Are lawyers getting in the way of cloud-based security?
- 07 November, 2012 19:41
ORLANDO, Fla. -- In an age where enterprises and their employees are being relentlessly targeted with malware-based phishing, denial-of-service and other attacks, the ability of the IT security staff to defend their networks and valuable corporate data faces yet one more obstacle, according to some: their own company lawyers.
TECH DEBATE: Should security be on-premise or in the cloud?
Company lawyers are busy stopping attacked organizations from sharing information in any way with IT security professionals in different organizations because these lawyers are scared that any shared information would somehow hurt the company, said Dave Cullinane, CEO of startup Security Starfish and former CISO at eBay, who gave the keynote address at the Cloud Security Alliance Congress in Orlando Wednesday.
"Lawyers are saying, 'Don't share that information, we don't know where it will go,'" said Cullinane, chairman of CSA, the group that's bringing together vendors and enterprises to set guidelines for security in cloud-based computing environments.
Cullinane noted it's ironic that lawyers are playing this role in slowing down the sharing of attack information among IT security professionals, while attackers work together on malware to constantly improve their ability to compromise corporate targets. Cullinane said this situation must change, and there needs to be found a good way to anonymize data about attacks to encourage information-sharing.
Cullinane recalled that when the infamous RSA data breach occurred, and he was at the Bay Area CSO Council at the time, he learned "one guy was considered federal and he got a full briefing about what happened at RSA, but he couldn't tell the rest of us. That's silly." Security professionals benefit from understanding ongoing attacks, and sharing information means they could have a better chance at defense, he pointed out.
The reality is that U.S. businesses operate very globally now, as do businesses almost everywhere, and the idea that U.S. law enforcement is somehow going to be able to assist in investigating and resolving attacks against companies is becoming less and less viable, suggested Cullinane. Companies need to be aware that much of the time they will be left to their own resources.
"When I left eBay, we saw a lot of attacks coming from the cloud," Cullinane said. Sometimes the problems emanated from customer PCs where malware was attacking even in the midst of customer transactions. And now the recent massive denial-of-service attacks on about a dozen U.S. bank websites is another reminder of how grim things are getting -- and how sharing information would help IT staffs in getting the big picture.
In another keynote today at CSA, Tim Rains, a director in Microsoft's Trustworthy Computing group, alluded to the fact that lawyers -- as well as C-level management -- at a company considering cloud services to hold data are often the ones who make the decision to go ahead or not. One CISO at the conference, who asked not to be identified by name, said his corporate attorney is the one with a final say over using cloud services, and the answer is typically "no" due to security worries.
Trying to build confidence, Microsoft is striving for transparency by submitting information related to security in its Microsoft Azure, Office 365 and other cloud offerings to the CSA's Security Trust and Assurance Registry (STAR), a repository of vendor-submitted information about security practices. (A CSA official today noted third-party certification of cloud-provider security is expected to be in place next year as well to augment the service provider self-attestation found in STAR).
Microsoft has also created what it calls the Cloud Security Readiness Tool, described as a set of questions on security architecture, authentication and other topics that can be used for "starting the conversation" with executives and help them get comfortable with concepts they may not be familiar with. "There's still a lot of confusion about what cloud computing is," Rains said in his keynote.
In yet another talk, Tom Kellermann, vice president of cybersecurity at Trend Micro, gave a riveting description of East European and Asian cybercrime and espionage and how victimized companies are being "hunted" as part of a massive "colonizing of the infrastructure." He also added a few observations about lawyers.
The IT security professional is going to have to work to explain the nature of today's security threats to the company lawyer, among others, including the CIO. "Take your general counsel to lunch," he recommended.
Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: @MessmerE. Email: email@example.com.
Read more about wide area network in Network World's Wide Area Network section.