You are on page 1of 12

Strategy Guide:

Data sovereignty
and security

Sponsored by
Contents

Data sovereignty awareness lacking in Australia pg3

Data sovereignty and the dangers of hosting data outside of Australia pg4

Do you know where your data is? pg7

Who watches the datacentre? pg10


Data sovereignty awareness
lacking in Australia
By Hamish Barwick

While the US Patriot Act may make many headlines Patriot Act and Australian Federal Police (AFP) can
for the legal authority it bestows on US agencies obtain information from companies or individuals at
to access data held in foreign countries, Australian their discretion.
companies need to be aware of similar legislation The Anti-Terrorism Act states that the AFP can
in both the US and Australia, according to security request information from any source about any
industry experts. named person including information about the
Forrester senior analyst, Michael Barnes, said person’s travel, residence, telephone calls and
Australian companies were right to be wary of placing financial transactions.
their data in the cloud as it could be accessed by US Legal experts have also expressed concerns with
authorities using the Patriot Act. the US Patriot Act. Connie Carnabuci, a partner of
In fact, recent research from Forrester indicated that the law firm Freshfields Bruckhaus Deringer, said that
among Australian companies not intending to adopt under the Act, US authorities have the ability to pass
the public cloud, the Patriot Act was cited as a major orders for the disclosure of non-US data that is stored
reason. However, Barnes said some Australians may outside the country. “The basis for that disclosure is
not be aware that US authorities had the power to that you have to establish a sufficient connection with
request data even without using the Patriot Act. the US,” she said.
“There are enough bilateral agreements between Carnabuci added that while the Act has a regime
the US and Australia that if the US wants something that allows companies to seek a formal subpoena,
for a particular purpose they can probably get it,” there is an “intrusive route” called the National
he said. Security Letter (NSL), an informal request for
Cloud security consultant, Rob Livingstone, said disclosure of information.
Australia’s Anti-Terrorism Act of 2005 is similar to the

pg3
Data sovereignty and the
dangers of hosting data
outside of Australia
By Carlo Minassian

