Amazon looks to move security appliances to the cloud
Moving intrusion detection and prevention systems to the cloud will help mitigate denial-of- service attacks, says Amazon CISO
IDG News Service - Amazon Web Services (AWS) is looking to expand its security offerings with hosted intrusion protection appliances and more extensive encryption features, as it seeks to increase the level of protection users can get in its cloud.
For Amazon, proving its cloud computing platform can offer the same level of security as traditional hardware and software has been an ongoing challenge.
That it's difficult for companies to meet their existing security requirements in the cloud is a common misconception, according to Stephen Schmidt, chief information security officer at Amazon Web Services.
"For example, they are concerned about access control; network perimeter device control; and the ability to construct networks in ways that are consistent with their particular compliance or enforcement requirements. In most cases we find that not only can they do what they are doing right now in the cloud, but have more granular controls," Schmidt said.
There is also a misconception about separation of computing resources in the cloud, according to Schmidt.
"Some people have written academic papers that say it is theoretically possible to, for instance, have maybe a side-channel between hypervisors ... where you could pass information between virtual machines. The important thing about that is that those are academic papers set in a laboratory environment, as opposed to in the real world," Schmidt said.
The Virtual Private Cloud service, which lets users configure a logically isolated section of Amazon's cloud, completely negates that threat, according to Schmidt.
The company is now working with partners to let enterprises move security appliances to the cloud, including virtual appliances for intrusion detection and prevention. The move to the cloud will be a boon for enterprises that are concerned about denial-of-service attacks that rely on using a lot bandwidth, according to Schmidt.
"Obviously individual companies can't afford to have the kind of connectivity to the Internet that we can. Furthermore, they don't necessarily have the network expertise to mitigate large scale attacks whereas we do," he said.
Amazon will expand on the ways encryption can be used to help protect information, as well
"I think in the short term you'll see us enabling encryption on smaller and more granular pieces of data," Schmidt said.
Amazon's road to improve encryption functionality has already started with the recent addition of Oracle Transparent Data Encryption to its Relational Database Service (RDS), and with the introduction of CloudHSM, a service that uses a separate appliance to protect cryptographic keys used for encryption.
"You can see there is a theme here. Give the customers the tools to create an encryption infrastructure that allows them to ensure only the people they want to, whether it's in their organization or ours, have access to that data," Schmidt said.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!