Law Society Bulletin - June 2022

Page 24

CLOUD COMPUTING

An Analysis of the Law Society of South Australia’s Cloud Computing Guidelines: Data Security MARK FERRARETTO, SOLICITOR, EZRA LEGAL

T

his is the third of five articles that analyse the Law Society’s Cloud Computing Guidelines against candidate cloud systems and on-premises systems. My thesis is that the caution expressed in the Guidelines should be applied as much to on-premises systems as cloud systems to obtain the best risk profile for a practice’s information systems. In this article we discuss data security. Data Security This is where cloud services really shine. Ironically this is also the area which is usually of the greatest concern. The question to ask is whether a practitioner would prefer to delegate the security of their data to a provider with extensive resources dedicated to the maintenance of data security and the detection and resolution of security incidents, or to manage data security themselves, either directly or via an IT provider, neither of whom is likely to be a cybersecurity specialist. The resources and skills required to detect and protect against security intrusions is way beyond the capabilities of most IT providers. Cybersecurity has evolved to its own discipline and there exist businesses that specialise in cybersecurity management, most of whom are not engaged by legal practitioners to manage their IT infrastructure. Detecting an intrusion is itself very difficult. If an intrusion remains undetected, as many are, an intruder could usually remain, or ‘dwell’, in a compromised system for many many months.1 Cloud services encrypt data at rest (when it is stored) and in transit (when it is sent to a computer to use). Cloud providers usually have robust systems in place to ensure the keys used to decrypt data are not easily accessible.

24 THE BULLETIN June 2022

Table 3 Data Security ENCRYPTION ENCRYPTION EFFECT OF AT REST IN TRANSIT TERMINATION

CHANGE OF CONTROL

Yes

Yes

Will notify and Will notify and give opportunity to ‘outline your export data choices’

Dropbox Business Yes

Yes

Provision to export data after termination

Not specified

Google Workspace Yes

Yes

Access to data ceases on termination

Will give notice

Microsoft 365

Yes

Yes

Not specified

Not specified

LEAP

Yes

Yes

Data retained but inaccessible

Not specified

Actionstep

Optional, Yes on request

Delete data 30 days Not specified after termination

On Premises

No

N/A

Dropbox

No

Apart from Actionstep, all the service providers analysed for this paper encrypt data at rest and in transit. Actionstep does not encrypt data at rest by default but it can be requested. It is true that cloud services provide an easier target for intruders. However, this is offset by the increased security resources dedicated to detecting and mitigating this risk. On-premises data is almost always not encrypted, particularly on practice management servers and file servers. On-premises backups are also usually not encrypted and may not be stored in a secure location. An intrusion into an on-premises system carries significant risk of going undetected, and the intruder is likely to have access to unencrypted client information for an extended period of time.

N/A

Verdict In my view, cloud services do data security much better than on-premises services. Although cloud might be an easier target, this risk is in my opinion more than offset by the much higher level of cybersecurity skills present inside cloud firms (or at least the candidate firms discussed) than what exists in the onpremises context. Data security is a comprehensive win for cloud in my view. In the next article we discuss data resilience. B Endnotes 1 See eg: ‘Asia-Pacific Lags in Dwell Time, Study Reveals’, Security Intelligence <https:// securityintelligence.com/news/asia-pacific-lagsin-dwell-time-study-reveals/>.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.