The cloud is 100% safe

The cloud is 100% safe

You get more attention, when you state something not expected. It is important, that you prove this statement later, otherwise you are a liar.

Here an example from my past, which shows, what I mean. In 1996, we began to sell in Germany a no-name product, running on a Tetris-Game-Computer, a Windows 95 PC: SolidWorks. Our top cold call pitch was at that time: ?Imagine, you get 80% of the functionality of PRO/Engineer for 20% of its price." The skepticism was big. Those, who dared to come into my office, saw the proof.

Coming back to my header : ?Your data are 100% safe in the Cloud.". Is Zsolt telling fairy tales?

Let's analyze the cloud and neighbored resources. What are the facts? Looking into a typical workflow of a desktop-cloud combination, there are 4 stops:

- The user creates data, maybe also files.

- A computer with a hard drive saves, especially for 3D CAD users, data on the local drive due to performance issues.

- An Internet connection delivers the results and files to the cloud.

- The cloud drive, the cloud application, gives the outside world the possibility for access to relevant data.

These stops lead to the 4 danger zones, the entry for data thieves:

- Crack the user

- Crack the local drive

- Crack the Internet connection

- Crack the cloud

Es wurde kein Alt-Text für dieses Bild angegeben.

Let's have a look onto the 4 possible entries.

The central point : the Cloud

Providers of cloud applications and -storage are highly professional.

Let us look first on banks. Around the entrusted data, money and processes, they get from their customers, they build a Fort Knox. Who ever lost money caused by an IT failed transaction?

This is the same with providers running ERP applications like SAP S/4HANA Cloud or sales applications like Salesforce. Banks and ERP providers use already a long time outsourced systems and the cloud. There are no concerns of misusage of data.

If a hacker has the choice between a Fort Knox of a specialist like Amazon Web Services or the own infrastructure of a normal end user company, their choice is easy. An analogy from daily life: When a housebreaker is in front of a row of houses and sees at one house special security mechanisms and at the other one none - guess, where he enters?

An additional safety mechanism, an additional lock, which leads to nearly 100% safety, can be following: If the thief steals a database or parts of it, he does not own the key to the data. He needs a desktop application, which opens for him the data on his own machine.

Onshape, a great cloud application for CAD and PDM, does not provide any desktop or separately installable application. I do not know whether it is the same with SAP S/4HANA Cloud or Salesforce.

The theft on the data road : the Internet connection

The data are more safe, if they are living encrypted in a Fort Knox, in a database structure in the cloud, like in SAP S/4HANA and Salesforce than as files living anywhere. Onshape design data are also stored encrypted in database tables.

There are no files or total datasets, which can be stolen, only single records. These fragments are worthless without the key, the Onshape application in the cloud.

In opposite every file transfer, also replications of archives in multi-site PDM environments is an invitation for data thieves

Es wurde kein Alt-Text für dieses Bild angegeben.

The local theft opportunity : the hard drive

The best security is, there is nothing to steal. If the local hard drive does not contain any Intellectual Property, any files, any design, there is no entry for thieves.

Es wurde kein Alt-Text für dieses Bild angegeben.

The hostage of the user: Social Engineering

There is an interesting article of an old Dassault college, Alex Bruskin: ?Stealing data from inside the firewall, which includes manipulating "good" authorized users into divulging their credentials by "social engineering" attacks; acquiring "bad" users via insider threat path; acquiring read-only database credentials (which are often left unchanged for years); or acquiring database credentials baked into other programs."

The user is a not to be neglected entry point in every infrastructure, in any company internal IT environments and into the cloud.

There are two main entries here, the intended transfer of login data and the non-intended, e.g. with the help of Phishing. Various tools, like 2-factor authentication and forced, frequent change of passwords, are in usage. The mindset and knowledge of the user is also a barrier for serious damage. Have a look onto this interesting article of Kaspersky about Social Engineering.

The cloud database and application, e.g. that one on the AWS Server in Ireland, is an impregnable fortress. The commands and fragments of information going through the Internet, are useless for the thief.

The local drive is not anymore the place, to store Intellectual Property.

The human danger zone: Silliness in handling data and criminal energy is inherent in some people. Only mechanisms to protect them from themselves help.

Using good, 100% for the Cloud engineered database applications minimize the danger coming from the described 3 IT influenced zones so far, that the safety is very near to 100%, maybe 99,xxx %.

要查看或添加评论,请登录

Zsolt Engli的更多文章

  • Cloud = Cloud?

    Cloud = Cloud?

    How is it possible to differentiate #cloudnative from cloud-enabled #CAD, #PDM and #PLM solutions? I look at this…

    11 条评论
  • 120 CAD Themen, die man lieber ausl?sst

    120 CAD Themen, die man lieber ausl?sst

    Bist Du ein CAD Anwender oder Administrator ? Dann kommen Dir sicherlich einige dieser 120 Probleme bei der Anwendung…

  • One week design - five weeks collaboration: waste of time

    One week design - five weeks collaboration: waste of time

    I took this header from a quote of Manish Kumar, CEO of SOLIDWORKS brand inside Dassault, from below mentioned article.…

  • Fall down from the Cloud: Cloud usage without Internet?

    Fall down from the Cloud: Cloud usage without Internet?

    Absturz aus der Wolke: Cloud Nutzung ohne Internet? Fall down from the Cloud: Cloud usage without Internet? This…

    3 条评论
  • Design Data in the Cloud 100% safe? | Konstruktionsdaten in der Cloud 100% sicher?

    Design Data in the Cloud 100% safe? | Konstruktionsdaten in der Cloud 100% sicher?

    Sind Cloud-basierende PDM Plattformen, die die Organisation von Konstruktions-DATEIEN regeln, nahezu 100% sicher? Nein.…

    1 条评论
  • Warum von SolidWorks nach Onshape wechseln?

    Warum von SolidWorks nach Onshape wechseln?

    Diese Frage haben mir viele gestellt, nachdem ich Michael Falkensteiner von Onshape/PTC am 21.9.

    13 条评论
  • What is Concurrent Engineering?

    What is Concurrent Engineering?

    The idea of Concurrent Engineering, the simultaneous development of products, is based on the idea, that many…

    2 条评论
  • With a handcart, you cannot reach the moon

    With a handcart, you cannot reach the moon

    The provocation in the title shows the main message of this article: To reach a dedicated goal you need the right…

  • ADVANTAGES and SAFETY with Cloud CAD+PDM

    ADVANTAGES and SAFETY with Cloud CAD+PDM

    (German version below) I am highly convinced, that the CAD+PDM and PLM world experiences big advantages with Cloud and…

    6 条评论
  • The earth keeps spinning ! Good bye SolidWorks!

    The earth keeps spinning ! Good bye SolidWorks!

    After 25 years being part of the CAD revolution of 1995, I will leave after a longer quiet period Dassault. In 1985, as…

    135 条评论

社区洞察

其他会员也浏览了