Saturday 3 October 2015

Three steps to secure cloud database services in the enterprise

Database as a service may be easy to deploy and easy to manage, but it is not without its security challenges. Expert Ed Moyle outlines three major steps enterprises should take to secure cloud database services in the enterprise.

Napoleon once famously said, "War is 90% information."
There are three things to note about this statement. First, it's as true today as it was 200 years ago. Second, it's equally applicable to business as it is to the battlefield. Third, 90% is conservative; today's businesses literally areinformation.
Given the importance of any given organization's data -- including the effort, time and money that goes into managing it -- it's understandable that moving it to the cloud can be complex.
But within the past few years, service providers have refined and improved database as a service (DBaaS) offerings, and adoption continues to grow as a result. Services such as Amazon Aurora,SimpleDB, Azure SQL Database,OpenStack Trove and numerous others have emerged that promise to bring efficiencies, economies of scale and other benefits of the cloud to the database world.
However, before jumping in feet first, it is important to note that these services offer a unique risk/value proposition for end-user organizations. There are also some unique security aspects of DBaaS that will influence the usage decisions organizations ultimately make.
What is DBaaS?
Before unpacking the security-specific aspects of DBaaS, it's important to clarify what we mean by the term. It's new enough that not everyone is using it the same way.
It goes without saying that database as a service won't be for every enterprise -- or every situation.
In this context, we're differentiating between "database in the cloud" and cloud database services; for example, just because a database is "in the cloud" doesn't make it DBaaS for our purposes. One could, for example, locate a virtual image running SQL Server in a public or private cloud in much the same way that you'd host that machine in a legacy data center -- or contract a managed hosting provider for your database server. This isn't the same as DBaaS.
DBaaS refers specifically to cloud database services that are managed by a service provider (note, this could be an internal or external service provider) where the administration and management of the database are a "black box" to the DBaaS customer. Similar to IaaS, PaaS and SaaS, this would usually involve a "pay as you go" pricing model, "instant on" provisioning, multi-tenancy and so on.
From an enterprise perspective, this can be both compelling and scary. On the one hand, potentially reduced costs and streamlined management are tremendously interesting from a business point of view. On the other hand, the confidentiality, integrity and availability of that data is paramount, and entrusting it to a cloud database service provider -- whether an internal service provider or third-party -- can be anxiety-inducing.
Three steps to ensure secure cloud database services
First of all, it goes without saying that database as a service won't be for every enterprise -- or every situation. As with any other cloud service, you'll want to evaluate the specific use case -- i.e., the business processes, applications and context -- to which you will be applying DBaaS to make sure the decisions are in line with your organization's culture and risk tolerances, meaning you'll want to undertake the same evaluation and vetting measures as you would apply to other cloud services. For example, are there legal and/or regulatory implications for moving the data to a cloud provider -- such as cardholder data that falls under PCI DSS, ePHI that is regulated under HIPAA, or Social Security numbers and other PII? And are there existing agreements with end users -- such as privacy policies -- that impact how you can store the data and where?
Just like you would evaluate a SaaS or IaaS along these lines, evaluation and vetting will play an important part in selecting a provider for cloud database services. Likewise, tools such as the CSA CAIQ and CCM can provide similar value in supporting these efforts as they do in evaluating and vetting other types of cloud providers. Programs like the STAR registry can potentially help streamline that process in the DBaaS space as they do with other cloud services.
Point being, evaluating the security and operational aspects of a DBaaS provider and cloud database services just like you would any other service provider is a solid first step.
It's important to consider how security properties will change before and after the migration.
Second, there are some steps specific to data protection that are very important to ensure a secure migration to cloud database services. Enterprises must understand how the data will be protected in transit to the provider and once it's there. For example, consider the amount (i.e., volume) of data that is likely to be associated with the typical production database. How are you going to get the data there in the first place? Some service providers might leverage native and product-specific database replication methods (for example, MySQL replication), others might utilize a proprietary tool (such as the SQL Azure Migration Wizard), while still others might require physical shipment of media. The approach your provider employs should be carefully evaluated from a security point of view and discussed frankly and openly with the provider to ensure security goals are met during this migration. Protecting the data while it is migrated is a key step, as is having a game plan for moving it back on-premises or to another service (to avoid vendor lock-in).
Likewise, while the data is in the custody of the service provider, what security options and features are offered? For example:
·         How are connections authenticated and how are access requests authorized?
·         Is there encryption? If so, is there an option for column-level, transport, encryption of an entire instance?
·         What logging and audit features are available and how can they be accessed by your organization's staff?
·         What redundancy options are available and how will they be structured in your usage?
Again, not all cloud database services providers offer the same feature set, so it's important that customers understand what they're buying and think through how security features will tie into their broader security program.
Lastly, it's important to consider how security properties will change before and after the migration. For example, are you employing specialized database protection software that would be obviated by virtue of a migration to DBaaS? If so, how will you ensure that the intent of that control is still satisfied under the new model? This may require you to go back and understand both architecturally and from a risk control standpoint why those controls were implemented in the first place so you can ensure risk is mitigated to the same extent under the new model as compared to the old.
DBaaS is certainly a powerful concept and one that promises potential flexibility advantages and cost savings. However, realizing those benefits without putting the organization at risk means enterprises must have a game plan for secure DBaaS. Understand how the cloud database service will be used, and use that to guide vendor selection. Organizations should also have a game plan for data protection during and after migration. And last but not least, understand the impact of that migration to existing controls and countermeasures that you already have fielded in your enterprise.


