Virtualization Technology News and Information
KeyNexus 2014 Predictions - Standardization of cloud-based encryption will drive innovation in key management solutions

VMblog 2014 Prediction Series

Virtualization and Cloud executives share their predictions for 2014.  Read them in this series exclusive.

Contributed article by Jeff MacMillan, CEO and Founder of KeyNexus

Keys to the Future: Standardization of cloud-based encryption will drive innovation in key management solutions

In 2013, cloud security was discussed extensively by the industry, but major implementations of encryption in the cloud are still relatively immature. While security risks to data continue to increase, cloud and software-as-a-service (SaaS) providers are realizing end users will demand more robust security solutions than are available today. Without investment in a new generation of cloud security, security remains an invisible barrier to many enterprises considering moving mission-critical applications and data into the cloud. 

For cloud services, encryption is often incorporated, but best practices for key management are just beginning to emerge. Whether you call it the "Snowden-effect" (thanks to the infamous government document leaker) or point to the problems that third-party products have had keeping private data private, the end result is that many businesses no longer trust cloud/SaaS providers with their keys.

Three developing, yet powerful, trends will fundamentally transform how people manage data in the cloud: 
  • Encryption Required: Not only will businesses increasingly demand that encryption be offered by most Cloud and SaaS platforms (or "baked-in" to current offerings), they will simply expect encryption as an obvious requirement to do business in the cloud. This expectation will put pressure on solution providers to enhance their offerings and raise the bar on cloud security in general.
Additionally, best practices such as those published by the Cloud Security Alliance (CSA), recommend a separation of "lock" and "key" in the cloud. Encryption keys should be stored in a different location than the data; doing otherwise is likened to locking your house but leaving the key in the lock.
  • Regulatory Auditing: Businesses, especially those pursuing compliance with various industry and government regulations (such as privacy laws, SOX, HIPAA, and PCI), increasingly want to own and manage the encryption keys used on their Cloud/SaaS platforms of choice. Key management procedures require sufficient uniformity and transparency to verify compliance; hence the desire for businesses to own their keys.
Businesses want assurances that cloud providers cannot access their keys or share them with the government without notification. Cloud/SaaS providers who are now trying to directly embed encryption into their platforms will not be able to offer this level of assurance.  Likewise, cloud vendors and SaaS providers won't want the liability of key storage and will outsource key management to a third-party vendor or simply hand over the encryption keys to customers directly.
  • Trusted Key Management Administrators: Although businesses want to own and manage their keys, many would prefer a secure cloud-based approach to avoid bringing security infrastructure in-house while moving data and applications to the cloud.

Businesses want the security and assurances of Hardware Security Models (HSMs) without the high capital cost or requirement of hosting them in-house. Keys stored in-house must be accessible to their cloud applications (i.e. Internet facing) which poses constant security risk. Additionally, many enterprises don't want to worry about ensuring the keys are highly available 24/7 to their cloud operations.

Tomorrow's Cloud: Ubiquitous Encryption - Centralized Key Management

The reality is that true security means encryption keys need to be stored separately from the cloud data. For cloud providers, this means creating new pathways for storing keys and designing methods of correlating those keys with the associated customer data. However, the majority of cloud providers (both public and private) don't want to be left holding the keys.

Individual cloud/SaaS vendors also can't manage different types of encryption keys across multiple platforms. Aside from just using cloud vendors (AWS, Azure, RackSpace), businesses also are regularly using dozens of SaaS solutions (Salesforce, DropBox, Evernote). These businesses want a single service that can easily and efficiently manage their many sets of keys from dozens of cloud/SaaS platforms in a secure, centralized location.

Summary of Predictions:

In the near future, most cloud and SaaS platforms will offer encryption as a basic feature and the platform providers will enable customers to manage their own keys "off-platform" for compliance and as a security best-practice. Customers will then have to manage dozens (or even hundreds) of sets of keys. The logistical management of these keys will present challenges and could risk the security of the data as businesses take short-cuts for important procedures like key rotation.   

Secure, highly-available cloud-based key storage services will enable the integration of the key management process to provide customers with a single key management platform. As the key management market continues to mature, we expect to see extensive growth of encrypted cloud usage across all sectors.


About the Author

Jeff is the founder of KeyNexus, a cloud-based key storage service for businesses and developers. KeyNexus is using an innovative approach to key management to help businesses achieve true security and compliance. He's also a founding member of the Canadian Cloud Council. Previously, Jeff was a Combat Systems Engineering Officer in the Canadian Navy. Connect with him on LinkedIn.
Published Tuesday, November 26, 2013 6:32 AM by David Marshall
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
<November 2013>