Cloud Security: Waiting For Godot & His Silver Bullet
It’s that time again. I am compelled after witnessing certain behaviors to play anthropologist and softly whisper my observations in your ear.
You may be familiar with Beckett’s “Waiting For Godot”*:
Waiting for Godot follows two days in the lives of a pair of men who divert themselves while they wait expectantly and unsuccessfully for someone named Godot to arrive. They claim him as an acquaintance but in fact hardly know him, admitting that they would not recognise him were they to see him. To occupy themselves, they eat, sleep, converse, argue, sing, play games, exercise, swap hats, and contemplate suicide — anything “to hold the terrible silence at bay”
Referencing my prior post about the state of Cloud security, I’m reminded of the fact that as a community of providers and consumers, we continue to wait for the security equivalent of Godot to arrive and solve all of our attendant Cloud security challenges with the offer of some mythical silver bullet. We wait and wait for our security Godot as I mix metaphors and butcher Beckett’s opus to pass the time.
Here’s a classic illustration of hoping our way to Cloud security from a ComputerWeekly post titled “Cryptography breakthrough paves way to secure cloud services:”
A research student who had a summer job at IBM, has cracked a cryptography problem that has baffled experts for over 30 years. The breakthrough may pave the way to secure cloud computing services.
This sounds fantastic and much has been written about this “homomorphic encryption,” with many people espousing how encryption will “solve our Cloud security problems.”
It’s a very interesting concept, but as to paving the “…path to secure cloud computing,” the reality is that it won’t. At least not in isolation and not without some serious scale in ancillary support mechanisms including non-trivial issues like federated identity.
Bruce Schneier wades in with his assessment:
Unfortunately — you knew that was coming, right? — Gentry’s scheme is completely impractical…Despite this, IBM’s PR machine has been in overdrive about the discovery. Its press release makes it sound like this new homomorphic scheme is going to rewrite the business of computing: not just cloud computing, but “enabling filters to identify spam, even in encrypted email, or protection information contained in electronic medical records.” Maybe someday, but not in my lifetime.
The reality is that in addition to utilizing encryption — both existing and new approaches — we still continue to need all the usual suspects as they deal with the fact that fundamentally we’re still in a cycle of constructing insecure code in infostructure sitting atop infrastructure and metastructure that has its own fair share of growing up to do.
As a security architect, engineer, or manager, you need to continue to invest in understanding how what you have does or does not work within the context of Cloud.
You will likely find that you will need to continue to invest in threat and trust models analysis, risk management, vulnerability assessment, (id)entity management, compensating controls implemented as hardware and software technology solutions such as firewalls, IDP, DLP, and policy instantiation, etc. as well as host of modified and new approaches to dealing with Cloud-specific implementation challenges, especially those based on virtualization and massive scale with multitenancy.
These problems don’t solve themselves and we are simply not changing our behavior. We wait and wait for our Godot.
So here’s the obligatory grumpy statement of the obvious as providers of solutions and services churn to deliver more capable solutions to put in your hands:
There is no silver bullet, just a lot of silver buckshot. Use it all. You’re going to have to deal with the cards we are dealt for the foreseeable future whilst we retool our approach in the longer term and technology equalizes some of our shortfalls.
Godot is not coming and you likely wouldn’t recognize him if he showed up anyway because he’d be dressed in homomorphic invisible hotpants…
Get on with it. Treat security as the enterprise architecture element it is and use Cloud as the excuse to make things better by working on the things that matter.
If Godot does happen to show up, tell him I want my weed whacker back that he borrowed last summer.
/Hoff
* Wikipedia
Recent Comments