Bring your own IT evolves from BYOD

Devices were just the tip of the iceberg. Constant connectivity and cloud computing make it easier than ever to bring your own IT wherever you go.

In this era of terabyte-plus USB drives, cloud computing and high-performing client devices, bring your own IT is a lot easier than most people think.
Many workers -- carpenters, mechanics, even technical professionals -- bring their own tools to work.  These workers have pride of ownership and a constant willingness to maintain, upgrade, streamline and innovate. Knowing that one's toolset is always available, appropriate, familiar and in good working order increases productivity and quality of the product or service delivered.
The bring your own phenomenon should extend well beyond tools and devices.
A corresponding concept, BYOD, has been a fixture in the business world for some time now. Many firms embrace or at least allow the practice of employees using their personal computers, smartphones and tablets. Organizations canlower their capital budgets, and workers can use devices that they like and are most productive with. Even support costs can be lower, at least with the right mobility management strategy and tools in place.
The bring your own phenomenon should extend well beyond tools and devices. It's always been my goal to achieve mobility nirvana: having my entire organizational infrastructure be mobile. The idea of being able to accomplish a particular task only when in the office is painful at best.
Information, applications and connectivity are the keys that open the door to this era of bring your own everything (BYOx). I travel a good deal and work on several projects at once. I must have everything I need available at a moment's notice no matter where I might be. Some professionals have been doing this for some time. Here are a couple of examples:
·         Years ago I designed a complete IT solution for a disaster relief agency. The idea was to have a facility that could be dropped out of a plane, set up in minutes, backhauled by satellite, interconnected by pre-Wi-Fi WLANs and powered by generators -- truly a bring your own IT scenario.
·         For years, field-audit teams (technical, financial and beyond) have arrived at a client site and set up their own IT infrastructure -- a basic requirement given the task at hand, where independence is critical. All it takes is an access point equipped with a cellular router (which is really easy today), and the rest is PCs and software. The entire infrastructure can be on the air in minutes.
Of course, BYOx could be viewed as a rogue operation without proper clearance from IT where required. But the trend is going to see a massive increase in popularity over the next few years, driven by BYOD and the amazing range of capabilities now available in the cloud.
All one needs is a mobile device and some form of connectivity, and the rest can be provisioned, managed and maintained entirely in the virtual domain. Bring your own IT is the gateway to mobility nirvana.