John DiMarco on Computing (and occasionally other things)
I welcome comments by email to jdd at cs.toronto.edu.

Mon 24 Feb 2020 10:19

Some Clarity on Public Cloud Cybersecurity

Break in clouds, revealing clear skies
Image by Sabrina Corana from Pixabay
I've been thinking about public cloud cybersecurity for some years now, as I've watched adoption of the public cloud grow from a trickle to a flood. Early on, most of the reasons I heard for public cloud adoption made a great deal of sense to me: the need to rapidly scale up and down the size of a service, the desire to leverage the expertise of a large technical partner with resources in network and computing infrastructure exceeding one's own, the desire to leverage geographically diverse, redundant datacentres, the desire to fund computing from operating rather than capital budgets, and the desire to build adaptable, scriptable services with better connectivity to the Internet than one could otherwise provide for oneself. But in the last year or two, as anxiety about cybersecurity increases, I've been hearing more and more people refer to cybersecurity as their primary reason for their adoption of the public cloud. I'm not so sure what I think of this reasoning. I can understand why someone might want to pass to a third party a task that makes them anxious. In situations involving strong emotions, such as anxiety, there is risk of "confirmation bias": believing something is true because you want it to be true. But is it? Ceteris paribus (all other things being equal), is the public cloud intrinsicly more secure than on-premise datacentres?

Some argue yes. Eplexity calls cloud computing "an established best practice for businesses" and claims "your data is typically safer in the public cloud than in an on-premises data centre". In 2016, Sara Patrick of Clutch, guest-writing for Tripwire.com, claimed to have "four reasons why the Cloud is more secure than Legacy Systems" In 2017, Quentin Hardy of the New York Times claimed that cloud data is "probably more secure than conventionally stored data." In 2018, David Linthicum, writing for InfoWorld, claimed "your information is actually safer in the cloud than it is in your own data centre".

One reason given for the claim is that public cloud providers offer greater technical expertise than what is possible on-premise. Eplexity writes:

Unless your company is already in the business of IT security, spending time and effort on securing your on-premises data distracts from your core functions. Most organizations likely don't have a robust, experienced team of cybersecurity professionals at their disposal to properly protect their on-premises data. ... As such, cloud providers may employ hundreds or thousands of developers and IT professionals.
This is an argument from size and scale. Cloud providers are bigger than you, and have arguably more IT expertise than you, so they can do a better job than you. But sadly, size and IT expertise is no guarantee of security. Yahoo was a large Internet company, valued at one time at $125 billion. It employed thousands of developers and IT professionals. Yet it was subject to a cybersecurity breach of three billion user accounts in 2013/14; the breach was not disclosed until the fall of 2016, and the full impact was not known until october 2017. The damage to Yahoo's business was significant: Verizon acquired Yahoo in 2017 for less than $5 billion, a deal that was nearly derailed by the disclosure of the breaches.

I think we must conclude from the Yahoo story that size and expertise alone is no guarantee of cybersecurity. Naturally, major cloud providers like Amazon, Microsoft and Google are aware of the Yahoo situation and its consequences. No doubt it illustrated for them the negative impact that a major breach would have on their business. I cannot imagine that they would take the threat lightly.

Yet there have been close calls. Microsoft, a major cloud provider, in December 2019 accidentally disclosed to the world a cloud database on Azure with 250 million entries of customer support data. Happily, a security researcher spotted and reported it, and Microsoft fixed it soon after. Moreover, Zak Doffman, writing for Forbes, reported in Jan 2020 that Check Point Software Technologies, a cybersecurity vendor, had discovered in 2019 a serious flaw in Microsoft Azure's infrastructure that allowed users of the service to access other users' data. While Check Point reported it immediately to Microsoft, who fixed it quickly, had the flaw been discovered by criminals instead of cybersecurity researchers, a great many things running on Azure could have been compromised. Doffman quotes Yaniv Balmas of Check Point:

...the take away here is that the big cloud concept of security free from vulnerabilities is wrong. That's what we showed. It can happen there as well. It's just software and software has bugs. The fact I can then control the infrastructure gives me unlimited power.
In the Check Point research article describing the flaw, Balmas concludes:
The cloud is not a magical place. Although it is considered safe, it is ultimately an infrastructure that consists of code that can have vulnerabilities - just as we demonstrated in this article.

What, then, is the right answer? Well, there isn't one. Neither public cloud or on-premise datacentres are magic, neither are "safe". Cybersecurity is a challenge that has to be met, no matter where the service is, or what infrastructure it is using. Happily, this is finally being recognized. Even Gartner Research, a long-time proponent of the public cloud, predicting as recently as mid-2019 that public cloud infrastructure as a service (IaaS) workloads will suffer at least 60% fewer security incidents than those in traditional data centers, has recently taken a more nuanced view. In the fall of 2019, this prediction of fewer security incidents in the cloud disappeared from Gartner's website, and was replaced by this:

Through 2024, the majority of enterprises will continue to struggle with appropriately measuring cloud security risks.
Questions around the security of public cloud services are valid, but overestimating cloud risks can result in missed opportunities. Yet, while enterprises tended to overestimate cloud risk in the past, there's been a recent shift - many organizations are now underestimating cloud risks. This can prove just as detrimental, if not more so, than an overestimation of risk. A well-designed risk management strategy, aligned with the overarching cloud strategy, can help organizations determine where public cloud use makes sense and what actions can be taken to reduce risk exposure.

So does "public cloud use make sense"? Yes, of course it does, for a great many things. But it's not because the public cloud is intrinsicly more secure. The public cloud has its own set of cybersecurity issues. There is no "free pass". As always, carefully assess your risks and make an informed decision.

/it permanent link


Blosxom