Cloud Computing: 5 Topics for the Boss

Data Protection, Cost Are Two Key Items
Cloud Computing: 5 Topics for the Boss
Editor's Note: An earlier version of this article mis-stated the name of Robert Glenn, CISO at NIST. This version corrects that mistake. The author and publisher regret the error.

Security is a primary reason many organizations hesitate to move their data to the cloud. This means chief information security officers spend lots of time with senior leaders, advising them on how to safeguard their organizations' cloud computing initiatives.

Simply, executives seek the CISO's advice so they can determine whether the benefits the cloud provides outweigh its risks.

"It is this stuff senior executives are looking for from us in very simple terms," says Robert Glenn, chief information security officer at the National Institute of Standards and Technology. Glenn regularly meets with NIST managers while a cloud initiative is in development, when it's deployed and after it becomes operational.

Here are the top five cloud computing security risks and concerns CISOs must discuss with their managers.

  1. Vendor Assessment: How does the cloud provider administer its computing environment? Do the vendor's security controls adequately protect the organization's information? Leaders seek details on how the security officers evaluate the vendor's infrastructure on a regular basis and the type of access CISOs and their teams get to assess the service provider's risk and vulnerability controls. Executives seek examples of how vendors safeguard data, such as reports, showing results from real-time monitoring of IT systems and how data will be protected during a breach. "We need to show evidence to our executive team," Glenn says.
  2. Data Protection: Where is their data, who has access to it, where will the information physically reside, what format data is stored in, what back-up procedures exist, and who's managing the system? Providing answers to these questions, says Malcolm Harkins, ISACA member and CISO at chipmaker Intel, "helps in providing assurance to executives on the security posture of the cloud vendor." For example, if an Internet connection fails, or the organization decides to go with a different service provider, the CISO should explain how the organization would be able to retrieve and protect its data or continue to run its applications.
  3. Reputation: Executives express concern about the history of cloud providers and often want to know how long they have been around, their reputation and maturity of services within the industry. "We are not just looking for evidence that vendors are secure today; we are looking for evidence of IT security throughout the life of the services," Glenn says.

    Leaders want to get assurances that the cloud providers have undergone a thorough background check, including those that relate to the trustworthiness of vendor employees who work, manage and operate systems and information. Executives prefer cloud providers that have previously been approved by other organizations, as these vendors in such cases have undergone the initial scrutiny and are familiar with the compliance regulations and requirement.

  4. Data Sensitivity: Senior leaders fret over the mixing of sensitive or secret information and non-sensitive data on the same virtual machines. But Harkins makes his executives understand that mixing the data will not expose confidential information if adequate security controls are implemented by the service providers. The discussion often turns to whether certain business information is appropriate for the cloud model. A CISO must make a clear business case, showcasing how vulnerabilities in the vendor infrastructure could lead to sensitive data being leaked and its impact on the organization as a whole. "In my discussions, I try to give them a sense to think and ask how likely this is to happen?" Harkins says.
  5. Cost: Conventional wisdom is that cloud services will cut costs, but that isn't necessarily so, at least not initially. "Security costs might offset a lot of those savings," Glenn says. CISOs must make senior leaders aware that when information moves to the cloud, all security controls have to be replicated in some form within the service provider's environment. CISOs also need to spend a lot of time with the providers, and as the axiom goes: Time is money. "When we find out that we will need nine months to do a full assessment, that's a lot of money being spent on just trying to ensure that the service is secure," Glenn says. So, essentially, the discussion with executives is to look at balancing the associated risk and savings.

CISOs aren't just the teachers, but students, too, drawing knowledge from these meetings with senior leaders about business initiatives that could be fostered by cloud computing.

About the Author

Upasana Gupta

Upasana Gupta

Contributing Editor, CareersInfoSecurity

Upasana Gupta oversees CareersInfoSecurity and shepherds career and leadership coverage for all Information Security Media Group's media properties. She regularly writes on career topics and speaks to senior executives on a wide-range of subjects, including security leadership, privacy, risk management, application security and fraud. She also helps produce podcasts and is instrumental in the global expansion of ISMG websites by recruiting international information security and risk experts to contribute content, including blogs. Upasana previously served as a resource manager focusing on hiring, recruiting and human resources at Icons Inc., an IT security advisory firm affiliated with ISMG. She holds an MBA in human resources from Maharishi University of Management, Fairfield, Iowa.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.