You are on page 1of 16

Having Confidence in

Cloud Computing
Addressing Enterprise Security Concerns
Although there is growing
recognition of cloud com-
puting’s benefits—and an
ever stronger business
case for achieving high
performance by moving
deeper into the cloud—
progress is snagged on
concerns about IT security.
Enterprise IT leaders now
must find the right bal-
ance between the risks
and rewards of computing
in the cloud. They can
benefit by revisiting
well-established IT secu-
rity and enterprise risk
management practices.

3
It is fair to say that cloud computing deployment, and real-time analytics of key data assets, but fear and mis-
has “arrived.” Not long ago, Citigroup without the capital expenditures trust are not. Accenture believes it
purchased 30,000 seats of Salesforce’s associated with maintaining data is incumbent on IT professionals to
customer-facing software-as-a-service centers to enable these activities. help lead the way here. They are best
(SaaS) applications for its financial positioned to present the increasingly
advisors worldwide.1 NASDAQ relies However, more than a few IT profes- powerful business case for cloud
on Amazon Web Services’ S3 to store sionals, alarmed by news stories about computing and balance it with a dis-
historical data on stocks and funds and Internet security breaches and facing passionate analysis of the real threats
uses a lightweight rich Internet appli- a daunting array of complex regulations, their organizations may be exposed
cation to generate new revenues.2 And are taking a go-slow approach to cloud to and how these will be mitigated,
contract manufacturer Flextronics says computing. Even if they favor a faster managed and measured over time.
it will use human capital management move into the cloud, they know they
solutions from SaaS provider Workday face resistance from business execu- In this paper, Accenture suggests ways
to service its 200,000-plus employees tives who have legitimate concerns in which IT managers, chief operating
around the globe.3 about how cloud computing could officers, chief information security
heighten the risks for the overall officers and enterprise risk manage-
These days, IT professionals can very organization. ment professionals might plan to
quickly help their organizations move establish the most appropriate balance,
toward high performance by using The trouble is, IT leaders’ caution may applying a clear, straightforward and
increasingly available compute cycles be limiting their organizations’ ability to practical approach that is rooted in
not only to run applications off-premise significantly reduce IT operating costs. longstanding IT security principles.
but also to test and develop software Of course, prudence is warranted with
applications in the cloud. Today, plat- any move to relinquish or share control
form providers such as Force.com and
Amazon Web Services give developers
access to real-time workflow, program-
mable user interfaces, real-time mobile

4
Facing the key security concerns The last concern is about availability. IT adhering to the same regulations and
Four major security concerns worry managers are right to look for service- following the same data privacy laws,
IT leaders. First, they struggle to trust level guarantees. But in the case of then the customer’s risk posture should
relatively new and unfamiliar cloud the cloud, response times cannot be be unchanged. If the providers fall
providers as part of their extended guaranteed since data travels through short of those practices, then the cus-
enterprises. Can they be sure that the Internet. (This challenge is even tomer’s risks will have increased, which
these providers will treat their data as greater for the infrastructure cloud, can result in fines or even legal action.
they do? Where exactly is their data since it supports the software code.) But if—as is increasingly the case—the
being stored, and how, if it is frag- They also need reassurance about providers’ security practices are more
mented among many data centers, business continuity in the event of a rigorous than the customer’s, then the
is it re-integrated? problem. IT professionals have to be customer will not only have cut IT
sure that their third-party providers operating costs, but it will have reduced
Second, IT professionals question have the right recovery strategies in its overall IT security risks.
whether cloud providers have the place.
levels of infrastructure security to
be able to ward off cyber-attacks. The fundamental response to these con-
cerns is that good security practices
Third, do providers have the mechanisms are good everywhere. If a customer’s
in place to be able to manage, measure cloud providers follow the same secu-
and report on industry regulations? rity procedures and policies that it does,
And can they be accountable if they
fail to comply?

