cloud-based security

TIC and Einstein behind cloud growing pains

Agencies that move to the cloud gain unprecedented flexibility and scalability, but their new network architectures are causing some growing pains.

According to Sara Mosley, the Department of Homeland Security's acting CTO,  "The idea of having access to any data, anywhere, with the cloud means you have to look at data protection differently." Speaking at ACT-IAC's Executive Leadership Conference on Oct. 31. she told the audience that "you still need the perimeter protections. You've gotta look at it from a data-protection perspective -- that's really where network security is going." 

Two industry panelists, Yubico's Jeff Frederick and Zscaler's Steve Kovac, put the emphasis on the user, but agreed increasingly hybrid networks demand a different approach. "If you put policy around the user," Kovac said, "the network just becomes a form of transit."

Or as U.S. Digital Service Engineer Andy Brody put it, "the boundaries are less physical and more logical. That requires a different way of looking at it."

"The network-based defense," he added, "has already been stretched to the breaking point."

The Trusted Internet Connections that agencies are required to use to access external networks are a particular friction point. Originally conceived to protect the perimeter of government systems, TICs now need a different model. "You're not going to look at it as protection of the network," Mosley said. "You're going to look at it in terms of protection of the data."

Modernizing the TIC infrastructure has been a key element of discussions driven by the IT modernization report, Mosley said. "There are lots of ways to virtualize or implement similar, TIC-like security," she said, but "the biggest hurdle is really the Einstein piece -- that's something we're working on internally. How do we get similar capabilities in the cloud, that we have now with the Trusted Internet Connection?"

Agencies have their own limitations to overcome, Mosley added. Much of the cloud-security focus has been on Federal Risk and Authorization Management Program compliance, she said, but "from an operational security standpoint, is your [security operations center] ready to take on the types of security challenges in the cloud? Do they have the tools? Do they have the skillset? Are you outsourcing that?" 

And while data- and user-centric solutions are available, the panelists said, none offer full fixes.

Some large agencies are looking to microsegmentation, Mosley said, and future phases of DHS' Continuous Diagnostics and Mitigation program will include such solutions, but "the biggest challenge there is scalability."

Similarly, encryption can't serve as a panacea, Kovac said. "If you're going to encrypt and decrypt at every single hop … you've just compounded your problem."

But beyond the technical obstacles, the panelists agreed, the biggest challenge is getting program and mission owners to understand why changes are in order. While the IT shop could be held accountable for perimeter security, Mosley stressed, responsibility shifts when the focus is on users and data.

"Ultimately, the data owner owns the risk," she said. "We have to make sure they have a good comprehensive plan."

About the Author

Troy K. Schneider is editor-in-chief of FCW and GCN.

Prior to joining 1105 Media in 2012, Schneider was the New America Foundation’s Director of Media & Technology, and before that was Managing Director for Electronic Publishing at the Atlantic Media Company. The founding editor of NationalJournal.com, Schneider also helped launch the political site PoliticsNow.com in the mid-1990s, and worked on the earliest online efforts of the Los Angeles Times and Newsday. He began his career in print journalism, and has written for a wide range of publications, including The New York Times, WashingtonPost.com, Slate, Politico, National Journal, Governing, and many of the other titles listed above.

Schneider is a graduate of Indiana University, where his emphases were journalism, business and religious studies.

Click here for previous articles by Schneider, or connect with him on Twitter: @troyschneider.


Featured

Charter Sponsors