Commission staff assess cloud services security for businesses

From the Federal Trade Commission Bureau of Consumer Protection’s Elisa Jillson and Andy Hasty … As cloud computing has become business as usual, frequent news reports of data breaches and other missteps should make companies think carefully about how they secure their data. The Federal Trade Commission has tips for business about making use of cloud services safer—both for owners and customers who rely on them to safeguard their information.

  • Take advantage of the security features offered by cloud service companies. Cloud providers offer detailed guidance about their security controls and how to set up their services in a more secure fashion. But it’s up to you to understand the options and configure those settings in the way best suited to your business. Keep in mind that it’s not a matter of a simple on-and-off switch. Configuring your cloud security requires you to make thoughtful decisions that align with the sensitivity of the data you store and how you use it. In addition, think carefully about who at your company needs what data. Unless employees have a legitimate business reason, they shouldn’t have access to your cloud resources. Require multi-factor authentication and strong passwords to protect against the risk of unauthorized access. Furthermore, never hard code passwords in cloud-based applications or source code. You may think you’re saving steps, but it’s the business equivalent of a “Hack me!” sign.
  • Take regular inventories of what you keep in the cloudSome companies’ cloud storage resembles a forgotten attic overdue for a spring cleaning. Whether you store data in the cloud, on your network, or in a file cabinet, you can’t keep it safe if you don’t know where it is. That’s why up-to-date inventories are essential to data management. Many cloud services provide tools—dashboards or management consoles, for example—for just that purpose. But don’t just set it and forget it. In addition to staying on top of what data is where, make sure your security configurations and access rights remain consistent with the sensitivity of what you’ve stored. As you add data that may require more protection, re-evaluate your security settings and amp them up accordingly. Also, don’t take anything on faith. Actively test for misconfigurations or other security failings that could compromise your data and maintain robust log files so you can continuously monitor your cloud repositories. We’ve all read reports about sensitive data stored in a cloud repository open to the internet and you don’t want your company name in the next headline.
  • Don’t store personal information when it’s not necessary. One upside of cloud storage is that it’s often less expensive than other methods. But as people with big basements will tell you, the list of stuff deemed “essential” tends to expand in direct proportion to how much storage space is available. As you conduct that inventory of what you keep in the cloud, resist the temptation to hold on to data “just because.” Instead, be ruthless in posing the question, “Do we have a legitimate need to store this information?” If the answer is no, dispose of it securely. No one can breach what you don’t have.
  • Consider encrypting rarely used data. “There’s some information I don’t have to access regularly—back-ups, for example—but I do need to retain it.” We hear you and we have a suggestion. As part of your defense-in-depth approach to security, consider whether to encrypt data at rest. Indeed, if your data contains sensitive information, encrypting it is a basic principle of security regardless of where it’s stored.
  • Pay attention to credible warningsSome cloud providers offer automated tools to remind you about cloud repositories that are open to the Internet. Others may contact customers with warnings like that. In other instances, security researchers may contact companies when they find exposed data online. If you receive one of these warnings, pay attention. Investigate your cloud repositories and recheck your security settings.
  • Security is your responsibility. Using cloud services doesn’t mean you can outsource security. Throughout the lifecycle of data in your company’s possession, security remains your responsibility. Even if you rely on your cloud provider’s security tools, you should still have a written data security program that lays out your company’s process for securing consumers’ personal information, and people on your staff knowledgeable about maintaining, monitoring, testing, and updating that program. Yes, you need to review your cloud contracts carefully to spell out your expectations and clearly establish who is primarily in charge of what. But keep in mind that if it’s your data, it’s ultimately your responsibility.

The Bureau of Consumer Protection enforces a variety of laws enacted by Congress, along FTC trade regulation rules. Its actions include individual company and industry-wide investigations, administrative and federal court litigation, rulemaking proceedings, and business education. In addition, the Bureau contributes to the Commission’s ongoing efforts to inform Congress and other government entities of the impact that proposed actions could have on business and consumers.