5
Figure 1. Identifying cloud opportunities

Ease of
Implementation
Easy
Business Continuity
(Storage)
• Extensive storage
• Backup and recovery Batch and Data Intensive Applications
• One-off applications that do not rely on real-time response
• Data and high-performance intensive applications (financial risk
Software Development and Testing modeling, simulation, data compression, graphics rendering...)
• Software development and testing environment • New back-office applications
• Performance testing
• Nonproduction projects
• R&D activities
• Reduced time to market

Desktop Productivity Peak Load Demands


• Web 2.0 applications • New business activities
• Workgroup applications • Applications with peak-loads
• Office suites • Seasonal websites
• E-mail and calendaring • Applications with scalability needs

Sensitivity
• Mission critical applications
• Regulation-protected data (HIPAA,

Legacy SOX, PCI...)


• Specific existing infrastructure
• Complex legacy systems

Hard
Value to the Enterprise High Value

Tracking the cloud’s rapid rise insurer, going to the cloud for develop- IT leaders are becoming familiar with
Cloud computing adoption is increasing ment and implementation of the firm’s different opportunities to use cloud
as more and more senior managers rec- new corporate intranet produced 50 computing, extending their horizon
ognize its potential for achieving high percent savings, reduced operational beyond the concepts of running or
performance; 30 percent of IT decision costs and deferred capital expenditure. storing applications off-premise.
makers polled in late 2008 by CIO The intranet initiative came online in (See Figure 1.) More and more com-
magazine said they were already using half the time it would have taken for panies are actively exploring cloud
or implementing the cloud in some form, an on-premise solution. services as potential software test
and another 17 percent were actively beds; some are looking to the cloud
planning or researching.4 Cloud services A key selling point of the cloud is to help resolve peak-load challenges
will make up a significant part of the substantially reduced or no capital or to help support IT infrastructure
increase in IT spending growth by spending for a given application in needs. Accenture believes that it is
2012, according to research firm IDC. favor of flexible on-demand computing unrealistic to expect that the cloud will
Interestingly, it is one of the very few that is accounted for as operating become a proxy for enterprise IT oper-
technology sectors where industry expenses. In one project under devel- ations in the foreseeable future, given
analysts have revised their forecasts opment, a US government agency was the dependence of the typical large
to account for stronger growth than looking at how to manage predictable enterprise on quirky legacy systems. It
originally anticipated. peak load demand for a nonsensitive will, though, become a permanent and
application. The on-premise solution increasingly important aspect of any
The economics of the cloud are com- would have cost about $4 million for CIO’s IT landscape and toolkit.
pelling for large enterprises as well as equipment, $1 million for the software
small- to mid-sized organizations. At licenses and $70,000 per year in
Dell, for instance, the cloud is credited energy costs. A comparable cloud
with providing the computer maker with solution cost $131,000 a year for
a 10 percent lift in sales productivity round-the-clock service, with no
and a unified global CRM approach.5 additional power costs.
In the case of one large UK-based

6
The drivers of the cloud’s uptake are Over the last decade, the core technolo-
plain to see. Consumption-based “on gies have converged to make the cloud
demand” compute cycles are inherently a reality: virtualization, grid computing,
low-cost. Capital expenditure is hardly Web services, and massively parallel
an issue since cloud computing is, de computation frameworks are maturing
facto, an exercise in outsourcing. On rapidly. In tandem, a cadre of capable,
top of that, the cloud offers agility— credible vendors has emerged—names
achieving value more quickly—as well such as Salesforce.com, Workday, Ama-
as unprecedented scalability. Each is zon Web Services, Google, ServerVault,
a sweet spot for companies that prize Microsoft BPOS, Microsoft Azure, and
rapid business change and speedy AppNexus among them. In their wake
introductions of products and services. has come a growing roster of cloud
In fact, scalability on demand and success stories. We see the layers of
flexibility for the business were the the cloud along the following lines.
primary rationales for going to the
cloud among the IT managers surveyed
by CIO.6

7
IT leaders need to develop and practice
the means to understand the threats
and levels of assurance that affect a
given application or capability so they
can establish a ”risk baseline“ for their
adoption of cloud computing.

