In-Depth
Shattered Trust: IT Survey Shows PRISM Allegations Have Brought Cloud Misgivings
Revelations of the NSA PRISM program and other surveillance operations have already put planned or existing use of public cloud services on ice. A survey of Redmond readers shows skepticism of the government and key providers -- including Microsoft.
Revelations that the largest telecommunications and IT services providers have cooperated with the National Security Agency (NSA) to enable classified surveillance programs aimed at thwarting planned terrorist acts has had a chilling effect on cloud deployments. Since IT expert Edward Snowden brazenly leaked information about PRISM, the NSA's covert data collection and interception effort, a substantial number of businesses have either scaled back cloud initiatives or brought some deployments back in house.
As the nation debated whether Snowden was a whistleblower or a traitor, many organizations grappled with the prospect that their encrypted data might not be as secure as they believed it to be. For some, questions have been raised; for others, decisions are being second-guessed. While assessing whether their data could be accessed by the government or any third party without their knowledge or consent, businesses have had to address the implications of that possibility and the newfound risks they face with their customers, regulators and shareholders.
According to the Information Technology and Innovation Foundation (ITIF), a Washington, D.C., think tank, cloud providers in North America alone stand to lose between $21.5 billion to $35 billion in revenues by 2016 following the disclosure that the NSA has secretly used stipulations of the Foreign Intelligence Surveillance Act (FISA) and the Patriot Act for programs such as PRISM to obtain and mine data to investigate suspected threats.
If that sounds extreme, a survey of Redmond magazine's readership also shows a significant number of organizations are putting some planned cloud migrations on hold, while many are retreating from those already underway. More than one-third put planned projects on hold in wake of the NSA leaks, while 13 percent brought cloud projects back in-house, according to an online survey of 300 Redmond readers conducted in mid-August.
This was the mind set before last month's alarming revelation that the NSA allegedly has developed and used sophisticated techniques to decrypt encrypted data -- sometimes with backdoor holes developed in concert with major players.
Temporary Panic?
While the data shows an overwhelming number of IT pros have new or heightened misgivings about the government and public cloud providers, those fears could subside in the coming months or years, some experts predict. That's especially the case as businesses realize they can use -- or are already using -- encryption and other security technologies that are impervious to surveillance.
Another factor that could ease fears is if the government becomes more transparent as to how and when data is retrieved -- and lets providers do the same. Today providers complain they're hamstrung by the laws that prohibit such disclosures. Nevertheless, a sizable number of businesses have reacted to the disclosure of PRISM by voting with their budgets and retreating from existing and planned use of public cloud services.
The reason for this pullback is clear: Businesses are unnerved by the U.S. government's clandestine surveillance activities. Our survey shows 46 percent are "very concerned" and 24 percent are "somewhat concerned" by the threat of the government accessing corporate data without consent.
As it pertains to IT security policies, more than half of respondents say addressing the threat of government surveillance of cloud data is a high priority, with 31.8 percent of that sample classifying it as a "very high" priority and 25 percent saying it's "somewhat high." Conversely, only 6.1 percent say addressing access of data by government officials is a "very low" priority, and 6.4 percent say the issue is "not a priority at all" to their IT shop.
There are definitely valid reasons for the high levels of concern, according to Vikram Kumar, CEO of New Zealand-Âbased cloud storage company Mega Ltd. Unlike data-thieving criminals, government bodies have the techniques and legal avenues to get what they want, when they want it, according to Kumar.
"Confidentiality and control over data have always been big concerns, in particular for corporate customers," Kumar says. "Concerns have probably increased recently. Government bodies typically have some tools that hackers don't -- direct or internal system access, ability to issue gag orders, and `full take' capabilities such as take everything."
All organizations should pause before putting sensitive data in public cloud services in the wake of the NSA leaks, says Travis C., a respondent to the Redmond survey. "This NSA issue has done an immense amount of harm in terms of trust for both the government and large data-housing companies," he says. "As the law is written, because you can't notify the client, we simply can't trust you. Microsoft and others need to allow clients to encrypt their own traffic with their own keys. The provider providing the encryption means nothing, as your key can be subpoenaed. If providers want to be trusted, they need to give the user control over his own encryption and make the government subpoena the subject of their investigation -- as it should be."
Microsoft's Alleged NSA Ties
While the disclosure of the covert surveillance activities identified a who's who of players -- including Apple Inc., Google Inc., Facebook, Twitter, Verizon Communications Inc. and Yahoo! Inc. -- Snowden alleged Microsoft in particular worked closely with the NSA to intercept communications from those using its key online services including SkyDrive, Office 365, Outook.com and Skype. Indeed many of these services are targeted at consumers, but Office 365 includes hosted implementations of Exchange, SharePoint and Lync Online, and Microsoft's separate SkyDrive Pro is the service for storing SharePoint content.
