Two user groups have launched cloud-security best-practices campaigns at RSA Conference 2009 and formed an informal alliance to influence the development of security products in accordance with their recommendations.
The Cloud Security Alliance (CSA) and the Jericho Forum released their agendas of threats to cloud services that need to be addressed, with CSA's detailed "Security Guidance for Critical Areas of Focus in Cloud Computing" filling up 83 pages that detail 15 areas of security concern.
At the same time, the more European-based group Jericho Forum served up an outline of threats it perceives.
The Jericho Forum will also spell out their concerns at next week's Infosec conference in London. The Jericho Forum and Cloud Security Alliance are in agreement on what needs to be done. Chris Hoff, a security consultant who wrote the architecture section of the CSA paper, shuttled from his group's launch over to the Jericho Forum event, listened and supported it. "Your concepts make sense," he said.
The groups, which tout members that include large corporations such as DuPont, Eli Lily, eBay and ING, need to use their influence as major customers to demand products that address cloud threats, Hoff said. "It's the large end-user organisations that will drive it," he said of the cloud-security best-practices push.
Issues addressed by both groups are wide ranging and include recommendations that planning what to do if the contract with the provider is terminated and understanding where data is located and how they are controlled.
Businesses need to scrutinise what security providers actually supply, says Adrian Seccombe, a member of the Jericho Forum Board of Management. "There's not too much security and identity management and access management in the cloud yet," Seccombe says.
"Cloud computing ought to be called swamp computing and we don't even know what the alligators are yet."
Despite the efforts to identify security vulnerabilities in cloud services, he is concerned that criminals capturing fragments of information -- what he calls bread crumbs - about corporate cloud activity could deduce what proprietary activities businesses are up to. These bread crumbs, while not valuable in themselves, can create a trail criminals can follow to valuable information, he says.
Hoff says the work of the two groups will be ongoing because as clouds and cloud defenses develop, threats will adapt and new vulnerabilities will arise. "It's not an end state. It's going to change again," he says.
Rich Mogul, a security consultant who spoke at the Jericho Forum event, said the group should exploit the fact that its members are major corporations. "You should use the buying power of the Jericho Forum to influence the industry," he says.
CSA has broken the concerns into two broad categories: cloud governance and operating in the cloud.
Governance includes subtopics governance and enterprise risk management; legal; compliance and audit; information lifecycle management; and portability and interoperability.
Operating in the cloud includes traditional security, business continuity and disaster recovery; datacentre operations; incident response, notification and remediation; application security; encryption and key management; identity and access management; storage; and virtualisation.