Letting down their guard case, the benefits of off-premises solu- Putting security concerns in
Accenture has observed that for some tions had been appealing enough, and perspective
companies, the allure of cloud comput- the development teams inexperienced As a rule, though, IT professionals
ing has proved so compelling that they enough in quality control protocols, are still erring on the side of caution.
have not applied the same risk manage- that the usual standards were not Nearly 60 percent of CIO magazine
ment disciplines to their on-demand enforced. survey respondents said vendors have
initiatives as they have with other IT not adequately addressed IT security
programs. Part of the challenge in such cases is concerns related to on-demand offer-
that cloud computing is so new that ings.7 Speaking after the recent RSA
A case in point: One large industrial it is not widely understood. Certainly, 2009 Security Conference, an executive
company decided to outsource the procurement teams have not become from Microsoft’s Trustworthy Comput-
hosting and development of its busi- familiar with it from a sourcing stand- ing group conceded that there is still
ness-to-business e-commerce sites. point; few corporate processes are set up a sense that the Internet is not secure
The company had launched and was to support pay-as-you-go computing. enough.8
using the sites before several of its Nor can IT leaders lean on their tradi-
managers realized that with two-thirds tional enterprise IT risk-management
of the organization’s revenue coming professionals and auditors to help
through these channels, the sites had ensure good data security in the cloud.
suddenly introduced unusual levels of The auditors are new to the cloud too;
vulnerability. With other IT implemen- for the most part, they have yet to
tations and programs, the company think through how compliance regula-
would typically apply “five nines” lev- tions apply to data that is managed
els of service requirements—that is, virtually.
99.999 percent availability—but in this

8
IT leaders’ concerns are easy to Accenture argues that what is needed for their adoption of cloud computing.
understand. The threats include the is a rebuilding of trust as well as a Not only do they have to revisit their
very real dangers of data theft and renewed sense of perspective—a processes for tracking employees’
compromise, loss of service, phishing realization that as with any other handling of data, but they must learn
incursions. Recently, at the Black Hat technology development, cloud com- which cloud services providers they
USA security conference in Las Vegas, puting initiatives come with their own can trust most—for example, which
a presenter showed how users of a unique sets of risks and rewards, cou- ones go through frequent and detailed
well-known cloud service were fooled pled with an understanding that the customer security audits in accord
into using virtual machines that could core risk-management challenges with standards such as ISO 27001 and
have included ”back doors“ that could have been addressed. 27002, SAS 70 Type II, etc. At a mini-
have been used for snooping.9 And mum, it is necessary to know what
there have been many alarming reports As they have done in previous situa- and how sensitive the data in ques-
of Internet security breaches—such as tions, IT leaders need to develop and tion is, how it should be moved and
the theft of Twitter corporate docu- practice the means to understand the stored, and what specific assurances
ments from Google’s cloud—and alleged threats and levels of assurance that the cloud computing provider makes
uses of malware by foreign governments. affect a given application or capability in the service level agreement.
so they can establish a ”risk baseline“