Cloud is often presented as a cure-all for data But these concerns must not be pushed aside. Any
storage, because it combines ease of access with low organisation – government or private sector – that
cost. In addition, cloud offers the seeming security doesn’t become fluent in data security, is taking a
of housing precious information off-site in purpose- sizeable risk. This is especially true if that organisation
built facilities not susceptible to natural disasters and is based in Australia.
power outage. While there are numerous issues around cloud
This perception has become so widespread that and data security, I want to focus on two of the most
organisations, including many in government, are important: data sovereignty and the value of keeping
rapidly moving parts or all of their operations to the things onshore.
cloud. While there are indications that some of the
large early adopters, like IBM, are reconsidering the Foreign law
parameters (they recently forbade employee access to There is a strong out-of-sight/out-of-mind
Dropbox and Apple’s iCloud), the momentum to the component to the cloud. It might seem like stating
cloud is unlikely to be stopped, because the imagined the obvious, but when your data is in the cloud, it is
savings are just too attractive. actually a ‘resident’ of a particular country. As such,
Two years ago, the federal government in it is governed by the laws of that country and those
the United States began to urge its agencies to laws might be very different, and significantly less
embrace a ‘cloud first’ approach when it came to friendly, than those of Australia.
IT procurement. The goal was to lower costs, and Michael Chertoff, the former head of the US
today they are saving about US$5.5 billion every Department of Homeland Security, has argued
year. Given recent projections, if cloud first was forcefully that organisations that handle private
adopted even more widely, those savings would rise data should keep it onshore. Chertoff experienced
to US$12 billion – almost the equivalent of NASA’s first-hand how quickly data sovereignty can
annual budget. devolve into a legal wrangle that puts critical and
With numbers like this, it’s no surprise that cloud private information at risk. As a result of sweeping
is becoming so dominant. It’s also no surprise that antiterrorism legislation, US law required that
IT managers’ concerns are frequently shunted aside, international airlines provide access to traveller
especially when ‘hard’ savings numbers are information. From the European perspective,
weighed against security risks that are difficult – America was asking for protected information
if not impossible – to assign a dollar figure. about its citizens.
pg4
This situation led Chertoff to conclude that data requests, known as National Security Letters (NSL),
sovereignty and cloud goes well beyond protecting for such access to data.
classified information and military secrets. He made Similarly, enforcement of the DMCA has led to
a vivid point that can be applied to Australia: “At dramatic cloud-shutdowns like the Megaupload case
all levels of government, we store the working-day that should have made anyone using similar services
information that helps government function: email reconsider moving to another data storage solution.
exchanges, calendars and the like. The scope of After all, while Megaupload was targeted for music
our government’s data holdings is as wide as the and video piracy, a study by Palo Alto Networks
expanse and reach of government, and likely contains showed that the service had greater use on corporate
information that touches upon all aspects of American networks than Dropbox, YouSendIt and Box.net
life [including driver’s licences, real estate data, birth combined – all currently seen as ‘legitimate’
and death records, etc].” cloud providers.
Chertoff was saying that it’s easy to forget just Moreover, US-owned companies will also be
how big the scope of data storage is today. Some of forced to comply with these laws even if they are
it might be non-critical, but much of it is genuinely housing data in Australia. But the reality is that there
precious and needs to be treated like any other are many bilateral agreements between Australia and
commodity. Where that commodity is stored and who the United States. If the US wants particular data, that
has access to it matters a great deal. data will often be given to them on a silver platter,
Chertoff’s observations also apply to Australia, regardless of whether or not it is being housed in a
ironically in part because America’s own sweeping US-owned data centre.
laws make offshoring Australian data in the United But the issue of data sovereignty goes beyond the
States something to avoid. Both the Patriot Act and United States. Many leading organisations are starting
the Digital Millennium Copyright Act (DMCA) have to recognise that the country where data is stored is
shown just how data stored in the United States is critical. Financial organisations tend to be especially
vulnerable to law enforcement intrusions. sensitive to these issues because of regulatory issues.
The Patriot Act means that your data can be Andrew Stokes, Chief Scientist of Deutsche Bank
accessed and you probably will never know – in Global Technology, recently said, “There are so many
fact, in some cases, providers might not be allowed regulators and regulations – we need to be safe. Every
to tell their customers of such access. Moreover, US geography has its own unique sector and laws.”
companies usually readily comply with even informal
pg5
A familiar environment and have access to senior engineers in their
For most Australian organisations, there are time zones.
substantial advantages to storing data onshore in Arguably, the starting point for data security begins
an environment that is politically, economically, well before you start worrying about data sovereignty.
financially and even geologically stable and familiar. Government agencies and any organisation with
This involves business continuity (BC) concerns. After sufficient reason to care about data security need to
all, the organisation can better assess the robustness know that:
of data centres, especially when it comes to disaster • data is being identified, classified and protected
recovery (DR) scenarios. both physically and electronically;
The Brisbane floods and the bushfires in Canberra • any person who may handle the data has
drove the point home that you need your DR appropriate security clearances;
facilities in different locations, because having two • there is a defence-in-depth strategy in place;
data centres in the same geographical region can • threat detection and response, not just data
still lead to prolonged downtimes. But, again, on- protection, is practised; and
shoring allows for the organisation to assess the best • the three postulates of security (confidentiality,
approach from a DR angle. integrity and availability) are being enforced.
Additionally, on-shoring permits organisations While most, if not all, onshore cloud providers will
to benefit from strong local security certifications fall down on these counts, those organisations that
such as ASIO T4, DSD HP and PCI DSS, which are are scrupulous about their data can and should find
essential for the highest level of data protection. The private cloud providers that can meet their rigorous
‘human factor’ and physical proximity is also critical. specifications. The cost might be higher and the ROI
It matters that an organisation can see where their difficult to calculate, but data security means too
data physically resides, that they can visit data centre much to be lost in the current rush to the cloud.
sites, get to know the people delivering their services
pg6
Do you know where your data is?
By Lesley Meall

