CIOs Still Struggling To Secure Data In The Cloud
While cloud computing is becoming mainstream, as more organizations are increasingly using cloud computing resources, securing data in the cloud remains a key problem for CIOs. A recent Ponemon Institute study commissioned by SafeNet reveals that CIOs are having trouble controlling the management and security of data in the cloud and that only 38 percent of organizations have clearly defined roles and accountability for safeguarding confidential or sensitive information in the cloud.
The study titled “The Challenges of Cloud Information Governance: A Global Data Security Study,” that surveyed more than 1800 IT and IT security professionals worldwide notes that while the CIO is adding to the confusion, 44 percent of corporate data stored in cloud environments is not managed or controlled by the IT department. And more than two-thirds find it more difficult to protect sensitive data in the cloud using conventional security practices.
“The findings reveal that global organizations are struggling to secure data in the cloud due to the lack of critical governance and security practices in place,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. “To create a more secure cloud environment, organizations can begin with simple steps such as including IT security in establishing security policies and procedures; increasing visibility into the use of cloud applications, platforms, and infrastructure; and protecting data with encryption and stronger access controls, such as multi-factor authentication.”
Some of the Key Findings of the study include:
As the Cloud’s Popularity Grows, So Does the Risk to Sensitive Data
Nearly three-quarters (71 percent) of IT professionals confirmed that cloud computing is very important today, and more than three quarters (78 percent) believe it will be over the next two years. The respondents also estimate that 33 percent of their organizations’ total IT and data processing requirements are met with cloud resources today, and that is expected to increase to an average of 41 percent within two years.
However, the majority of respondents (70 percent) agree that it is more complex to manage privacy and data protection regulations in a cloud environment, and they also agree that the types of corporate data stored in the cloud, such as emails, and consumer, customer, and payment information, are the types of data most at risk.
Cloud Security, Shadow IT and the Need for More Accountability
On average, half of all cloud services are deployed by departments other than corporate IT, and an average of 44 percent of corporate data stored in the cloud environment is not managed or controlled by the IT department. As a result, only 19 percent of respondents are very confident that they know about all cloud computing applications, platforms, or infrastructure services in use in their organizations today.
Along with this lack of control over the sourcing of cloud services, views on who is actually accountable for cloud data security are mixed. Thirty five percent of respondents say it is a shared responsibility between the cloud user and the cloud provider while 33 percent say it is the responsibility of the cloud user and 32 percent say it is the responsibility of the cloud provider.
Importance of Encryption, Multi-Factor Authentication
More than two-thirds (71 percent) of respondents say it is more difficult to protect sensitive data in the cloud using conventional security practices, and nearly half (48 percent) say it’s more difficult to control or restrict end-user access to cloud data. As a result, more than one-third (34 percent) of IT professionals surveyed say their organizations already have a policy in place that requires the use of security safeguards such as encryption as a condition for using certain cloud computing resources. Seventy-one (71) percent of respondents say the ability to encrypt or tokenize sensitive or confidential data is important, and 79 percent say it will become more important over the next two years.
Regarding access to data in the cloud, 68 percent of respondents also say that the management of user identities is more difficult in the cloud, and 62 percent of respondents say their organizations have third parties accessing the cloud. Nearly half say their company uses multi-factor authentication to secure third-party access to data in the cloud environment. About the same percentage (48 percent) of respondents say their organizations use multi-factor authentication for employees’ access to the cloud.
The report offers some recommendations on improving data security in the cloud:
- The role of IT organizations is changing and they need to adapt to the new realities of Cloud IT by educating employees on security, setting comprehensive policies for data governance and compliance, creating guidelines for the sourcing of cloud services, and establishing rules for what data can and cannot be stored in the cloud.
- IT organizations can accomplish their mission to protect corporate data while being an enabler of “Shadow IT” by implementing data security measures such as “encryption-as-a-service” that allow them to manage the protection data in the cloud in a centralized fashion as their internal organizations source cloud-based services as needed.
- As companies store more data in the cloud and utilize more cloud-based services for their employees, IT organizations need to place greater emphasis on stronger user access controls with multi-factor authentication. This is even more important for companies that give third-parties and vendors to access their data in cloud. Multi-factor authentication solutions can be managed centrally to provide more secure access to all applications and data whether in the cloud or on-premises.
- Trends In Information Management: An India Perspective
- How CEO Can Avoid Digital Transformation Failure: McKinsey
- Predictions for RPA in Financial Services in 2018
- Which Sector Will Be The First To Go 100% Robot?
- Cyber Security Predictions For 2018
- How CIOs Can Ensure A Seat At The Strategy Table
- CIO's Five-Point RPA Planning Success Formula
- SpiderOak CEO Warns Of 10 Cybersecurity Threats For 2018
- Uber Data Breach: Accountability, Corporate Ethics In Question
- 4 Big Data Trends To Watch In 2018