Dear? privacy
David McAughtry, https://flic.kr/p/2aaJo22

Dear privacy

Only a few years after pay-per-use, the business world is facing a new shock: privacy has its price in the Public Cloud PaaS.

Basic privacy in the pre-Cloud world

Legacy information systems have always taken basic privacy for granted, for the simple reason that premises are not shared with anybody: everything is privately owned and dedicated. For a Business owner, consuming IT implies that privacy concerns are already built-in; they are not subjected to extra fees.

The legacy model does not prevent more elaborated forms of privacy breaches like unauthorized staff accessing the data, but at least the staff is briefed, trained, and is reporting to a management line. 

The pre-Cloud world also includes outsourced IT activities: in this situation it is usually not possible to have fully dedicated hardware (the network layer is a typical example), but at least the workload-running hardware can be dedicated. Custom contracts with strong oversight guarantees on the outsourcing provider help keep basic privacy a closed circuit matter. The perception CIOs and CFOs have had on outsourced activities is that it is a prime way to make savings (since the buildings and the outsourcer’s staff are shared across several tenants).

The new world

The advent of the Public Cloud and its pay-per-use model is shaking on-premises and outsourced models. IT infrastructure, whether insourced or outsourced, has joined the ranks of liabilities next to data centers in the mind of IT executives and pets have become cattle in the mind of developers.

This trend opened up avenues for refocusing the IT workforce towards more business-centric/resilient/frugal activities. How has basic privacy fared in this new world? Two interesting things happened in a short time frame...

Cloud privacy in the early days

In the first years of IaaS and PaaS, privacy concerns were addressed thanks to co-residents segregation (compute isolation, data & flows encryption, security groups, private IP addressing) and per-resident connectivity (Express Routes, Direct Connects, site-to-site VPNs).

That sounded like a good start, but

Cloud providers did not anticipate the need for customers to prevent data exfiltration and public endpoints exposure.

Consequently, pay-per-use was biased because it did not account for novel privacy needs tightened to the very nature of Public Cloud computing.

Some corporations compared their IT capital and operational expenditures (let's call this cost c-infinite, for future reference and to express that one cannot imagine to pay more) with pay-per-use (let's call it c-zero in contrast, to express the hope for huge savings): they came to the misleading conclusion that the Public Cloud was even cheaper than it really was and hastily shifted their workloads to the Cloud. Other corporations, however, shied away from the Public Cloud when it came to manipulating sensitive data because they spotted the privacy gap between on-premises and in-Cloud.

Regulators did not remain idle either: with privacy abuses being more and more advertised, new impact assessments on both ‘basic privacy’ and ‘elaborated privacy’ sprouted all over the world (FEDRAMP, GDPR, ..., California's CCPA being the latest one)

This put huge pressure on businesses running a high concentration of consumer data like the Cloud providers themselves: they were fast to understand and work on the issue.

Cloud privacy as of today

As a result, Azure and AWS started to release train after train of basic privacy-preserving features (the following links refer to the LinkedIn articles I published when the features were released): Azure firewall, Azure Policy, Azure Private Link Services, Azure PIM, Azure Lockbox, Azure Confidential Computing, AWS Resource policies, AWS VPC Endpoints and Gateways, AWS VPC ingress routing, AWS Nitro enclaves.

All these candy bags do not come for free, though: in most of the examples cited above, processing power must be brought about, maintained and able to scale in or out within short notice.

In terms of pay per use, this means a fixed price plus a variable price. We will name the incurred cost c-one. (Recall that c-zero represents the exact same model but without privacy). The variable part depends on many parameters but there is one that stands out for our discussion, let me call it the friction: the more workloads you have transformed, the more inter-dependencies you are likely to have knit on and off premises, and the more traffic you are now likely to carry. This increase is not linear, it depends on the square of n, where n is the number of intertwined applications. Friction is a weight on your bill that is not specific to privacy-friendly services, but they are quite sensitive to it.

No alt text provided for this image


The privacy shift

Should basic privacy-related expenses have been known right from the beginning of the Cloud adventure, executives would have not gnashed their teeth so loudly (the unpleasant sound is precisely to be heard at the privacy shift point in the diagram below).

No alt text provided for this image

Now that Cloud providers have reached a good level of maturity as far as basic privacy is concerned (and also a good level of 'elaborated privacy', but this is another matter), it should accelerate the transformation, not slow it down.

Educate your executives if you can, but for your own good don't show them the diagrams...

要查看或添加评论,请登录

Christophe Parisel的更多文章

  • Adversarial lateral motion in Azure PaaS: are we prepared?

    Adversarial lateral motion in Azure PaaS: are we prepared?

    Lateral motion techniques are evolving in PaaS, and we should be worried. Let's discuss a risk confinement approach.

    18 条评论
  • How will Microsoft Majorana quantum chip ??compute??, exactly?

    How will Microsoft Majorana quantum chip ??compute??, exactly?

    During the 2020 COVID lockdown, I investigated braid theory in the hope it would help me on some research I was…

    16 条评论
  • Zero-shot attack against multimodal AI (Part 2)

    Zero-shot attack against multimodal AI (Part 2)

    In part 1, I showcased how AI applications could be affected by a new kind of AI-driven attack: Mystic Square. In the…

    6 条评论
  • Zero-shot attack against multimodal AI (Part 1)

    Zero-shot attack against multimodal AI (Part 1)

    The arrow is on fire, ready to strike its target from two miles away..

    11 条评论
  • 2015-2025: a decade of preventive Cloud security!

    2015-2025: a decade of preventive Cloud security!

    Since its birth in 2015, preventive Cloud security has proven a formidable achievement. By raising the security bar of…

    11 条评论
  • Exploiting Azure AI DocIntel for ID spoofing

    Exploiting Azure AI DocIntel for ID spoofing

    Sensitive transactions execution often requires to show proofs of ID and proofs of ownership: this requirements is…

    10 条评论
  • How I trained an AI model for nefarious purposes!

    How I trained an AI model for nefarious purposes!

    The previous episode prepared ground for today’s task: we walked through the foundations of AI curiosity. As we've…

    19 条评论
  • AI curiosity

    AI curiosity

    The incuriosity of genAI is an understatement. When chatGPT became popular in early 2023, it was even more striking…

    3 条评论
  • The nested cloud

    The nested cloud

    Now is the perfect time to approach Cloud security through the interplay between data planes and control planes—a…

    8 条评论
  • Overcoming the security challenge of Text-To-Action

    Overcoming the security challenge of Text-To-Action

    LLM's Text-To-Action (T2A) is one of the most anticipated features of 2025: it is expected to unleash a new cycle of…

    19 条评论

社区洞察

其他会员也浏览了