In the beginning, when cloud computing was all “This is a complicated area,” said Alistair
about public cloud services, many IT leaders held Maughan, a partner at the international law firm
back because of their concerns about the safety and Morrison Foerster.
security of their valuable and sensitive corporate data. The explosion in cloud computing has increased
But things change – well, some things. use of third-party service providers, and some of
Putting it in the hands of a third party – outside them in turn use other third-party providers to host
the firewall, on multi-tenant boxes – emerged as a and backup data, so its physical location can be hard
security risk too far in survey after survey, despite to pin down (a problem), as can the legislation that
widespread awareness of the cloud’s potential applies to it and the jurisdictions in which this can
to deliver business benefits, cost savings and apply (another problem).
strategic opportunities. “Generally speaking, the law that’s applicable
The cloud has evolved. Public clouds have been is the law of the country where the data controller
joined by private clouds, and hybrid clouds, and is located,” said Maughan; but there are some
other variations on the theme, and use of them exceptions (yet another problem).
is increasing. “There was controversy earlier this year when India
However, finance chiefs remain cautious. When issued rules that seemed to suggest that Indian law
a recent Deloitte survey found half of chief financial would apply to data processed by Indian providers on
officers using cloud computing or planning to within behalf of Western customers,” he said.
two years, a whopping 89 per cent were, perhaps Many cloud service providers and legal experts
understandably, still citing data security as their main worried that this would result in additional (and
reason for holding back. Meanwhile, uncertainty more restrictive) rules, on top of the national laws
about the location of data concerned just 44 per that already apply to personal data that is transferred
cent, and legal issues 40 per cent – and this may offshore from the UK, EU or US.
need to change.
pg7
Ignorance is no defence such as data security or sovereignty until there’s
“The Indian government has since clarified that this a problem.”
is not its intent,” Maughan said, but added that China Cloud computing allows you to abdicate
and the Philippines are among other countries that responsibility for a lot of the processes that would
are currently developing their own data privacy laws, otherwise need to accompany their use of computing
so IT leaders will need to monitor developments. resources, but this doesn’t include compliance with
The UK Data Protection Act 1988 (based on the data protection law; so users of cloud services must
EU Data Protection Directive 1995) has been around know the physical location of the servers on which
in one shape or another for quite some time, so their data is processed and stored.
awareness is high among affected organisations. “It’s as simple as asking the question,” Rachwald
But the Act’s stipulation that personal data should said.
not be transferred to a country or territory outside Although he warned that ensuring your service
the European Economic Area – unless that country provider is contractually obliged not to transfer the
provides an adequate level of protection – isn’t data to any other countries without prior consultation
always factored in to the decision-making process and agreement can be more of a challenge. Many
where cloud-based services are concerned. cloud service providers have one-size-fits all contracts
Sometimes this happens because the money comes and service level agreements that they are not willing
from departmental budgets, and is spent by people to vary.
who are not aware of the implications of their actions; Some cloud service providers do try to make
