Advertisment

Enterprise need for security solutions to assist with data access, compliance and security in cloud

author-image
Harmeet
New Update

MCLEAN, USA: Today's CIOs and CISOs are facing continued pressure to adopt the cloud enterprise-wide while managing the increasing operational and security risks associated with it.

Advertisment

While the challenge can be daunting, a new report from research company Gartner Inc. highlights the role that encryption and tokenization technologies can play in helping enterprises adopt cloud services, even those in highly regulated industries or in regions with strict data sovereignty requirements.

The report, "Simplify Operations and Compliance in the Cloud by Encrypting Sensitive Data," recommends that CIOs and CISOs, "simplify audits such as the Payment Card Industry Data Security Standard (PCI DSS) when using cloud services by implementing access controls and encryption or tokenization of sensitive data."

Gartner highlights sector-based data compliance requirements, such as PCI DSS, as drivers for organizations to consider adopting encryption and tokenization technologies. Another catalyst is referred to as data residency requirements, where "the protection is required to prevent access by government authorities and agencies while data resides in or is passing through other jurisdictions."

Advertisment

Regarding this issue, the report goes on to say that "an alternative is to avoid storing the data in those jurisdictions, such as the US and UK, which use legal access or interception of data through laws such as the USA Patriot Act and the UK Regulation of Investigatory Powers Act."

But the report cautions enterprises to clearly think through the implications of deploying these technologies in their environments. Gartner's research helps enterprises understand these risks and highlights the following:

* Protect sensitive fields/columns while using cloud SaaS applications.

* Do not store keys or use keys in other jurisdictions, or use a third party; otherwise the encrypted data could be accessed if the keys are available.

* It is important to review the claims of vendors carefully due to the novel and unique implementations of encryption solutions. ... Enterprises should always check the claims of vendors that their solutions are based on proven security models.

* When keys or tokens are managed on-premise, always check the impact on the access and availability of the cloud service provider (CSP) and the performance of appliances.

* A growing best practice is emerging where enterprises encrypt data stored in the cloud and manage the keys locally.