Who can pry into your cloud-based data?
- 16 July, 2013 14:42
Can anyone access the data that you trust to the safekeeping of a cloud-computing vendor? It's a good question, made all the more relevant by the revelations regarding the National Security Agency's Prism program. So how can you best address these issues in your contract with your cloud vendor?
With cloud computing, data access is inevitably a shared responsibility between the customer and the cloud vendor. Those shared responsibilities need to be addressed in the contract, and most cloud vendors' standard contracts leave something to be desired.
While the cloud vendor is responsible for providing the customer with access to its own data, the cloud vendor should also be contractually obligated to not share the customer's data with others, intentionally or not. This may seem obvious, but there are nuances to be addressed in the following areas:
In order to provide the service you contract for, some of the cloud vendor's employees will likely need to have access to your data. You want to ensure that this access is kept to the minimum degree necessary, so the contract should address:
* Which vendor employees will have data access.
* Whether access is on a "least-privilege" and "need-to-know" basis.
* Whether those privileges are promptly and adequately rescinded when employees leave the vendor or move into a different role at the vendor.
* The manner in which access is granted.
* Whether access is logged, monitored or analyzed.
Let's take a look at how one vendor addresses this issue by reviewing Dropbox's Terms of Service Security Overview. (I will use examples from Dropbox's standard contract, not to pick on that company, but because its terms are fairly representative of the industry. It's worth noting that Dropbox received the second-highest rating in the Electronic Frontier Foundation's 2013 "Who Has Your Back?" Report.) The overview states, in part:
Unintentional External Access
Since your cloud vendor will be storing and/or processing your data on its infrastructure, the vendor should be obligated to take appropriate and specific steps to ensure that it has deployed adequate measures to secure it against hackers and other external threats.
Dropbox's Terms of Service state:
You, and not Dropbox, are responsible for maintaining and protecting all of your stuff. Dropbox will not be liable for any loss or corruption of your stuff.
We follow generally accepted standards to protect the information submitted to us, both during transmission and once we receive it. No method of electronic transmission or storage is 100% secure, however. Therefore, we cannot guarantee its absolute security.
A bit fuzzy on the details, to say the least. And most folks don't expect "absolute," but how about guaranteeing some "reasonable" level of security? The Terms of Service Security Overview do go on to at least provide this assurance:
We encrypt the files that you store on Dropbox using the AES-256 standard, which is the same encryption standard used by banks to secure customer data.
Still, hardly the degree of detail or assurance that a customer would want in regards to any sensitive data. For more on cloud vendor security details that the customer might want to consider, please see my column "The Cloud Contract Adviser: Making Sure Your Information Is Secure."
Intentional External Access
We may disclose to parties outside Dropbox files stored in your Dropbox and information about you that we collect when we have a good faith belief that disclosure is reasonably necessary to (a) comply with a law, regulation or compulsory legal request; (b) protect the safety of any person from death or serious bodily injury; (c) prevent fraud or abuse of Dropbox or its users; or (d) to protect Dropbox's property rights. If we provide your Dropbox files to a law enforcement agency as set forth above, we will remove Dropbox's encryption from the files before providing them to law enforcement. However, Dropbox will not be able to decrypt any files that you encrypted prior to storing them on Dropbox.
This hardly gives the impression that the vendor will be a strong defender of its customer's rights. The focus seems more on the vendor's unilateral protection of itself and its own rights. It's especially disconcerting when it advises that it will also chuck out its previously highlighted encryption measures as part of the bargain. But it's kind of the vendor to (with a nod and a wink) advise that customers can always encrypt their data prior to sharing it with the vendor in order to avoid any unwanted access.
Customers have their work cut out for them in negotiating improved contract language on these issues. But for sensitive customer data and business-critical functions in the cloud, such effort will be well worth it in the long term.
Want to learn more about cloud computing contract issues? Then please register for my seminar Cloud Computing Risk Mitigation Via Contract Negotiation and Vendor Management to be held Oct. 4, 2013, in San Francisco. I look forward to seeing you there.
Thomas Trappler is director of software licensing at the University of California, Los Angeles, and a nationally recognized expert, consultant and published author in cloud computing risk mitigation via contract negotiation and vendor management. For more information, please visit thomastrappler.com.
Join the Computerworld Australia group on Linkedin. The group is open to IT Directors, IT Managers, Infrastructure Managers, Network Managers, Security Managers, Communications Managers.
Turnbull asks how the NBN got that way
Vodafone launches smartphone app for encrypted calls
Thanks a million, Drupal
Optus goes over the top with VoIP service
Turnbull asks how the NBN got that way