The cloud computing economy is expected to grow to $191 billion by 2020, an increase of $100 billion in five years, according to the analysts at Forrester. After Monday’s mega-leak, Ecuadorians may be a little hesitant to embrace this secular shift to cloud computing.
The advantages of this system for storage and productivity are well-documented, but cloud computer servers come with several serious security risks.
High-profile breaches of cloud platforms at Evernote, Adobe, Slack and LastPass over the last few years have led to extra scrutiny of cloud computing from a security perspective, as these online databases are more and more relied upon for storing sensitive data.
Outrage over cloud platform Ecuador personal and financial data leak
This massive data breach was made possible by a vulnerability on an unsecured AWS Elasticsearch server. It was discovered on 16th September and caused outrage throughout the Andean state.
Roughly twenty million people, including 6.7mn children, were affected, comprising nearly the entire population. Even the President of Ecuador was affected, as well as Julian Assange, who was given a ‘cedula,’ or national ID number, during his stay at the Ecuadorean embassy in London.
Collectively, the information was described by one journalist “as valuable as gold in the hands of criminal gangs.”
The scale and detail of the 18GB cache of personal information exposed by the leaky server was such that the researchers were actually able to reconstruct entire family trees.
The types of personal and confidential information available on the database included:
- national ID numbers;
- places of birth;
- home addresses;
- phone numbers;
- family and marriage records;
- education and work records;
- financial information including tax records.
It is not known whether any agents took advantage of the leaky server before it was plugged by the Ecuador’s computer emergency security team shortly after the discovery.
How did the breach happen?
A local data analytics company, Novaestrat held vast amounts of Ecuadorian data on an Elasticsearch server, which had no password protection, allowing anyone access.
Though there is no evidence that the government’s database was hacked or breached by Novaestrat, these revelations led to the swift arrest of the company’s executive, and a full investigation over how the company possessed the data it held.
Novaestrat was awarded several government contracts by the former political regime, so it is likely that these were reason the company gained access to the personal data.
Plans for Data Protection Law
This breach has caused the Ecuador’s Ministry of Telecommunications to speed up the process of passing a new data privacy law. This is intended to match rising international standards of data protection (for example, the GDPR).
Why Data Retention and Deletion Schedules are vital
There is a clear lesson here, both to data controllers and data processors. You must make sure, whether you are a data controller or a data processor, that you have robust data retention and deletion schedules in place
1. Make sure your data processors are legally obliged to delete the data
1. Ensure that you have procedures in place to enable you to meet the requirements of your data processor agreement
2. Demand evidence that the deletion has taken place
2. Ensure you have a robust mechanism for the destruction of the data
3. Exercise your audit rights
3. Be prepared to provide evidence of the destruction
a) Once the purpose of the data sharing has been met and / or
4. Consider backup files as well as live
b) According to your own retention and deletion policies
If you have any questions about data retention and deletion policies or data processor agreement, please contact us via email firstname.lastname@example.org or call 01787 277742