{"id":3,"date":"2011-06-09T09:38:23","date_gmt":"2011-06-09T13:38:23","guid":{"rendered":"http:\/\/blogs.bu.edu\/best\/?p=3"},"modified":"2011-09-05T10:11:48","modified_gmt":"2011-09-05T14:11:48","slug":"interesting-debate-should-it-matter-where-data-is","status":"publish","type":"post","link":"https:\/\/blogs.bu.edu\/best\/?p=3","title":{"rendered":"Should it matter where data is?"},"content":{"rendered":"<p>Google\u2019s Chief Security Officer (yes, companies now have a CIO and a CSO), Eran Feigenbaum, stirred a debate recently when he questioned the obsession of the US (and other governments) about data sovereignty in outsourced environments. He is quoted as saying: <em>\u201cIt is an old way of thinking. Professionals should worry about security and privacy of data, rather than where it is stored.\u201d<\/em><\/p>\n<p><a href=\"http:\/\/www.scmagazine.com.au\/News\/260041,google-who-cares-where-your-data-is.aspx\">http:\/\/www.scmagazine.com.au\/News\/260041,google-who-cares-where-your-data-is.aspx<\/a><\/p>\n<p>What do you think? Should it matter *where* data is stored (or for that matter where the pipes carrying it happen to be)? Assuming a cloud provider meets what it promises in its SLA (availability, persistence, proper authentication\/encryption, etc.), can you think of vulnerabilities that necessiates that data resides on \u201cAmerican Soil\u201d?<\/p>\n<p>The other interesting statement by Google\u2019s CSO regards the need for encryption of data at rest (i.e., on disk as opposed to end-to-end through an application): <em>\u201cIt is a false sense of security. Crypto people do a good job at cryptography, but a really bad job at key management.\u201d<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google\u2019s Chief Security Officer (yes, companies now have a CIO and a CSO), Eran Feigenbaum, stirred a debate recently when he questioned the obsession of the US (and other governments) about data sovereignty in outsourced environments. He is quoted as saying: \u201cIt is an old way of thinking. Professionals should worry about security and privacy [&hellip;]<\/p>\n","protected":false},"author":2093,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=\/wp\/v2\/posts\/3"}],"collection":[{"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=\/wp\/v2\/users\/2093"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3"}],"version-history":[{"count":2,"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=\/wp\/v2\/posts\/3\/revisions"}],"predecessor-version":[{"id":16,"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=\/wp\/v2\/posts\/3\/revisions\/16"}],"wp:attachment":[{"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}