Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesCybersecurity News

How to Make Informed Risk Management Decisions about What to Store in the Cloud

By Mark. B. Cooper
cloud-enews
November 1, 2018

Are we asking enough questions about cloud security for organizations to make informed risk management decisions? With cyber threats evolving, cloud servers are a major target and more than 80 percent of organizations store their information in the public cloud, according to Rightscale’s 2018 State of the Cloud Report. This begs the question of cloud security.

The cloud promises availability, simplified management and cost savings – yet the cloud’s openness is also its weakness, making it vulnerable to new attack vectors and compromise. For example, if the cloud host hardware or operating system are compromised, all data hosted can also be exploited via a process called hyperjacking.

 

Risk Management Issues with the Cloud

Organizations need to proceed with caution about what they store in the cloud. The way cloud storage systems typically work is to leave it up to the user to enable and configure encryption. Without a deliberate user effort, most data stored in the cloud is not encrypted at-rest. When encryption is enabled to encode data, most services store the keys themselves, and use the key to access the data whenever a user requests data. However, storing keys and data in a cloud service might leave users’ keys and their data vulnerable. An example of this was when the Open Secure Sockets Layer (OpenSSL) Heartbleed exploit was discovered.

When relying on cloud providers, mitigation and protection against exploits like this are often out of the organization’s hands. The organization has little to no visibility of the underlying protections and potential risk. Currently, there are several risk management issues that organizations face with cloud security:

  1. Loss of physical controls of their data.
  2. No visibility around subpoena and disclosure of their data when stored in cloud.
  3. Accidental disclosure. It’s difficult to accidently disclose data when stored on a server in a data center that is cabled to the inside of a firewall. It is much more likely to occur when stored on a cloud service that could be accidently be misconfigured and made publicly accessible to anyone on the Internet, via a click.
  4. Little to no established practices from cloud providers on access or guarantees for protecting user keys.
  5. What happens to your Internet of Things or pubic key infrastructure (PKI) for your environment if the cloud provider decides to exit the service? Keys cannot be extracted or moved to new appliances. Data that is encrypted can be moved to wherever you want. If a cloud provider terminates a service, unless you have possession of the encryption key, you may be unable to move or recover your operations and data.  
  6. Encrypted data where the key and data are held by the provider make contract and price negotiations much tougher as you are locked into their platform.

 

Proceed with Caution About What to Store in the Cloud

Should organizations entrust their private keys in the cloud? No. Storing private keys and identities in the cloud is dangerous. For PKI, the security of private keys is critical. Anyone who obtains a private key could impersonate the rightful owner and compromise information, potentially resulting in tremendous damage.

It is best to consider the cloud as a storage repository and maintain control of the encryption keys on premise. While there are a few cloud providers that offer storage and protection of keys, organizations should carefully consider whether their data is safe if both the encrypted information and the keys are stored in the same location. Key management principles often place the keys in separate containers, locations or facilities – and the encrypted information in another. Separating keys and data offers a form of protection.

 

What to Store and What Not to Store

Information that is generally fine to store in the cloud:

  1. Non-sensitive data.
  2. Encrypted Information. Insist on at least AES 128 symmetric or better or RSA 2048 encryption.
  3. Encrypted backups of systems.
  4. Applications and processes to manage data.

                       

However, be wary of storing this type of information:

  1. Encryption keys.
  2. Identities.
  3. Information that requires tight geographic boundary possession, unless the cloud provider has specific guarantees around data storage locations in the cloud. Think GDPR.
  4. Don’t store data and their associated encryption keys at the same provider. Consider on-premises keys and cloud-based data.

 

A clear and strong identity management process and plan is critical. As hybrid enterprise solutions evolve, including cloud and on-premises software, the need for stronger identity management and identity as a service (IDaaS) is a must in order to make more informed risk management decisions.

 

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: cloud security data breach data storage identity (ID) management security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark B. Cooper, president and founder of PKI Solutions, is known as “The PKI Guy” since his early days at Microsoft. He has deep knowledge and experience in all things Public Key Infrastructure (PKI). PKI Solutions Inc. provides consulting, training and software solutions for Microsoft PKI and related technologies for companies around the world. Prior to founding PKI Solutions, Cooper was a senior engineer at Microsoft, where he was a PKI and identity management subject matter expert who designed, implemented, and supported Active Directory Certificate Services (ADCS) environments for Microsoft’s largest customers.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • colorful text on black screen

    Use reliable intel to make informed decisions in a crisis

    See More
  • risk-management-freepik1170x658v568.jpg

    How to make third-party risk management recession-proof in 2023

    See More
  • Why Reputational Risk is a Security Risk and What to Do About It

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing