At Druva, we’re currently going through an ISAE 3402 Type-I/II audit. It caused me to step back to understand what the findings of this audit have taught us. It reinforces that safeguarding our customers data is critical.
Cloud security can be broken down into the following categories :
As for the outermost layer, it’s fairly straight forward. We applied three simple rules, ennabling security robust enough for any network intrusion :
With cloud security, the key is to control authorized access. This is one of the most critical steps in ensuring security of your infrastructure. Druva deployed the following steps to prevent any unauthorized access :
The two-factor authentication for administrators and password control for users ensure the cloud is protected from any identity thefts. SAML integration further helps single sign-on and centralizing the authorization. Strong encryption, non-intuitive schema and data scrambling helps mitigate any identity theft in case of intrusion.
The innermost part of the infrastructure is the data storage. At this stage, unauthorized access is the biggest risk. A good security policy will enable the following :
Druva was the first to develop and use two-factor encryption for securing stored data. The encryption works like a bank locker system, where both the user and the cloud hold part of the key. For the user it’s his own password and for the cloud, its a token unique to every user.
Data splitting helps both in load-balancing and physical security of data. Any attempt to mask the knowledge of any direct access to data is always useful. And data sandboxing ensures that each enterprise customers data is sandboxed (physically, logically and through encryption) to avoid the security thread spilling over.
We learned that security infrastructure is incomplete without a solid security policy. The rules around who owns policies and who implements them should be clearly defined. Druva applied the following processes:
And lastly, the physical security of servers is critical. For this, we trust our cloud partner, AWS, and regularly check their internal processes and audit reports to ensure physical security of servers.
Overall security has been our cloud teams area of focus, and we learn something new every day. Hopefully these recommendations will help you in your cloud strategy planning and implementation.