sometimes the ignorance is higher up the food chain. it easier for their customers to comply with data
“A minority of organisations are getting very protection legislation.
smart about incorporating information security and “When we expand from the United States into
sovereignty into their contracts with cloud-based Europe, we will have a data centre within the EU,”
providers,” reportedRob Rachwald, director of said Eric Webster, VP of sales with cloud business
security strategy with Imperva (a data and application continuity and disaster recovery specialist Doyenz.
audit and security specialist), and may even go as far “We have a worldwide agreement with Internap
as auditing their cloud-based service provider. and will be using their co-location data centre in
“It will get better, because it’s an evolutionary London,” he said, so the data of European customers
thing,” he said, but at the moment, most organisations of Doyenz will never leave the EU. The behemoth
are less evolved. “When you go into the cloud, it’s that is Amazon Web Services also has regional data
often because it’s cheaper, and you think you can centres across the world, that service only certain
forget about hardware and software,” he explained. geographies: the EU Region, for example, uses servers
“So a lot of organisations don’t think about issues that are physically located in Ireland.
pg8
The reach of governments explained (in its Online Services Trust Centre) just
However, there are scenarios where the location how long the arm of US law is – because the Patriot
of your data seems to impact less on its privacy and Act can be used to force US-owned companies to
security than the nationality of the organisation that is reveal EU citizens’ data, secretly.
storing or processing it. This revelation has troubled some Euro ministers
“The issue of whether a government or public including Sophie in’t Veld, Dutch MEP and vice-chair
authority can gain access to data that is located of the European Parliament’s Civil Liberties, Justice
outside their national jurisdiction is a hot issue right and Home Affairs committee, who is pushing
now,” said Maughan, because of the international for clarification.
reach of the US Patriot Act. “The European Commission should make it clear
“The US government can request information that that European businesses and citizens operate under
is under the jurisdiction or control of a US company,” European privacy laws, and that EU institutions can
he explained, regardless of the physical location of enforce their own laws,” she asserted in a blog on
the data or the nationality of its owners – and it can her party website. She suggested that EU subsidiaries
do this in a way that seems to undermine the US-EU of US parent companies are breaking European law
Safe Harbour Framework. by meeting Patriot Act requests, and that while these
Safe Harbour was introduced as a companion subsidiaries are operating in Europe, EU law must
to the EU Data Protection Directive (and national take precedent.
implementations such as the UK Data Protection Act) Maugham doesn’t see the balance of power tilting
in 2000. Since then, it has allowed for the sharing quite so heavily in the direction of the US.
of data between the EU and US, but only when “The UK government as well as most EU member
certain conditions are met – such as the provision of state governments can also go to court and get a
reasonable data security – and this is accompanied subpoena to access data from any organisation over
by clearly defined and effective enforcement which they have jurisdiction,” the lawyer pointed out.
(because the EU has higher data privacy standards “So while the focus is on the US Patriot Act,
than the US). most EU member state governments have very
But earlier this year, when Microsoft launched similar powers.”
its cloud-based Office 365 service in the UK, it
pg9
Who watches the
datacentre?
By Patrick Budmar