9
Taking action tomorrow Analyze the data flow to “be compliant” for them. But they
So what actions make sense for IT This calls for charting the lifecycle of must expect them to provide what is
leaders right now? Accenture’s empir- the relevant data assets, from develop- needed to help achieve compliance.
ical IT security work over many years ment to their destruction. IT managers
with a wide range of organizations must know where data is at all times Help strengthen continuity
shows that the following fundamentals so they can help confirm that it is being What happens if something ”breaks“
apply to cloud computing initiatives: stored and shared in compliance with while in the cloud? How is the data
local laws and industry regulations at owner notified, and how quickly? How
Carry out a detailed cloud risk appropriate levels of IT security. is the data recovered? These are the
assessment basics of best practices in business
With the collaboration of the relevant Build a cloud security strategy continuity, and they apply just as much
business colleagues, IT leaders must Leveraging well-proven IT security to cloud computing as to any IT out-
weigh the criticality of applications and principles, IT leaders must define the sourcing arrangement. They must,
data and decide what is “cloud appro- key security elements, knowing where of course, align with regulatory man-
priate.” They must gauge what risks encryption is needed, for example, and dates—particularly in tightly regulated
they are willing to take—for example, understanding which transport layers industries such as financial services.
whether to move new product data or are important. Accenture’s High Per-
customer data to the cloud—in context formance Business research initiative Educate, communicate
of the benefits of doing so and the also underscores the need to under- It is the IT leader’s responsibility
regulations that apply to where the stand how such a strategy relates to to educate employees on IT security
data must reside. implementation of the technology as policies and procedures and to be
well as to its ongoing effectiveness. very clear about how those policies
Get to know key cloud and procedures relate to the cloud.
providers Manage compliance For example, employees must adhere
As with any outsourcing arrangement, The regulatory complexities are enor- to corporate IT security policies when
it is essential to carry out detailed due mous when doing business in multiple exploring cloud services for any work-
diligence on providers’ performance— nations: some governments regulate the related activities, such as testing a new
including their financial performance. physical locations of the servers where IT service or storing data on the cloud.
Cloud computing providers vary in organizations keep their data. Well-
market position and approach; differ- known mandates include the European
ent vendors have different levels of IT Union’s Data Privacy Directive, the
security and data management. It is U.S. Health Insurance Portability and
also necessary to help confirm that Accountability Act (HIPAA) and the
they meet key standards—for example, U.S. Sarbanes-Oxley Act. The financial
regulations, standards, guidelines and services sector is the target of a host
codes of practice such as ISO 27001. of emerging regulations, and many
Also important: reviews of a provider’s new rules are in development that will
previous audits and compliance reports, affect critical infrastructure. IT leaders
looking for gaps in service compared cannot expect their cloud providers
to your on-premise solution.

Contracts should be clear


It is vital to put in writing the standards
to which you require adherence.

10
Top questions to ask about cloud security
The conversation about cloud • What are our obligations • What are we obligated to
security and the associated regarding data protection disclose to our customers
policies are matters for discus- versus those of a cloud regarding where and how
sion at the highest levels of the services provider? their data is being stored?
organization. There must be
particular emphasis on the • Do we know how some of • How do we stay up-to-date
questions of data privacy and our intellectual property might with where our cloud providers’
governance, on service-level become visible when reassem- data centers are located—and
agreements and on the ins and bled in collaboration clouds? with what local laws govern
outs of contracting with cloud their activities and security
providers. Here is a sampling • What is our policy for which protocols?
of the kinds of questions that staff are authorized to deposit
should be on the table: and store data with a cloud • How do cloud providers assist
provider? customers with their compliance
• Who is accountable for the requirements?
security of our data and to • What do our e-discovery
whom do they report? Who policies and processes look • What round-the-clock incident
are the stewards of our data like and how do they compare response can cloud providers
and how do they ensure that to those of a cloud provider? offer? What about intrusion
the data is tracked and secured protection? What about sepa-
appropriately? • Do we know how a cloud rating noise from relevant
service provider might change data?
• Do we have a defined and its terms of service?
explicit stance on the risks and • What kinds of physical segre-
rewards of cloud computing— • What formal standards— gation of virtual machines are
one that has been or is being international or regional or available for customers?
shared with all relevant IT staff industry-based—are used in
and business users? the development and operation
of the cloud service?
• Might the provider lose our
data—through misuse, or theft
or fraud, for example? If so,
what recovery plans do we
have? And how are we
protected contractually?

