Thoughts on Zoom

Thoughts on Zoom

The past few months have placed immense demand on remote working and particularly video-conferencing tools. This has placed greater scrutiny on the security practices of companies like Zoom which has received a great deal of press - resulting in better transparency and a commitment to its users for improving its controls.

Putting opinions and conjecture aside for a moment, Zoom’s current posture and response got me thinking - in particular, the following aspects were of interest to me:

Compliance

Without going into details around each of the security and privacy certifications, most organisations look for at least SOC2 and FedRAMP from their cloud service providers (various aaS offerings). Some organisations will not only choose these certifications as a baseline upon which to build their own GRC (Governance, Risk and Compliance) checks, but may end up using them as the only validation they do.

  • Do organisations place too much emphasis on compliance to standards without doing their own set of checks?

Data Sovereignty

The transfer and storage of data is without doubt a key design component when looking into cloud-based services - yet there are also numerous concerns around the supply chain that warrant investigation (when considering both the physical and virtual locations of endpoints):

Encryption

End-to-end encryption typically makes use of PKI (Public Key Infrastructure) to ensure data in transit and at rest is secure.

  • Have we taken stock of all forms of work/personal communication tools to see whether similar practices are followed? If they don’t, do we move towards safer tools or demand better security from the existing tools?
  • If end-to-end encryption is not deployed, should we look to ensuring that PFS (Perfect Forward Secrecy) ciphers are used to mitigate being able to store data and decrypt at a future point in time?

I don’t propose to know the answer to any of these questions, and I am not apologising for any of Zoom’s mishaps - I am interested in whether we are placing as much scrutiny across all the software and tools we use in our daily lives (without having to wait for a new article to reactively respond to our security posture).

I will certainly be keeping a close watch on the 90-day plan that Zoom has outlined. In particular I will look to seeing whether there are practices that they will be undertaking that I need to take into account myself (in terms of choice of software for personal use) as well as in conversations with my customers and partners (when discussing security aspects of their migration to public cloud and cloud-based services).

My team meetings stayed on Skype for conference calls. We used zoom for Friday fun. Trivia, knock-offs and karaoke. Pretty sure my singing would have been a deterrent for cyber eves dropping. Good read Shain. Yes I was just relying on standards and code of practice. I even took the sticky tape off my camera lol

回复
Javed W.

CISSP | CCSP | GCIH | GCFE | SABSA-SCF | ISO 27001LI

4 年

Great read Shain! What about Access Control? Is Zoom doing enough in that area? There were half a million Zoom accounts stolen a while ago. Account security with MFA for Cloud based services is a critical aspect which should not be Ignored.

Thought provoking read. Cheers Shain

Typically no one cares about most consumer cloud offerings until they creep into the enterprise space. iPhones to Zoom all started out as consumer lead tech. Once they became an avenue into the enterprise they became interesting to those that use their powers for bad instead of good.

Art Gassan

People don't just buy products; they buy the stories behind them. What's your story?

4 年

Really interesting! Thanks for sharing

要查看或添加评论,请登录

Shaineel (Shain) Singh的更多文章

社区洞察

其他会员也浏览了