The proliferation of datacentres around the world Working for the man
has made the Cloud not only accessible, but also Because of the data sovereignty issue, it has meant
affordable in the process. However, the issue of data that datacentres have had to be established locally to
sovereignty, the location of where the data is stored, meet the demands of governments operating in the
has been an inhibitor. region. However, Verizon Business Asia Pacific Cloud
In particular, data sovereignty has been a sticking and IT solutions practice manager, Ray McQuillan,
point for governments and their data, but as APC by points out that that the localisation of stored data is
Schneider Electric Pacific vice-president, Paul Tyrer, not the only attraction for governments to work with
points out, many highly regulated organisations, such local providers. “From a network perspective, latency
as those in the financial sector, are also concerned. is a major factor attracting governments to choose
“The risks and benefits of controlling your own local datacentres,” he said. “Having performance of
datacentre versus outsourcing to a co-located their systems nearby, and not having to worry about
provider have been debated by the industry in detail,” being thousands of miles away worrying about
he said. issues impacting user experience, is a decisive factor
According to Zettagrid general manager, Nicki for governments.”
Pereira, the hesitation by government to delve head- The other benefit that McQuillan sees in having
first into the Cloud can also be attributed to the data onshore is that it gives them the assurance that
relative newness of the technology. their business is being conducted domestically and
“The transition to the Cloud is still in its infancy within reach.
and there are many unknowns regarding data “Scalability and feet-on-the-ground also allow for
sovereignty,” he said. “The lowest risk option is to deeper relationships between them and their local
specify that data should remain under Australian providers,” he said. “It also provides a face-to-face
sovereignty prior to any adverse situations arising.” accountability and a compelling story around disaster
As such, Pereira expects that governments want recovery and business continuity.”
the ability to “step in” in the event that something Additionally, if a local provider has a “critical
should happen. mass of customers nearby,” McQuillan sees this
pg10
as providing another layer of reassurance to differing privacy laws needed to be addressed,”
governments, which allows for “greater confidence in he said.
the chosen local provider to deliver its services and But why is the government so sensitive about
that it will be there for a long time.” its data? HP South Pacific Government chief
Having strong local security certifications, such technology officer, Scott Cassin, sees it coming down
as ASIO T4, DSD HP, and PCI DSS, is something to avoid compromising citizen data and critical or
that Earthwave founder and CEO, Carlo Minassian, sensitive information.
sees as being essential in attracting work from a “Security vulnerabilities may reside or infiltrate
domestic government. In particular, Minassian cannot at the system, application and code levels,” he
understate the importance of the “human factor” and said. “Thus, Australian government agencies need
physical proximity. to consider if datacentre services meet Australian
“It matters that a government agency can see national security standards.”
where their data physically resides, that they can visit According to Cassin, these standards are quite
datacentre sites, get to know the people delivering thorough and extend to security clearance of
their services and have access to senior engineers in personnel, the physical security of the site and
their time zones,” he said. building access controls, and information security.
“The Australian government defines these standards
Cloud concerns
through the Information Security Manual, as part of
Just because a datacentre is located locally does
its overall Protective Security Policy Framework,”
not mean that governments have no other issues to
he said.
be wary of. In fact, Victorian Privacy Commissioner,
Network security, performance, availability and
Anthony Bendall, recently discussed some of the
reliability are all key factors that governments may
security concerns that he saw with Cloud computing.
consider when regarding offshore services, but Cassin
What stood out for Equinix Australia country
warns that Australian government agencies should
manager, Tony Simonsen, were the concerns Bendall
first understand the legal implications of this before
had beyond the obvious concerns of lack of control
pushing ahead.
over stored data and privacy at overseas Cloud
“The law of the country where the data resides will
service providers. “When government agencies
take precedence regardless of Australian requirements
consider moving information and services to the
or laws,” he said.
Cloud, Bendall felt that questions of data security,
accountability in the case of a data breach, and
pg11
Securing sensitive data keep attackers out, with a drawbridge over the moat
In additional to physical security, datacentres are to let people in and out.
also getting attacked electronically via external hacks. “But now the attacks are coming in from the air,
F5 Networks Australia and New Zealand managing so the drawbridge and the moat don’t help you
director, Kurt Hansen, sees the cyber attacks on anymore,” he said. “You still need the drawbridge
datacentres not just being at the network layer and the moat in the datacentre, but you also need air
anymore, but distributed denial-of-service (DDOS) defences now.”
attacks targeted at the firewalls that protect them. In the past, Oracle Australia government,
“We’re seeing an increasing amount of attacks on education and health applications general manager,
Web services and on the application layer,” he said. Ian McAdam, has seen local regulations around
“That is what has driven us to have network, DDOS data sovereignty somewhat hindering public and
and a datacentre level protection.” financial sector customers from moving ahead with
What Hansen is seeing as the issue now is that the Cloud computing.
attacks are occurring at a Web application level, and “Organisations worldwide have ranked IT
that has become a “real concern” for governments. security as one of their top priorities as increasingly
“Enterprises have been putting their core sophisticated attacks, new data protection
applications online for many years, but governments regulations, and most recently insider fraud and data
only started a few years ago,” he said. “But as they breaches, threaten to disrupt and irreparably damage
put more and more of their processes online to cut their businesses,” he said.
operational costs, those processes and information However, the evolution of the industry as a whole
they want to share with customers can now be the has meant that providers are able to overcome their
subject of attacks at an application layer.” concerns and meet specific demands through robust
The increasing sophistication and the frequency Cloud solutions hosted at local datacentres.
and diversity of attacks has meant that traditional As such, the providers that McAdam feels are the
network firewall protection of datacentres is seen as most successful are those which “uniquely safeguard”
somewhat outdated and ineffectual. a customer’s information throughout its entire
Hansen compares this situation to the olden days lifecycle and help organisations achieve “security
when a moat would be installed around a castle to inside out”.
pg12

You might also like