CIA Demolish Cloud Security Concerns: All Systems Go
It’s been one of the last mountains to climb for cloud computing. With the technology’s steady implementation over the last few years, as it has exponentially grown in size and popularity, it seems that one by one each drawback or wide commercial concern has been unceremoniously knocked down. As a result, more and more companies have headed cloudwards. Despite this though, many cloud skeptics still pace the floor and stroke their chins raising worries and issues chiefly regarding security; after all, storing your entire company in something that is not defined by a physical object is quite the leap to take. It seems though, the CIA has decided to change all that.
The news that the Central Intelligence Agency have opted for an incredibly weighty cloud contract with AWS is initially quite the shocker. One does not typically envisage the CIA utilizing the kind of services you or I might use, and upon hearing that they’ve done so, we may start to consider who their Broadband provider is, or if they get their shopping home delivered from Walmart. Still, idle day dreaming aside, whilst the information is worthy of a fervently raised eyebrow to say the least, when we start to think about what this might mean for cloud computing on a global scale, it becomes a lot more compelling.
The question is if the CIA, a department with an enormous amount of power, based on an enormous amount of knowledge, knowledge stored in data, data which is now kept in the cloud; if this operational method is secure enough for an intelligence giant, shouldn’t it be secure enough for all of us?
Indeed, security is going to have been a chief concern for the CIA when they were deciding how to store their data, and it’s pretty safe to assume they are not going to have taken the plunge without a heady bout of painstakingly meticulous research, that presumably gave them the confidence to say yes, and no doubt terrified the poor assistant making the sale.
Of course, the cloud brings other advantages that the CIA will no doubt be wanting to take advantage of; with their data stored where any operative or employee can get at it, that means the entire organization is suddenly more portable. It means they can keep a track of exactly what’s going on and why no matter where they happen to be; out in the field, in the office, or somewhere between the two as secret agents often are. Gus Hunt himself pointed out how the true worth of any information can be measured only by the corresponding information it’s connected to. “Since you can’t connect dots you don’t have, it drives us into a mode of, we fundamentally try to collect everything and hang on to it forever” he said, and what this means is, the CIA need to hold on to reams and reams of data for extended periods of time; in the commercial world, it’s big data they’re after.
So, the summary. Where does this news really lead? We’ve been talking about the explosion of the cloud for a long time, and whilst it sometimes feels like it’d be more closely associated with someone dropping a steadily increasing amount of those little things that went bang when you threw them on the floor then an explosion as such, this might usher in a reversal of that sentiment altogether. With many holding fire on making the leap due to security precautions, will this be the final endorsement of the cloud’s potential that those companies still waiting need? We will have to wait and see.
By Rob Vicars
This article was written by Rob Vicars on behalf of Giacom. For Hosted Exchange solutions that deliver a complete carry-through to the cloud, Giacom are the answer!
Note: CloudTweaks publishes news and opinion articles from several different contributors. All views and opinions in these articles belong entirely to our contributors as outlined in our disclaimer.
- Cloud Computing – The Game Changer - November 19, 2015
- Banking On Recurring Revenue In The Cloud - November 18, 2015
- Juniper Research: Top Ten Tech Predictions For 2016 - November 16, 2015
- On-Premise VoIP vs The Cloud - November 16, 2015
- 3 Steps To Ensure Third-Party Security With Your IoT Providers - November 13, 2015