Finance, January 2011.

The Misconception: An on-premise solution offers more security over who may access information. The Reality The myth that a cloud solution simply cannot be as secure as an onpremise solution has very much to do with the notion of seeing is believing. Often companies feel more in control of their data when it resides under their own roof. When ERP is on-site, it is the sole responsibility of the IT department to authenticate and log all access to data in order to prevent unwanted users, both internal and external, from accessing information or resources. Access security for on-premise ERP systems may be enforced through business logic or at the database layer. This authenticates users and provides them with specific rights to data objects. For example, a payroll clerk would only have access to payroll data, not customer records. A cloud-based ERP is no different. With MAXCloud, you control access to data throughout by managing security restrictions on forms, records and data fields for specific user groups and domains, and define and assign rights according to how you want security restrictions managed. Also, because MAXCloud is a single-tenant environment, there is no risk of data being inadvertently exposed to other users due to poor implementation of the access management process. While a secure cloud ERP system doesn t increase the vulnerability of your business data, authenticated users have anywhere, anytime, any device access, which is a tremendous advantage for global collaboration, monitoring and managing.

SECURITY FROM DISASTER Misconception: It s better to handle backups internally to be able to access data more quickly in case of a disaster. The Reality Companies must examine how often they back up data and where the backups are the stored. SMBs looking to third-party back-up systems and business continuity facilities must thoroughly examine the security standards that are in place. The truth of the matter is that SMBs need to invest in a rigorous program for data backups with offsite storage in a secure location separate from the main data center. Key questions to ask before choosing an external backup partner include: Does the third-party data recovery service abide by recognized security standards and compliance requirements? What happens if there is a power failure? How long will my data be kept? Cloud-based solutions like MAXCloud ensure full nightly backups, which are stored in an off-site location and are maintained for seven years. As well, the data centers have multiple power sources and redundant incoming lines provisioned in an N+1 configuration for continuous power. THE NEW REALITY OF CLOUD ERP SOLUTIONS Traditional and cloud ERP share many of the same security issues, from preventing unauthorized access to safe and secure backups. As the new kid on the block, cloud technology is unfamiliar and not fully trusted. SMBs that adopt a cloud-based ERP solution like MAXCloud find that security is actually improved. Unlike large enterprise companies, SMBs

usually don t have the high security infrastructure, processes or best practices knowledge readily on hand. In the case of cyber attacks, cyber espionage, malware, human error and disasters, cloud-based service providers have higher levels of security. Microsoft released research in May of 2012, that verified the significant IT security advantages from using the cloud. One of the most interesting facts to emerge from the survey was that "35 percent of US companies surveyed have experienced noticeably higher levels of security since moving to the cloud." 3 Security is always a top concern for companies, but it s time to put to cut through the fog, and bring a little clarity to the situation: Cloud ERP systems and the data they contain are as secure, if not more secure than traditional ERP systems. 3 Microsoft. News Center. Cloud Computing Security Benefits Dispel Adoption Barrier for Small to Midsize Businesses. 14 May 2012. Web.

SECURITY CHECKLIST CompTIA's 9th Annual Information Security Trends survey of U.S. executives with IT responsibilities reported that only 29% of organizations report conducting a heavy review of their cloud service provider's security policies, procedures and capabilities. SMBs must vet their cloud providers by conducting due diligence and asking for proof of physical audits and physical access controls. Here are 10 questions you can ask your provider. 1.) What is your privacy policy? Your potential solution provider should have a well-defined and clearly articulated privacy policy that spells out exactly who has access to various types of information. It should also describe the organization s standard operating policies and procedures for ensuring privacy. Your prospective vendor should voluntarily provide you with a copy of this policy information. 2.) What level of security do you use to ensure the safety and integrity of critical data? To safeguard your data onsite, your prospective solution provider should use a combination of intrusion detection system (IDS) and intrusion prevention system (IPS) products and apply antivirus at various network layers. It should also utilize deep packet inspection (DPI) or an application-level firewall technology that scans all levels of packet transmission. Finally, it should also use secure socket layer (SSL) or https-encrypted transmission to ensure Internet security. 3.) Is your production equipment housed in a state-of-the-art facility? Your prospective vendor s data center should be secure, free of windows, and built with cement or steel fortifications. It should also be located somewhere that is not prone to inclement weather.

4.) What are your facility s physical security arrangements? Are they in place 24 hours a day, seven days a week, and 365 days a year? Similar to its privacy policy, your potential hosted ERP solution provider should have well-defined and robust security arrangements that are in place at all times. 5.) Do you contract with an independent, third-party organization to conduct periodic external and internal vulnerability scans? In addition to maintaining an intrusion response system and a prepared response plan, your prospective solution provider should frequently commission both routine and unannounced security audits. 6.) How often do you back up data, and where are the backups stored? Your potential hosting provider should have in place a rigorous program of data backup and offsite storage in a secure location remote from its main data center. 7.) Do you offer full hardware redundancy to avoid the negative consequences of a power failure? Your prospective solution provider s data center and backup location should have redundant power supplies, such as battery and diesel generator backups, to avoid the negative consequences associated with a power failure. 8.) Does your staff include a highly qualified operations team that monitors the site 24 hours a day, 365 days a year? Your prospective vendor should have on staff many certified security experts, including those with the preferred CISSP designation. 9.) Is my data stored in a multi-tenant or single tenant environment? A multi-tenant cloud-based ERP is a set of pooled computing resources, shared among many different organizations (tenants). In short, various organizations share the same database. In a single tenant environment, customers operate with their own individual

database. It is our belief that an isolated single tenant environment best maximizes performance, security, privacy and integration. 10.) How safe is your data center in terms of natural disasters? Your potential provider should be prepared for any number of natural disasters. In addition to a windowless, cement building with steel fortifications, the provider should have multiple power sources and redundant incoming lines provisioned in an N+1 configuration for continuous power. For example, our main data center s backup generators can power a city of 25,000 people - which allows us to go off grid for 28 days without water, electricity, sewer, or natural gas feeds.