11
A community of support on Jericho Forum is an international IT computing to help secure all other
cloud security security thought-leadership associa- forms of computing.11 The CSA has
IT leaders are not alone when it tion dedicated to advancing secure engaged specialists in crucial areas
comes to determining the appropriate business in a global open-network such as governance, law, network
approach to secure cloud computing. environment. Members include IT security, audit, application security,
Accenture has deep experience and security officers from Fortune 500 storage, cryptography, virtualization
combined decades of specialization in multinationals as well as from entre- and risk management to provide author-
addressing the complex challenges of preneurial companies, major security itative guidance on how to adopt cloud
IT security and enterprise risk man- vendors, government and academia. The computing solutions securely.
agement. And cross-industry groups Forum has been working to develop
are actively working to identify and and demonstrate secure collaborative The CSA has recently published a
promote best practices. architectures. Last year it published a useful set of guidelines for business
Collaboration Oriented Architectures and IT leaders.12 The guidelines empha-
In May 2009, two of the leading framework presenting a set of design size the fundamentals of IT security:
cross-industry groups joined forces principles that will allow businesses to “While we do see cloud computing as
to promote industry-leading practices protect themselves against “the secu- being a major change coming to every
for secure collaboration in the cloud. rity challenges posed by increased business, as information security prac-
The Jericho Forum, an independent IT collaboration and the business poten- titioners, we recognize that there are
security expert group, and the Cloud tial offered by Web 2.0.” Its most verities which must not change: good
Security Alliance (CSA), a not-for- recent position paper describes a governance, managing risks and com-
profit group of information security ”cloud cube model“ in some detail.10 mon sense,” says Dave Cullinane, chief
and cloud computing security leaders, information security officer and vice
share the goals of encouraging common The mission of the CSA is not dissimilar: president at eBay, in the report’s
and secure cloud practices and helping It is to promote the use of best prac- foreword.
businesses understand the opportunity tices for providing security assurance
posed by cloud computing. within cloud computing, and to pro-
vide education on the uses of cloud

12
At the same time, leading vendors protection. Vendors also point out that Further, there are growing bodies of
are going to some lengths to persuade they adhere to well-known guidelines knowledge about enterprise security
the IT community and business users at the data center level—guidelines that risk that map to COBIT guidelines; others
that they are not wide open to attack. look at logical and physical security align with the draft risk-management
The majors—Amazon Web Services, along with the processes and overall guidelines outlined in the ISO 31100
Microsoft, IBM, Salesforce.com and organization and which conform to standards. A growing number of
Google—point out that they apply at standards such as AICPA SAS 70 industry-specific regulations—HIPAA
least the same level of rigor to defend- Type II and ISO 27001 and 27002. and Payment Card Industry mandates
ing their cloud offerings as they do among them—are also coming to the
their own computing environments. The CEO of one prominent cloud attention of CIOs and senior informa-
Indeed, some say that their IT security services provider noted that while tion security managers.
execution levels are far higher than most companies undergo quarterly
those found at many of the companies or biannual security audits by a few
that are questioning their security. auditing firms, his organization goes
Arguably, the big cloud providers are through such scrutiny at least weekly
now setting the standards for IT security. as current and potential customers
examine the company’s IT security
The Amazons and Googles have the systems. “What we’ve learned is that
scale and the resources to be able there is no finish line when it comes
to invest in the most sophisticated to security, and things are getting
monitoring and data security tools more intense than ever before,” he
and processes—and to hire and train said. Providers like this also have well-
top IT security talent. Observers agree honed systems for reporting on their
that Microsoft is one of the most security status.
attacked organizations, but that its
high levels of redundancy ensure robust

13
For IT leaders everywhere, it is not a The fundamental question is one of Accenture contends that it is vital to
matter of whether cloud resources balance—weighing, as accurately and have dispassionate discussions with
will be used, but how and when. As in as much detail as possible, the risks cloud providers about the four key IT
more and more senior executives of a data security breach against the security concerns. The sooner those
understand what it takes to become power of the cloud to directly address security questions are tackled, the
a high-performance business, cloud many of today’s most pressing busi- sooner the IT group can add signifi-
computing becomes one more tool ness issues—and to help achieve high cantly more value for the business as
they can use. But the cloud must not performance. a whole.
be treated as an unknown to be wary
of. Implemented and managed prop-
erly, it should not add risk; ideally, it
should reduce data security risks.

