January 3, 2011

Wikileaks: Was Amazon’s action justified?

By Sourya Biswas

Wikileaks: Was Amazon’s action justified? Wikileaks has been grabbing headlines across the globe, and has divided the world into those who laud it for standing up to free speech and others who decry it as detrimental to the national security of the United States. Without being judgmental, we present some of the issues related with […]

Wikileaks: Was Amazon’s action justified?

Wikileaks has been grabbing headlines across the globe, and has divided the world into those who laud it for standing up to free speech and others who decry it as detrimental to the national security of the United States. Without being judgmental, we present some of the issues related with cloud computing that this drama has brought to light.

The Wikileaks controversy and the subsequent action taken by certain cloud computing service providers like Amazon has brought focus to the need for an industry-wide approach to service level agreements and codes of practice.

While Amazon said that Wikileaks had violated the terms of service and hence they were justified in denying service, there have also been criticism on its actions, with Dr. Joseph Reger, Chief Technology Officer for Fujitsu Technology Solutions, going on record saying,

Cloud computing’s reputation has been damaged.”

Dr. Reger said that Amazon’s action “is bad news for the new IT paradigm of cloud computing. If a provider can terminate its service that easily, then it is doing exactly what skeptics expect, putting the security and availability of cloud services into question.”

“Many potential customers for cloud computing services will, I fear, have been paying attention and will now be forced to reconsider whether they can afford to make their IT that dependent on a third party. Cloud-computing’s reputation has been damaged. For IT, this is the real tragedy,” he remarked.

Dr. Reger said that Wikileaks may have actually violated the terms of service but that was not something that Amazon should decide on, but rather a court of law. He said that this scenario had introduced a new threat to company data – while earlier they feared threats from hackers, now they would potentially fear the cloud computing Service Providers as well. He cautioned customers of cloud computing services to be extra careful when reviewing their service agreements with the providers of such services.

As for Amazon, it has responded to allegations of impropriety with the following statement on its website:

“Amazon Web Services (AWS) rents computer infrastructure on a self-service basis. AWS does not pre-screen its customers, but it does have terms of service that must be followed. WikiLeaks was not following them. There were several parts they were violating. For example, our terms of service state that “you represent and warrant that you own or otherwise control all of the rights to the content… that use of the content you supply does not violate this policy and will not cause injury to any person or entity.”

It’s clear that WikiLeaks doesn’t own or otherwise control all the rights to this classified content. Further, it is not credible that the extraordinary volume of 250,000 classified documents that WikiLeaks is publishing could have been carefully redacted in such a way as to ensure that they weren’t putting innocent people in jeopardy. Human rights organizations have in fact written to WikiLeaks asking them to exercise caution and not release the names or identities of human rights defenders who might be persecuted by their governments.

We’ve been running AWS for over four years and have hundreds of thousands of customers storing all kinds of data on AWS. Some of this data is controversial, and that’s perfectly fine. But, when companies or people go about securing and storing large quantities of data that isn’t rightfully theirs, and publishing this data without ensuring it won’t injure others, it’s a violation of our terms of service, and folks need to go operate elsewhere.

We look forward to continuing to serve our AWS customers and are excited about several new things we have coming your way in the next few months.”

By Sourya Biswas

Sourya Biswas

Principal Security Consultant at NCC Group

13+ years of experience in Client Engagement, Business Development, Project Management and Management Consulting in the Information Security & Risk Management and IT Strategy domains.

250+ articles on Cloud Computing, technical editor of a reputed textbook.

MBA (double major in Consulting & Business Leadership) on full scholarship from Notre Dame, Bachelor's engineering degree in Information Technology from a top 10 engineering institute in India.

Professional certifications include the CISSP, CISM, PMP, PSM and several ITIL Intermediates.
Steve Prentice

Get Smarter – The Era of Microlearning 

The Era of Microlearning Becoming employable and then staying employable requires ongoing, up to date [...]
Read more

Lambda Cold Starts: What They Are and How to Fix Them

What Are Lambda Cold Starts? Lambda cold starts occur when AWS Lambda has to initialize [...]
Read more
Steve Prentice

Episode 19: Why AWS Needs to Become Opinionated about FinOps

On today’s episode of the CloudTweaks podcast, Steve Prentice chats with Rahul Subramaniam, CEO at CloudFix [...]
Read more

5 Azure Cost Management Strategies

What Is Azure Cost Management? Azure cost management refers to the practices and processes that [...]
Read more
Katrina Thompson

Why Zombie APIs are Such an Important Vulnerability

Zombie APIs APIs have a lifecycle, the same as anything else. They are born, they [...]
Read more
Jeff DeVerter

Charting the Course: An Interview with Rackspace’s Jeff DeVerter on AI and Cloud Innovation

Rackspace’s Jeff DeVerter on AI & Cloud Innovation In an insightful conversation with CloudTweaks, Jeff [...]
Read more

SPONSORS

Interviews and Thought Leadership

Michael Kleef

Akamai’s Michael Kleef Reveals Key Shifts in Cloud Computing Landscape

Welcome to a conversation with Michael Kleef, Vice President of Product Marketing, Developer Advocacy, and Competitive Intelligence at Akamai Technologies. Today, we’re privileged to have him share his insights with [...]
Read more

AI at the Gate: Navigating the Future of Cybersecurity with SonicWall’s Bobby Cornwell

Navigating the Future of Cybersecurity In the face of the digital age’s advancements, AI’s role in cybersecurity presents both innovation and challenges. CloudTweaks welcomes a Q&A with Bobby Cornwell, Vice [...]
Read more

Top Cloud Cost Optimization Strategies for Multi-Cloud Environments

The age-old saying “Don’t put all your eggs in one basket” has found a new resonance in today’s cloud landscape. [...]
Read more

CrowdStrike and Dell unleash an AI-powered, unified security vision

Dell and CrowdStrike are joining forces today to help businesses battle against cyberattacks using AI to protect against generative AI, stealth social engineering and [...]
Read more

Navigating Tomorrow: AI and Big Data as Catalysts for Smarter Governance

The Future of Governance In a world increasingly shaped by big data and artificial intelligence (AI), it’s curious why these [...]
Read more

SPONSOR PARTNER

Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!
© 2024 CloudTweaks. All rights reserved.