Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Yours Mine and Ours

Posted June 6, 2011    Peter McCalister

As we previously discussed, a recent report by the Ponemon Institute on the Security of Cloud Computing Providers showed “the majority of cloud computing providers do not consider security as one of their most important responsibilities”. So what are you to do if you want to use the cloud and need to do it in a secure and compliant way? To me it’s a matter of shared responsibility – yours, mine and ours.

First, the vendor needs to do their part. There are certain elements of security a cloud vendor has to provide and most do. According to the Ponemon study the security technologies most often used by US and European providers in cloud computing environment are firewalls, anti-virus and anti-malware, encryption of data in motion, patch management and log management. This should provide a good foundation.

Cloud customers need to do their part to use this foundation. Certain responsibilities naturally fall to the cloud customer. The cloud vendor can provide the tools, but you need to control the use of the cloud inside your own organization. If it’s your application you need to make sure the code is well written. The cloud vendor can provide encryption capabilities but you need to manage the keys. The cloud vendor can provide a secure console with role based access control but you need to manage the passwords and who has access to them.

So that leaves the complicated stuff – shared responsibilities and the special case of the privileged users of the cloud.

Leave a Reply

Additional articles


Answering the age-old question, ‘What’s plugged into my network?’

Posted October 9, 2015    Alejandro DaCosta

“What’s plugged into my network?” is a question I hear frequently from security administrators. And, really, it’s no surprise why. No longer do we have to account just for the physical servers in our datacenters, workstations and a few network devices. Now we need to keep track of roaming laptops, dynamic virtual systems, off-site cloud deployments and BYOD.


Closing the Vulnerability Gap

Posted October 7, 2015    Brian Chappell

Managing vulnerabilities is a significant challenge for many organizations. The main difficulties with managing this manifest in two key areas. The first is that the list isn’t static. The second is priority.


Scottrade Breach: Identified by Federal Officials

Posted October 5, 2015    Morey Haber

Late afternoon on October 2nd, news leaked out of another large security breach, now at Scottrade. The identity count of records, in the millions again (4.6 million is the latest). This breach comes on the second day of national CyberSecurity month, the first being Experian/T-Mobile breach.