Security Threats?: Will Your Move To The Cloud Open Up Your Company To
Security Threats?: Will Your Move To The Cloud Open Up Your Company To
COlumn
This article appeared in the Oct Nov Dec 2010 issue of
n n
When companies consider cloud computing, they questions your company should ask itself at the
often think of its numerous benefits: no more outset of any cloud project.
costly infrastructures and administration tasks,
and instant gratification in terms of availability. 1. What Kind of Cloud Offering Should We Use?
Small and midsize businesses in particular can Depending on the degree of privacy they offer,
benefit from this easy-to-use software that comes clouds can be categorized into four subtypes,
without the burden of ongoing administration each of which offers a different level of security:
and system maintenance (see sidebar on the next A private cloud offering is a hosted offering
page for a cloud computing refresher). for just one business and a selection of its
But what about the potential risks? Unfortu- suppliers — here, a company can “privately”
nately, too few companies make security a priority access its applications and data. You would Gerlinde Zibulski (gerlinde.
when it comes to their cloud explorations. While choose a private cloud for data that you [email protected]) has been with
solutions outsourced to the cloud are convenient SAP for over 11 years. Gerlinde is
consider highly security-critical, such as busi- the Head of the Product
(because your staff will not have to deal with the ness or financial data that would give someone Management Team for Security
applications and the data that passes through insider knowledge. and Identity Management.
Gerlinde holds a master’s degree
them), it’s important to remember that someone
A public cloud offering is a hosted solution in economics from the Private
else will. Cloud computing means letting external University Witten/Herdecke.
available for multiple tenants and open to
administrators access, manage, and, to a certain
anyone who would like to participate in the
extent, control your business data. It also means
offering. This is a cloud you would choose for
moving your information out of the relatively
sharing open information geared toward your
secure perimeter of your own company, into the
own customers, such as help portals and
cloudy environs of the Internet. It’s a jungle out
product descriptions.
there, and you need to ensure that appropriate
security measures are in place to protect your A hybrid cloud offering consists of multiple
vital assets and interests — from both a business internal and external providers and is geared
perspective and a legal one. toward specific business-to-business applications
But note: Securing the cloud isn’t rocket science. with a focus on commercial usage. Less critical
With proper planning and the right tools, compa- applications can be run in a public cloud, whereas
Regine Schimmer (regine.
nies can take advantage of the benefits of a cloud the more sensitive, business-critical applications [email protected]) is a Solution
environment and mitigate potential risks. can be run in a private cloud. This offering is for Manager for SAP NetWeaver
Identity Management. She has
those looking to set up restricted marketplaces
several years of experience with
Exploring the Cloud? 3 Key Questions or with public invitations to tender. SAP security solutions and has
worked on SAP Security Product
You Should Get Answered First A community cloud offering consists of hosted
Management teams at SAP AG
There are many considerations for companies offerings for Internet communities (usually and SAP Labs.
looking into cloud computing. Here are three organized around a specific topic), thus easing
1. The software is hosted. Cloud software runs on servers that are hosted strong authentication mechanisms are a must.
by an external outsourcer or by the company’s IT department as a sepa- It is also highly crucial to understand the
rate corporate entity. In a hosting scenario, companies might run their outsourcer’s key management policy. Ask the
own systems and applications on hosted servers and transfer formerly outsourcer where the encryption keys will be
on-premise software onto servers hosted by a provider. Or they might stored and who has access to them. Ideally,
leverage applications on top of hosted servers. only the businesses themselves or the end users
2. The software can be accessed on-demand. Companies access cloud solu- should be able to see the keys.
tions via the Internet (browser-based) or via web services (SOA-based).
On-demand access requires high availability of the software, since users 3. What Should I Look for in a Provider’s SLA?
expect to be able to execute cloud offerings anytime and anywhere and Service-level agreements (SLAs) regulate the
have a very limited tolerance for system downtime. Internet-based ac- conditions and define the contract for a cloud
cess allows providers to leverage various standards for web services, in- offering. As a business or an end user, you should
teroperability, and security developed by entities such as the World carefully read and make sure you understand
Wide Web Consortium (W3C) or the Liberty Alliance, in which business-
these terms. In regards to security, pay special
es, academia, and software vendors cooperate to ensure ease of imple-
attention to security management and secure
mentation and interoperability.
configuration. For example, ask:
3. The IT administration is outsourced. To reduce costs, businesses will usu-
ally choose a cloud offering where the IT administration is outsourced, What are the provider’s encryption offerings
which means that someone external to the business’s workforce has for credit card payments? Are they compliant
administrative rights on the servers and access to the application data with the Payment Card Industry Data Security
— this outsourced administration is what makes security so pressing. Standard (PCI-DSS)?
* See “Cloud Computing and SAP: Where We Are and Where We’re Going” by Kaj van de Loo and How often do servers receive security patches?
Roland Wartenberg in the July-September 2010 issue of SAPinsider (sapinsider.wispubs.com).
What are the guarantees for high availability?
When are the scheduled downtimes?
information: email
address
service providers (SPs) in this scenario. To sign-on between businesses and a variety of SP
establish identity federation, the airline and back-end systems. The SP does not need to sanitize
the administrators from each SP company need or cleanse the user IDs. And the users can keep
to set up agreements about how to exchange their various back-end IDs to ensure their privacy,
the user ID information. In this example, the but still be properly and strongly authenticated.
As more and more companies go about this requirement in
companies explore the different ways: Summary and Outlook
Attribute-based identity federation: The only As more and more companies explore the possi-
possibilities of cloud bilities of cloud computing, the issue of security
information the hotel agency requires is the
computing, the issue airline’s name and the member’s status. It does should be top-of-mind. Hosting solutions in
the cloud and linking on-premise solutions and
of security should be not need a named user, but instead uses the
attribute “member status” to process the user. on-demand cloud offerings provide a bevy of
top-of-mind. benefits, but also involve making your business’s
The required information about the airline
company is included in the authentication information accessible to more outside forces. To
information from that company. With attribute- mitigate the potential risks that come with this,
based identity federation, companies can use there are many considerations to keep in mind
virtually any information to identify the user: and several tools you’ll want at your fingertips.
cost center and company code combinations For more information, visit www.sdn.sap.
or a social security number, for example. com/irj/sdn/virtualization and www.sdn.sap.
com/irj/sdn/security. n
Named user-based identity federation: The
car rental company requires named users in its
systems, but does not want to share the user
names over the Internet because of security
Additional Resources...
and data privacy reasons. It uses the customer’s n
Special Report on Cloud Computing
email address as federation data and maps it (SAPinsider, July-September 2010,
to the car rental user account. sapinsider.wispubs.com)