{"id":39,"date":"2011-06-09T22:52:36","date_gmt":"2011-06-10T02:52:36","guid":{"rendered":"http:\/\/blogs.bu.edu\/wing\/?p=39"},"modified":"2011-06-09T22:52:36","modified_gmt":"2011-06-10T02:52:36","slug":"interesting-debate-should-it-matter-where-data-is","status":"publish","type":"post","link":"https:\/\/blogs.bu.edu\/wing\/2011\/06\/09\/interesting-debate-should-it-matter-where-data-is\/","title":{"rendered":"Interesting debate: Should it matter where data is?"},"content":{"rendered":"<p>Google&#8217;s Chief Security Officer (yes, companies now have a CIO and a CSO), Eran Feigenbaum, stirred a debate recently when he questioned the obsession of the US (and other governments) about\u00a0data sovereignty in outsourced environments.\u00a0He is quoted as saying: <em>\u201cIt is an old way of thinking. Professionals should worry about security and privacy of data, rather than where it is stored.&#8221;<\/em><\/p>\n<p><a href=\"http:\/\/www.scmagazine.com.au\/News\/260041,google-who-cares-where-your-data-is.aspx\">http:\/\/www.scmagazine.com.au\/News\/260041,google-who-cares-where-your-data-is.aspx<\/a><\/p>\n<p>What do you think? Should it matter *where* data is stored (or for that matter where the pipes carrying it happen to be)? Assuming a cloud provider meets what it promises in its SLA (availability, persistence, proper authentication\/encryption, etc.), can you think of vulnerabilities that necessiates that data resides on &#8220;American Soil&#8221;?<\/p>\n<p>The other interesting statement by Google&#8217;s CSO regards the need for encryption of data at rest (i.e., on disk as opposed to end-to-end through an application):\u00a0<em> &#8220;It is a false sense of security. Crypto people do a good job at cryptography, but a really bad job at key management.&#8221;<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google&#8217;s Chief Security Officer (yes, companies now have a CIO and a CSO), Eran Feigenbaum, stirred a debate recently when he questioned the obsession of the US (and other governments) about\u00a0data sovereignty in outsourced environments.\u00a0He is quoted as saying: \u201cIt is an old way of thinking. Professionals should worry about security and privacy of data, [&hellip;]<\/p>\n","protected":false},"author":2093,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.bu.edu\/wing\/wp-json\/wp\/v2\/posts\/39"}],"collection":[{"href":"https:\/\/blogs.bu.edu\/wing\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.bu.edu\/wing\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.bu.edu\/wing\/wp-json\/wp\/v2\/users\/2093"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.bu.edu\/wing\/wp-json\/wp\/v2\/comments?post=39"}],"version-history":[{"count":3,"href":"https:\/\/blogs.bu.edu\/wing\/wp-json\/wp\/v2\/posts\/39\/revisions"}],"predecessor-version":[{"id":42,"href":"https:\/\/blogs.bu.edu\/wing\/wp-json\/wp\/v2\/posts\/39\/revisions\/42"}],"wp:attachment":[{"href":"https:\/\/blogs.bu.edu\/wing\/wp-json\/wp\/v2\/media?parent=39"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.bu.edu\/wing\/wp-json\/wp\/v2\/categories?post=39"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.bu.edu\/wing\/wp-json\/wp\/v2\/tags?post=39"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}