
This July marked the second anniversary of the devastating Equifax data breach. Nearly 150 million consumers were frantic with worry that their sensitive information — including Social Security numbers and driver’s license numbers — was in the hands of unknown hackers. These high-profile data breaches have extreme reverberations; consumers are put at risk, and companies are forced to compensate. Equifax will likely end up shelling out up to $700 million.
Representatives in New York have now responded to this disastrous breach with a new law that executes much stricter liabilities on companies that handle private consumer data. Subsequently, it provides more protection and transparency for New York consumers. Enter the New York Stop Hacks and Improve Electronic Data Security (SHIELD) Act, which the legislature passed on July 25th after being signed by Governor Andrew Cuomo.
The law, which will take effect on March 21st, 2020, has strict implications for businesses around the world who hold data from New York residents. The Act amends New York’s current data breach notification laws by expanding the legal definition of a “breach” and setting new rules for the way the state handles breaches. It also enforces rigorous penalties on companies that experience breaches of private consumer data — violations can result in fines up to $250,000.
So, what does this mean for you?
We’ve put together a comprehensive guide for you detailing what you need to know about the New York SHIELD Act and how to protect your AWS cloud infrastructure from breaches.
Any breach of security must be disclosed without unreasonable delay to any New York resident whose private information was accessed or acquired by an unauthorized person. Your business needs to comply if you hold private digital data belonging to a resident of New York, even if you don’t do business in New York. So, this law has global implications — similar to the EU’s GDPR. Here are the newest updates produced by the law.
The definitions are changing
The law requires businesses to implement more security measures
Penalties
Many companies trust cloud service providers, like AWS, with a considerable amount of private consumer data. Consequently, cloud services are a huge target for attackers. Here are some tips to prevent a disastrous (and costly) shutdown.
Gartner’s Magic Quadrant has ranked Amazon Web Services (AWS) as the top Infrastructure as a Service (IaaS) provider for eight years. However, with the ever-increasing abundance of attackers, you must take the proper security measures to lessen the impact of a hacker — and avoid gross negligence accusations. Here are five of our prescribed best practices for behaving responsibly.
Know your liabilities
If you are utilizing a cloud service, such as AWS, for the storage of consumer data, it is critical that you gain a clear understanding of where Amazon's responsibility ends and where yours begins. AWS and other cloud service providers consider security to be a shared responsibility between themselves and the customer —in this case, your business.
For example, AWS is accountable for defending its infrastructure against attackers, detecting abuse and responding to incidents. As an AWS user, you are responsible for the proper configuration of your cloud environment, controlling access and monitoring for misuse. Read and understand the shared responsibility model — it’s vital that you identify who is liable if something goes wrong in your cloud environment.
Secure Identity and Access Management (IAM) access keys
IAM access keys are used to create and manage AWS users, so you need to assure that they are not vulnerable to being hacked. In addition to warranting that all users utilize multi-factor authentication for all logins, you must also not assign overly-permissive access. Only grant the permissions required for each user to perform their job.
IAM keys can also become vulnerable to hackers if you and your users do not rotate them regularly. Change your access keys at least every 90 days and implement a firm password policy to secure your user accounts and prevent unauthorized access.
Utilize tools offered by AWS
There is often a lack of security visibility in cloud infrastructure due to a significant number of applications, logins and activities happening at all times. It can be very challenging to ascertain who is accessing what and where.
AWS provides security services, such as CloudTrail, for customers to use for logging and monitoring user activities. When hackers get into your company's system, they may try to delete the logs in CloudTrail. To make sure you can quickly identify if unauthorized access has occurred, enable log file validation to trace changes to the log file, turn on access logging to track access requests and use multi-factor authentication.
Protect custom applications
IT security teams should participate in the development phase of custom applications to ensure end-user security. When working with apps, we recommend that you limit user privileges to prevent unrestricted access and enforce consistent data loss prevention policies across all applications and cloud Services.
Additionally, organize and order your custom applications so the security team can quickly identify possible weaknesses and determine which security controls should be used to protect them. Don't forget, highly-sensitive data — such as protected health and personally identifiable information should always be encrypted.
Enlist in a service to help.
Though these cloud service vulnerabilities will vary from business to business, there are many ways for companies to secure their customer's data and protect themselves from the implications of the New York SHIELD Act. AWS is a dominant cloud partner to many of the biggest companies, and if you follow our tips outlined above, you can take advantage of the many benefits the cloud has to offer.
Cloud Shield Pro will help you maintain a secure and healthy cloud by discovering suspicious activity and stopping damaging incidents and breaches.