Napoleon once famously said, "War is 90% information."
There are three things to note about this statement. First, it's as true today as it was 200 years ago. Second, it's equally applicable to business as it is to the battlefield. Third, 90% is conservative; today's businesses literally are information.
Given the importance of any given organization's data -- including the effort, time and money that goes into managing it -- it's understandable that moving it to the cloud can be complex.
But within the past few years, service providers have refined and improved database as a service (DBaaS) offerings, and adoption continues to grow as a result. Services such as Amazon Aurora, SimpleDB, Azure SQL Database, OpenStack Trove and numerous others have emerged that promise to bring efficiencies, economies of scale and other benefits of the cloud to the database world.
However, before jumping in feet first, it is important to note that these services offer a unique risk/value proposition for end-user organizations. There are also some unique security aspects of DBaaS that will influence the usage decisions organizations ultimately make.
What is DBaaS?
Before unpacking the security-specific aspects of DBaaS, it's important to clarify what we mean by the term. It's new enough that not everyone is using it the same way.
In this context, we're differentiating between "database in the cloud" and cloud database services; for example, just because a database is "in the cloud" doesn't make it DBaaS for our purposes. One could, for example, locate a virtual image running SQL Server in a public or private cloud in much the same way that you'd host that machine in a legacy data center -- or contract a managed hosting provider for your database server. This isn't the same as DBaaS.
DBaaS refers specifically to cloud database services that are managed by a service provider (note, this could be an internal or external service provider) where the administration and management of the database are a "black box" to the DBaaS customer. Similar to IaaS, PaaS and SaaS, this would usually involve a "pay as you go" pricing model, "instant on" provisioning, multi-tenancy and so on.
From an enterprise perspective, this can be both compelling and scary. On the one hand, potentially reduced costs and streamlined management are tremendously interesting from a business point of view. On the other hand, the confidentiality, integrity and availability of that data is paramount, and entrusting it to a cloud database service provider -- whether an internal service provider or third-party -- can be anxiety-inducing.
Three steps to ensure secure cloud database services
First of all, it goes without saying that database as a service won't be for every enterprise -- or every situation. As with any other cloud service, you'll want to evaluate the specific use case -- i.e., the business processes, applications and context -- to which you will be applying DBaaS to make sure the decisions are in line with your organization's culture and risk tolerances, meaning you'll want to undertake the same evaluation and vetting measures as you would apply to other cloud services. For example, are there legal and/or regulatory implications for moving the data to a cloud provider -- such as cardholder data that falls under PCI DSS, ePHI that is regulated under HIPAA, or Social Security numbers and other PII? And are there existing agreements with end users -- such as privacy policies -- that impact how you can store the data and where?
Just like you would evaluate a SaaS or IaaS along these lines, evaluation and vetting will play an important part in selecting a provider for cloud database services. Likewise, tools such as the CSA CAIQ and CCM can provide similar value in supporting these efforts as they do in evaluating and vetting other types of cloud providers. Programs like the STAR registry can potentially help streamline that process in the DBaaS space as they do with other cloud services.
Point being, evaluating the security and operational aspects of a DBaaS provider and cloud database services just like you would any other service provider is a solid first step.
Second, there are some steps specific to data protection that are very important to ensure a secure migration to cloud database services. Enterprises must understand how the data will be protected in transit to the provider and once it's there. For example, consider the amount (i.e., volume) of data that is likely to be associated with the typical production database. How are you going to get the data there in the first place? Some service providers might leverage native and product-specific database replication methods (for example, MySQL replication), others might utilize a proprietary tool (such as the SQL Azure Migration Wizard), while still others might require physical shipment of media. The approach your provider employs should be carefully evaluated from a security point of view and discussed frankly and openly with the provider to ensure security goals are met during this migration. Protecting the data while it is migrated is a key step, as is having a game plan for moving it back on-premises or to another service (to avoid vendor lock-in).
Likewise, while the data is in the custody of the service provider, what security options and features are offered? For example:
- How are connections authenticated and how are access requests authorized?
- Is there encryption? If so, is there an option for column-level, transport, encryption of an entire instance?
- What logging and audit features are available and how can they be accessed by your organization's staff?
- What redundancy options are available and how will they be structured in your usage?
Again, not all cloud database services providers offer the same feature set, so it's important that customers understand what they're buying and think through how security features will tie into their broader security program.
Lastly, it's important to consider how security properties will change before and after the migration. For example, are you employing specialized database protection software that would be obviated by virtue of a migration to DBaaS? If so, how will you ensure that the intent of that control is still satisfied under the new model? This may require you to go back and understand both architecturally and from a risk control standpoint why those controls were implemented in the first place so you can ensure risk is mitigated to the same extent under the new model as compared to the old.
DBaaS is certainly a powerful concept and one that promises potential flexibility advantages and cost savings. However, realizing those benefits without putting the organization at risk means enterprises must have a game plan for secure DBaaS. Understand how the cloud database service will be used, and use that to guide vendor selection. Organizations should also have a game plan for data protection during and after migration. And last but not least, understand the impact of that migration to existing controls and countermeasures that you already have fielded in your enterprise.
About the author:
Ed Moyle is the director of emerging business and technology at ISACA. He previously worked as senior security strategist at Savvis Inc. and as senior manager at Computer Task Group. Prior to that, Moyle served as vice president and information security officer at Merrill Lynch Investment Managers.
IaaS, PaaS or DBaaS? Get help deciding