In July, Snowden singled out Microsoft, claiming the company helped the NSA intercept communications by circumventing the service's own encryption. Microsoft adamantly denies it gave the NSA or any other entity backdoor access to its systems, saying it only grants government access to specific data requested through warrants, subpoenas or other legal channels.
"There are significant inaccuracies in the interpretations of leaked government documents reported in the media," General Counsel Brad Smith said in a lengthy statement published days after the allegations regarding Microsoft's cooperation with the NSA (see "Microsoft: We Don't Give Government Unfettered Access,").
But a significant number of our survey respondents aren't so sure about that, with 29 percent saying they "strongly disbelieve" Microsoft's denial and 21.5 percent "somewhat" disbelieving the company's disavowal. Despite skepticism from half of our respondents, 5.8 percent "strongly believe" the company is telling the truth, while 20.5 percent "somewhat believe" the company's denial. The remaining 23.2 percent don't feel strongly either way.
While Microsoft says it supplies "customer data only when [Microsoft] receives a legally binding order or subpoena to do so, and never on a voluntary basis," according to Smith's response, what kind of data is actually being collected and shared?
More than half of the survey respondents (54.4 percent) believe Microsoft is providing the government access to "all personal and corporate data stored through Microsoft." Surprisingly, although the leaked allegations have pointed to cloud providers granting the NSA access to just metadata, only 10.1 percent believe this to be the case.
However, Microsoft isn't the only provider of which respondents are skeptical. Microsoft provides just as much data protection as other large cloud providers including Google, Amazon Web Services Inc. (AWS), Rackspace Inc. and IBM Corp., 60.2 percent of respondents say.
While it's understandable the disclosure of the NSA's surveillance activities has shaken IT decision makers' trust in cloud vendors, enterprises should be more concerned with the amount of transparency on the issue of data privacy coming from the federal government, says John Howie, chief operating officer of the Cloud Security Alliance (CSA), a non-profit consortium.
"Informed customers will likely understand that cloud providers are required by the laws of the countries in which they do business to reveal information to law enforcement when a valid warrant, court order or other legal document is produced, and that every cloud provider will respond only to lawful requests for access to data," Howie says. "There's likely more mistrust toward governments that request data than the cloud providers who are required to produce it. It's important to note that Microsoft, Google and others have asked governments worldwide for permission to publish some details about the requests made, such as the number and nature of requests, in order to be more transparent about the situation."
IT's Swift Reaction
Whether the mistrust lies at the feet of vendors or governments, the privacy implications have already had an impact on IT. One reader -- who requested anonymity, given the sensitivity of the issue -- says the government surveillance allegations have had a major impact on how his enterprise IT handles the cloud. "We don't have a whole lot of corporate data in the cloud. Thanks to PRISM we don't intend to place any more in the cloud, and will most likely remove what's already there," he explains.
Nearly half of those who responded to the survey appear to be reacting in a similar manner. When asked about current plans with regard to Microsoft cloud services, including Office 365, Outlook.com, Windows Azure and SkyDrive, 34.9 percent of respondents say their shop will "put some planned deployments on hold while assessing the situation." More alarming for the continual cloud growth trend is that 13.1 percent plan to bring cloud-stored data back in-house.
These findings also line up with a recent survey by the CSA, which found the information leaked by Snowden has led to 10 percent of non-U.S.-based participants canceling projects with U.S.-based companies like Microsoft, while 56 percent were less likely to use U.S.-based cloud providers.
For those willing to stick with Microsoft's cloud offerings, Redmond readers are divided on what actions to take. In an even split (50 percent), half say they're looking to increase encryption for data stored off-premises, while the other half will keep encryption levels the same.
This IT split on whether to increase encryption in the wake of PRISM clearly illustrates how many might be alarmed by the government's access to corporate cloud data -- yet also shows many are unsure how to proceed. According to survey respondents, the answer includes encryption of some sort. Security solutions -- including Microsoft BitLocker Drive Encryption, TrueCrypt, CipherPoint, the line of encryption services from Entrust Inc., and the third-party Mac encryption tool FileVault -- were all given mentions by survey participants on what they're currently contemplating for improving their corporate data privacy.
And others who already have encryption enabled are double-checking their security in the wake of the PRISM revelations. "Our data is already encrypted. We're double-checking to ensure that traffic between our datacenter and off-site recovery site is adequately protected," commented one survey respondent.
While more than half of respondents are either "very concerned" or "somewhat concerned" to learn of government surveillance activities of their cloud-based data, it appears IT expenditures continue to flow through cloud providers. Even after the Snowden leaks, 42 percent of respondents to our survey say their cloud budgets will remain at current levels. And in some cases, cloud expenditures will continue to rise. Almost one-fifth of respondents (19.8 percent) say their budgets will experience a minor increase, and 9.2 percent say a major increase in spending is expected.
