Amazon looks to move security appliances to the cloud
Moving intrusion detection and prevention systems to the cloud will help mitigate denial-of- service attacks, says Amazon CISO
IDG News Service - Amazon Web Services (AWS) is looking to expand its security offerings with hosted intrusion protection appliances and more extensive encryption features, as it seeks to increase the level of protection users can get in its cloud.
For Amazon, proving its cloud computing platform can offer the same level of security as traditional hardware and software has been an ongoing challenge.
That it's difficult for companies to meet their existing security requirements in the cloud is a common misconception, according to Stephen Schmidt, chief information security officer at Amazon Web Services.
"For example, they are concerned about access control; network perimeter device control; and the ability to construct networks in ways that are consistent with their particular compliance or enforcement requirements. In most cases we find that not only can they do what they are doing right now in the cloud, but have more granular controls," Schmidt said.
There is also a misconception about separation of computing resources in the cloud, according to Schmidt.
"Some people have written academic papers that say it is theoretically possible to, for instance, have maybe a side-channel between hypervisors ... where you could pass information between virtual machines. The important thing about that is that those are academic papers set in a laboratory environment, as opposed to in the real world," Schmidt said.
The Virtual Private Cloud service, which lets users configure a logically isolated section of Amazon's cloud, completely negates that threat, according to Schmidt.
The company is now working with partners to let enterprises move security appliances to the cloud, including virtual appliances for intrusion detection and prevention. The move to the cloud will be a boon for enterprises that are concerned about denial-of-service attacks that rely on using a lot bandwidth, according to Schmidt.
"Obviously individual companies can't afford to have the kind of connectivity to the Internet that we can. Furthermore, they don't necessarily have the network expertise to mitigate large scale attacks whereas we do," he said.
Amazon will expand on the ways encryption can be used to help protect information, as well
"I think in the short term you'll see us enabling encryption on smaller and more granular pieces of data," Schmidt said.
Amazon's road to improve encryption functionality has already started with the recent addition of Oracle Transparent Data Encryption to its Relational Database Service (RDS), and with the introduction of CloudHSM, a service that uses a separate appliance to protect cryptographic keys used for encryption.
"You can see there is a theme here. Give the customers the tools to create an encryption infrastructure that allows them to ensure only the people they want to, whether it's in their organization or ours, have access to that data," Schmidt said.
- PCI 3.0 Compliance In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint devices.
- Mitigating Security Risks at the Networks Edge This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
- 5 Strategies for Modern Data Protection Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that...
- Defense throughout the Vulnerability Life Cycle with Alert Logic Threat and Log Manager New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks...
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will...
- On-Demand Webinar: Mind the Gap! Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!