VAR Panchayat
Balancing Cloud with Data Protection
2017-04-19Encryption and tokenization are becoming accepted best practices to support compliance with data privacy laws and improve overall security
Global cloud adoption continues to accelerate, but organizations in many countries have been hesitant to use cloud because of concerns over the privacy and sovereignty of sensitive data. Privacy laws have been enacted in many countries aimed at requiring organizations to protect personal data of their customers, patients, subscribers, etc from hackers, with stiff penalties for data breaches and non-compliance. Many of these countries are also extending these laws to address heightened concerns about the potential for external countries and their intelligence agencies, e.g. CIA (US), MI6 (UK), MSS (China), etc to access sovereign data residing with foreign cloud providers.
But today’s reality is that most cloud providers have infrastructure that crosses national boundaries and even continents, but with ubiquitous access, comes with a loss of visibility and control over where your data is actually located. While some of these providers are opening data centers in multiple countries with the goal of satisfying local privacy laws, there is a common misconception that by opening local data centers a cloud provider necessarily meets local data privacy laws.
Data Sovereignty Vs Data Residency
Many people assume that data residency equals data sovereignty. In other words, if you control the location of data, then you also control what laws might apply to that data. This used to be the case in the physical world – if paper personnel records are stored in a file cabinet in India, a court in Europe would have no ability to demand access to these records. But this model has not kept up with today’s electronic records, connected systems, and the very nature of the cloud.
In order to assure data sovereignty, you must look beyond where data is stored at rest, and consider where the data might travel and where it is controlled. Most cloud providers that support data centers in multiple regions maintain centralized “command and control” over their networks and data – usually in the country where the provider originated. For instance, courts and intelligence agencies in the US can demand US cloud companies, e.g. Amazon, Salesforce, Google, etc to turn over data stored in their controlled data centers in Europe, Singapore and India.
Enabling Cloud while Protecting Privacy
Despite these challenges, the benefits of the cloud are too significant to ignore – reducing costs, fast deployment, easy scalability, and making businesses more agile and competitive. This has created a growing interest in customer-controlled encryption and tokenization solutions that enable organizations to leverage the cloud while assuring that sensitive data is not exposed.
The basic premise of customercontrolled encryption is simple and elegant – organizations encrypt specific data before it goes to the cloud, and maintain persistent control over the data during its entire lifecycle.
With any encryption solution, it is critical that the encryption keys are held exclusively by the organization, and not shared with the cloud provider to ensure that no outsider, hackers or foreign agencies can access protected data.
Tokenization follows a similar model to meet strict data residency requirements. Sensitive data is stored in a secure repository controlled exclusively by the organization, while random substitute tokens are sent to the cloud.
Encryption or tokenization, if properly applied, can eliminate the possibility of cloud providers or outsiders accessing or disclosing sensitive personal data either by accident, hacking, malicious insiders, or forced government disclosure.
Security companies are providing innovative solutions to address these key cloud challenges. They allow organizations to retain complete control over their data in the cloud by applying encryption and tokenization, in real time, before sensitive data leaves the enterprise, using keys that are retained by the organization. The data protection provided is operationspreserving to not impact the application functionality and usability.
Business and government organizations today face greatly increased challenges when managing consumers’ personal information, including a dramatic increase in the use of cloud computing, steep increases in cybersecurity threats and global increases in data protection regulations and penalties for noncompliance
Given the rapid changes in cloud technology and the slow pace of regulations, specific technical requirements are not fully spelled out in most data protection laws. This means that it is incumbent on organizations to take reasonable and adequate measures to protect sensitive data, and implement sufficient measures to prevent data breaches, business interruption, and reputational damage. Encryption and tokenization, if properly implemented, are becoming well accepted best practices to support compliance with data privacy laws and improve overall security.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.