Gary McGraw, author and CTO of Cigital Inc., a Dulles, Va.-based consulting firm specializing in software security, says many IT organizations are struggling to determine how to act in wake of the PRISM disclosures, and the disclosures have created a sense of mistrust between customers and IT services providers.
"The real problem here is that all U.S. companies are playing by the same secret rules," McGraw says. "They haven't been telling their customers what's going on, because they're all expressly forbidden from doing so. Customers are obviously ticked off about this. And they no longer believe what their vendors are telling them -- nor should they."
The Encryption Key
So what can IT do when it comes to data privacy in the cloud? Should shops start pulling cloud-hosted corporate data back in-house, as 34.9 percent of respondents are doing?
Users can still use cloud services from providers such as Microsoft and AWS as long as they're committed to encryption, says Paige Leidig, senior vice president of CipherCloud Inc., a cloud information protection firm based in San Jose, Calif.
"Enterprises can definitely still use cloud applications and stay secure and compliant," Leidig says. "The size of the provider actually doesn't affect the outcome. As the surveillance programs highlight, when it comes to protecting data on cloud applications, the best way is to go the ecosystem route. Users can layer additional protection controls on top of native security features from the cloud provider."
The layers added include encryption that covers your data at rest, in transit and in use, according to the CSA's recommended cloud best practices. This three-pronged approach ensures data is secured every step of the way.
Until recently, IT management has remained lax about coverÂing the bases on all three fronts. But businesses are finally catching on that encryption of data at rest and in transit isn't adequate -- encrypting data in use "is critical," says Elad Yoran, chairman and CEO of Vaultive, a New York-based data encryption firm focused on cloud security. "If one fails to encrypt data in use, it's like leaving the front door or window wide open," he says.
Microsoft has already stated that it's obligated to provide data to federal law enforcement agencies with the proper court orders. If the data sought can also be decrypted from the providers, end users could have no idea when law enforcement is targeting their data. Yoran warns that having these providers hold onto the keys takes the issue of data ownership out of the hands of the enterprise. "The rule with encryption is whoever controls the keys controls the data," he says.
While Microsoft doesn't require users to hand over encryption keys when using its line of cloud-based services, Yoran says this might not be true for all providers -- and those that do require holding onto the keys should be avoided.
Privacy Trumps National Security
Overall, readers participating in the Redmond survey don't view the PRISM surveillance program as a necessary cost for national security -- 71 percent say it's "an invasion of privacy and personal data." When asked why it was looked upon so unfavorably, the No. 1 answer was the lack of trust due to the culmination of misinformation and secrecy on the parts of both cloud providers and government bodies.
As the NSA leaks have dominated both the national and technology dialog over the past several months, President Barack Obama in August proposed allowing law enforcement agencies and services providers to become more transparent about government surveillance programs. However, without specifics on when and how this would work -- and whether President Obama could win congressional approval to enable such changes -- the secretive surveillance of cloud data looks to be a trend that will continue. And it's a trend not unique to the United States.
"It's important to note that the U.S. government is not the only government in the world that can and will make requests of cloud providers for data," says CSA's Howie. "The United Kingdom, for example, has very similar legislation to the Patriot Act, and with respect to the collection of communications metadata it should be understood that the European Union passed the Data Retention Directive [in 2006], which goes much further than the U.S. government appears to."
While a three-pronged encryption strategy with control over the keys will help to increase the amount of disclosure end users receive when their cloud-based data is accessed, it's up to those in IT to continue to keep the conversation about transparency and data ownership rights in the national discussion.
Fears Overblown?
Forrester Research Inc., pointing to the ITIF forecast that PRISM could cost cloud providers up to $35 billion by 2016, modeled a worst-case scenario where the true cost of PRISM to cloud services providers could total $180 billion, or 25 percent of overall IT services provider revenues, by that time frame.
Nevertheless, Forrester cloud computing analyst James Staten said in a mid-August blog post that, while this doomsday picture is possible, it'll only materialize if the mindset of people and business decision makers persists over the next three years -- a likelihood he sees as remote.
"Prior to today's media-hyped paranoia about government surveillance, corporate IT spending has been trending toward outsourcing for many years," Staten noted. "Few corporations have no data in the cloud, let alone no data with a hosting company, co-location provider or outsourcing firm."
And Staten doesn't see that changing over the long term, as business realities -- both economic and practical -- will necessitate the use of public cloud infrastructure and Software as a Service (SaaS) in order for businesses to deliver IT.
"The fact of the matter is that the IT services market is a part of our portfolios because it provides capabilities we value either against IT or business metrics," Staten noted. "And it's highly likely these values are worth more to you than the potential risk you think your company faces due to government surveillance. If your company is a prime target for government surveillance, you're probably being watched from within your own firewalls right now."