Cloud Security and Compliance Issues

Oct 25, 2017 by infocon in  Security

Cloud Security and Compliance Issues:

 

A new report by Threat Stack and ESG (Environmental, Social Governance) raises major security concerns about the increasing public cloud environments and containers. The report reveals a notable gap in security and compliance readiness across the rapidly growing cloud-container environs.

The report discloses some significant facts as:

  • 60 percent of organizations regard security and compliance a hindrance to winning new business associates.
  • 57 percent of those surveyed complained of significant delays in the sales cycle blaming troubles created to meet customer security requirements.
  • 31 percent of those surveyed said they were unable to cope with the growing cloud and container environments. As a result, 62 percent said they’re aiming for greater visibility into their public cloud workloads.
  • 40 percent of the respondents conveyed that in the next 12 months, they will have hybrid environments, which is an increase from the current 12 percent. Meanwhile, 45 percent of organizations plan on starting to test or deploy containerized environs, which is above the current 42 percent of those who already do.
  • 94 percent of respondents believe containers give negative security implications for their organizations.

As the market democratizes, companies are adopting more complex technical solutions that were earlier reserved for only software giants.

This, experts believe, has led to the creation of an opening for external as well internal threats as security teams catch up on the cloud, containers, etc.

Sam Bisbee, Threat Stack CSO feels, “Containers originally focused on resource isolation, offering system building blocks to address specific operational needs that could be coupled with security solutions – they were not supposed to be a replacement for VMs, which is how most teams treat them”.

How does WannaCry affect India?

Oct 24, 2017

In emerging economies like India where the government is undertaking large scale digital initiatives and schemes, security has become a major concern. Cyber experts believe that the damage done by WannaCry ransomware is an issue of under-reported magnitude.

The use of pirated and outdated software is rampant among Indian users as well mid-size and small IT organizations. Fearing licensing issues, a huge number of these incidents will not be reporting the losses, concludes expert opinion on the latest cyber attack.

According to the Centre’s instruction to CERT-IN (Computer Emergency Response Team), “all the information of reported ransomware” have been collected into a report. Many of the cases across the country were isolated but the wave of attacks certainly shows that the impact to India is certainly a caution alarm.

The report states these places as worst hit by WannaCry:

1. 10% of Vadodara’s total computers in the District Administration Collectorate Office.

2.  Computers in Panchayat offices of Wayanad and Pathanamthitta districts in Kerala.

3.  120 computers connected with Gujarat State Wide Area Network in Gujarat.

4.  18 systems of Andhra Pradesh Police Department.

5.  Systems in the Tirumala Tirupati Devasthanams (TTD) Shrine in Andhra Pradesh.

6.  Computers of the Personnel Department of the Southern Railways’ Palakkad Division.

7.  Computers in several locations of the Police Department of Maharashtra.

8.  Many attacks happened in computers across Kerala and Tamil Nadu.

 

Bringing Information Security to book – Infocon initiative

Oct 21, 2016

How much information security is enough security ?

Infocon is an initiative by Prime Infoserv, Kolkata and Wordsmith has been a collaborator in the initiative. Any contemporary CXO who is not concerned with the theme and confusion called Information Security is either non-existent or soon will face bankruptcy judge.

Billions are lost by private and public institutions worldwide through loopholes in securing information. Information is literally money. If you are a financial institution and if your customer database is compromised, then the fall-out can be seriously embarrassing to catastrophic.

The Problem of Mr. K, a CIO of the castle called Kolkata 

Mr. K is a  CIO of a large healthcare company in Kolkata. His 60% life was spent without internet and when his career is at the matured peak, he finds that he needs to reckon with information security. His CEO has instructed him to “do something”. What he should do ?

In case of an enterprise, any “doing” needs management time, money and attention (follow-up). More important, no vendor appears to be able to answer the question : “How much information security is good security ? “How much I should spend, considering the solutions are correct ?” 

Mr. K, found to his great confusion that he is not able to get these “figures”.

In a autumn morning in Kolkata, post-Durga Puja last year,  I and Sushobhan, CEO of Prime met Mr. K in his East Calcutta office, overlooking the wetlands of Calcutta that appear to be merging with the Sunderbans.  Mr. K narrated his predicament, especially the most important one – “How much money and resource he should ask for approval ? ” from his top management to implement the solution selected. The problem with the solution was its very nature : the solution is directly connected to the threat – real, perceived, imagined or enmeshed in the business interest of the information security vendor.

The Mathematical Model

In other words, we need an analytic framework backed up by the cold, austere and objective mathematical perspective other than paranoia, vendor interest, disaster porn, technical jargon, hardware and software vendor with their exotic offerings lined up in the form of priests of some esoteric cult.

There is a mathematical model called Gordon-Leob model that does exactly that. It uses mathematical tools like probability, confidence interval, distribution to produce a mathematically verifiable statement

After the coffee, I and Sushobhan told Mr. K that he should spend no more than 37% of the amount X, where X is calculated by

X = Cost * Maximum probable vulnerability * Impact Constant * Quantified Risk

Mr. K was delighted. He is now at least dealing with arithmetic, not anxiety-metric.

In due course, we did find out X for his organization by using a 4 step method which is basically a combination of police work + detective work. In the first step, we did a vulnerability analysis and logged all known risks, in the 2nd step, we had assigned some metric to those risks in consultation with the company. In the 3rd step, we calculated the probabilities of such events, in the final step, we tabulated the impact and then estimated X.

Since then, we have been working in this area with clients in India, Bangladesh, UK and everywhere we found one common aspect : lack of awareness. Then the idea of Infocon was born.

Infocon 2016 is happening on 18th November – a platform for sharing our confusion, triumph, fear, best practices and combining our torches in a same direction to create a path in the literal jungle of information which not only has exotic fruits, flowers and scenes but ferocious enemies.

5 Strategies for Cyber Security in Small Business Organizations

Oct 16, 2017

If you’re a small business organization, there is absolutely no reason for you to neglect cyber security. Not spending on security or relying on outdated software to protect your data – both are equally bad ideas.

Here are a few ways you should undertake to prevent damage to the reputation of your business repute:

Backups: Cyber attackers and hackers never leave an opportunity to take your data “hostage” and demand a ransom before releasing that data. Hence, small organizations must practice backing up data in the cloud or a hybrid data centre.

Update IT Systems: As malicious attacks are evermore wreaking havoc in the cyber-verse, it is essential for organizations to protect their business data at all costs. A top to bottom evaluation with an emphasis on vulnerabilities is important. Key assets like information about property, confidential personal data, etc. must be guarded against.

   Cyber security education: In any data-security effort, any individual can intentionally or not become a “weak-link”. More often, an employee nursing grudge against the organization may compromise security. To avoid such incidences, smaller organizations can always undertake a rigorous cyber security education program.

Proper planning: Included in the data-security education program should be procedures teaching employees how to react in the event of unauthorized intrusions, example, phishing or malware attempts. A detailed incident response plan that redirects to helpdesks or IT teams can have a significant impact.

Mobile device security: A lot of times employees in small organizations use their mobile devices for work and work-related communication. The thought of data passage through unsecured channels is nightmarish enough for organizations to establish policies like – (i) Categorizing and restricting the types of information that can be shared or accessed through these devices, (ii) Enforcing network access control wherein employees can access your business’s VPN and email in a reliable manner, (iii) Determining whether mobile devices provided by the business can be taken off-site.

1 Comment

Leave a Comment

Your email address will not be published. Required fields are marked *

Comment *