Encryption practices vary widely in the Cloud, survey finds

"The survey showed that encryption of sensitive and confidential data is often being applied either before the data is sent"

A survey by Ponemon Institute of 4205 business and IT managers around the world found that more than half now transfer sensitive or confidential data to the Cloud, while taking various approaches to encrypting that data.

Another 31 per cent said they expected to transfer sensitive data to the Cloud within the next 24 months, while 16 per cent said they did not. However, only 35 per cent of US-based respondents indicated they knew what steps are being taken by the Cloud provider to protect this sensitive data, which was not much different than the response from other parts of the world, including the United Kingdom, France, Australia, Japan and Brazil.  Nevertheless, 57 per cent expressed confidence that "my organization's Cloud providers have the ability to safeguard sensitive or confidential data within the Cloud."

How will Cloud, virtualization and SDN complicate future firewall security?

Sponsored by Thales, the survey showed that encryption of sensitive and confidential data is often being applied either before the data is sent, or used in the transfer process, or the Ccloud provider encrypts it when it's stored in the Cloud.

Thirty-seven percent of respondents said their own organizations take steps to encrypt data as it's transferred to and from the Cloud service over the network. Thirty-one percent said they encrypted the data before transfer to the Cloud. Eleven percent said the Cloud provider encrypted their data in storage, while 11 per cent of organisations handled the encryption process themselves in the cloud environment. The remaining 10 per cent said "none of the above" or "not applicable". The survey notes that the various deployment options for encryption in the Cloud environment were relatively uniform for all three types of services, SaaS, IaaS and PaaS.

Management of encryption keys used to secure cloud data was another question asked. Twenty-nine percent said their own organization manages encryption keys when data is encrypted in the cloud, while 26 per cent said it was a "combination" of both, 23 per cent said it was the Cloud provider alone and 21 per cent said a third-party service (not the Cloud provider).

The internal IT organization was most likely to be managing the encryption keys for IaaS environments, while in a SaaS environment, it's most likely to be a combination of the organization and the provider managing the keys.

In a question about the relative importance of the encryption protocol called "Key Management Interoperability Protocol," 27 per cent called it "very important" or "important" now, while 33 per cent said KMIP would be important to their encryption strategy in the next 12 months. The areas of importance were named as cloud-based applications and storage, storage systems, application infrastructure and network infrastructure, while it was seen as less important for remote applications or end-user devices.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: MessmerE. E-mail: emessmer@nww.com

Read more about wide area network in Network World's Wide Area Network section.

Tags CloudsecurityPonemon InstituteWide Area Networkcloud computinginternet

Comments

Comments are now closed

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Sophos Mobile Control

Data protection, policy compliance and device control for mobile devices

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.