14
Sources 6 “Cloud Computing Survey: IT Leaders 10 ”Cloud Cube Model: Selecting Cloud
1 “Citigroup signs 30,000 seat deal See Big Promise, Have Big Security Formations for Secure Collaboration,“
with Salesforce.com,” Computer- Questions,” CIO, October 21, 2008, Jericho Forum, April 2009, www.
worldUK, November 16, 2007. www.cio.com/article/455832/Cloud_ opengroup.org/jericho/cloud_cube_
Computing_Survey_IT_Leaders_See_ model_v1.0.pdf.
2 “Early experiments in cloud com- Big_Promise_Have_Big_Security_
puting,” InfoWorld, April 7, 2008. Questions. 11 “Industry Leaders Form Cloud Secu-
rity Alliance; Will Unveil Inaugural
3 “Workday: The Next Software Power?” 7 Ibid. Findings at RSA Conference 2009,”
BusinessWeek, August 19, 2008. Cloud Security Alliance press release,
8 “Microsoft exec: Internet still not www.cloudsecurityalliance.org/
4 “Cloud Computing Survey: IT Leaders safe enough,” CNET News, April 21, pr20090331.html.
See Big Promise, Have Big Security 2009, http://news.cnet.com/8301-
Questions,” CIO, October 21, 2008, 13860_3-10224542-56.html?tag= 12 ”Security Guidance for Critical Areas
www.cio.com/article/455832/Cloud_ mncol;txt. of Focus in Cloud Computing,“ Cloud
Computing_Survey_IT_Leaders_See_ Security Alliance, April 2009,
Big_Promise_Have_Big_Security_ 9 “Data security services under a www.cloudsecurityalliance.org/
Questions. cloud,” Financial Times, August 3, guidance/csaguide.pdf.
2009.
5 “Welcome to the Real-time Cloud,”
presentation by Marc Benioff, chair-
man and CEO of Salesforce.com.

15
About Accenture About Accenture For more information, please contact:
Technology Labs Accenture is a global management
Accenture Technology Labs, the consulting, technology services and Alastair MacWillson
dedicated technology research and outsourcing company. Combining alastair.macwillson@accenture.com
development (R&D) organization within unparalleled experience, comprehensive +44 20 7844 6131
Accenture, has been turning technology capabilities across all industries and busi-
innovation into business results for more ness functions, and extensive research Joe Tobolski
than 20 years. The Labs create the on the world's most successful compa- joseph.f.tobolski@accenture.com
Accenture Technology Vision, a view of nies, Accenture collaborates with clients +1 312 693 6481
how technology will shape the future to help them become high-performance
and invent the next wave of cutting- businesses and governments. With Walid Negm
edge business solutions. Working closely approximately 177,000 people serving walid.negm@accenture.com
with Accenture’s global network of clients in more than 120 countries, the +1 408 817 2778
specialists, Accenture Technology Labs company generated net revenues of
helps clients innovate to achieve high US $21.58 billion for the fiscal year
performance. The Labs are located in ended August 31, 2009. Its home page
Chicago, Illinois; San Jose, California; is www.accenture.com.
Sophia Antipolis, France; and Bangalore,
India. For more information, please visit
our website at www.accenture.com/
Global/Services/Accenture_Technology_
Labs.

Copyright © 2009 Accenture


All rights reserved.

Accenture, its logo, and


High Performance Delivered
are trademarks of Accenture.

Barcode Placement

You might also like