Welcome!

Microservices Expo Authors: Elizabeth White, Liz McMillan, Aruna Ravichandran, Pat Romanski, Cameron Van Orman

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Linux Containers, Cloud Security, @BigDataExpo

@CloudExpo: Article

Four Things to Consider for E-Signature Security in the Cloud

Striking the right balance to manage risk while ensuring maximum adoption

As the number of companies adopting cloud-based solutions continues to increase, security remains top of mind for vendors, companies and their customers. Organizations of all types and sizes are opting for cloud e-signatures for many reasons including speed-to-market, agility and a lower total cost of ownership. What organizations concerned with cloud security may not know is that all e-signature solutions are not created equal; enterprise-class cloud e-signatures enable security that is beyond simply passing a security audit or obtaining certification. There are four areas organizations should keep in mind when considering SaaS e-signatures.

1. Data Protection
Recent large-scale data breaches and general concern over personal privacy in digital spaces have understandably left many wondering if their customer data is secure. E-signature solution vendors have the responsibility to ensure data is safe, which includes protecting against privacy breaches or malware attacks and ensuring that data is encrypted in transit and at rest.

In order to demonstrate that the organization has adequate controls for data protection, including technology and processes, the e-signature service host should meet the strictest certification standards like Service Organization Controls (SOC) 2, which reflects that the organization has adequate controls for data protection, including technology and processes.

The good news is that cloud computing has matured over the years and now offers trustworthy infrastructure solutions with stringent security protocols in place. However, the infrastructure used not only needs to ensure high availability, but also that the data is securely backed up and is protected against unauthorized access. The e-signature provider should be leveraging a mature, trusted and certified cloud infrastructure solution such as Amazon Web Services rather than relying on in-house servers. Finally, when evaluating an e-signature vendor, it's important to ask what security protocols and controls are in place to ensure it is keeping data safe and secure.

2. Strong Identification, Authentication & Attribution
Security and user identification, authentication and attribution are important considerations for organizations wanting to embrace cloud-based technologies. Identification is the progress of verifying someone's identity either in person or remotely, whereas authentication is the process of verifying user credentials (most often user name and password) prior to giving access to a system - in this case, e-signing. Many financial services, insurance, healthcare and government organizations require advanced authentication methods to validate the identity of signers. Examples of identification can include email, SMS text passcode, Q&A and third-party authentication services. The e-signature solution should offer a variety of ways to authenticate signers depending on:

  • The legal and compliance risk
  • The likelihood of fraud
  • The value of the process being automated

3. Tamper-Evident E-Signatures
With tamper-evident controls, all parties involved in a transaction can trust the integrity of a signed document. If the document has been adjusted even slightly, it will invalidate any signatures and alert signers to the fact that it has been tampered with.

In order to ensure these controls are properly in place, digital signature technology should be applied at each signature location, creating a digital fingerprint of the document (called a hash) that can be used at any point to verify the integrity of the electronic record. This verification should take place in the document rather than sending the use to the vendor's website to validate the signature. Since e-signatures are only as good as the security that protects them, it's important that any attempt to tamper with any part of the document, for example adding or deleting words or replacing pages, should be visible. An enterprise-class e-signature solution should demonstrate this tampering by invalidating all the signature areas within the document.

4. Detailed Evidence Through an Embedded Audit Trail
The hashing of information into the document not only secures a document but it also creates a reliable and consistent audit trail of who signed, in what order, at what time and in what locations. Further, using e-signatures built on digital signature technology, the audit trail is securely embedded into the document. That means that all electronic signatures, the time stamping and the audit trails would be embedded directly within the document and not stored separately in the cloud or ‘logically' associated in a vault or proprietary database.

Organizations should have access to this data without having to depend on a vendor or its systems for access. This type of vendor independence is a concern for many organizations looking at cloud applications and gives users peace of mind that their valuable business records will remain in their control for as long as their retention policies require. An embedded audit trail means your e-signed records will work seamlessly with your content management systems or your chosen system of record.

When it comes to electronic signatures, taking a multi-pronged approach will ensure the highest level of security for documents and data that pass through a cloud e-signature solution. At the same time, it's important to choose an enterprise-class e-signature solution that offers additional security measures like embedding all data associated with the transaction into the document, reliably reproducing that data as evidence in the event of a dispute and enabling the reduction of risk around non-compliance. Ultimately, this multilayer approach to cloud e-signature security will foster customer confidence and protect an organization's reputation.

As organizations ponder these security features and requirements, it is highly recommended that they apply a level of controls and safeguards comparable to the paper process. Some organizations have a tendency to believe that putting a process online requires stricter security, however security and usability can at times be opposing forces. Organizations must strike the right balance so to manage risk while ensuring maximum adoption.

More Stories By Tommy Petrogiannis

Tommy Petrogiannis is CEO & Co-Founder of Silanis. As President and CEO, he is responsible for setting the company strategy and vision, building corporate culture and ensuring the entire team is working towards the corporate goal of delivering the ‘best possible customer experience’.

Within Silanis, Tommy has inspired a deeply-rooted culture of charitable giving and community involvement, supporting causes proposed by employees as well as those to which the company has a longstanding commitment. These have included the Royal Victoria Hospital’s Tiny Survivors Program, Canderel Cancer Run, Leukemia & Lymphoma Society, Kids Code Program and others.

Tommy’s two decades of IT experience include positions at Compaq and Matrox Electronics.

He holds a BS in engineering from Concordia University.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@MicroservicesExpo Stories
We all know that end users experience the Internet primarily with mobile devices. From an app development perspective, we know that successfully responding to the needs of mobile customers depends on rapid DevOps – failing fast, in short, until the right solution evolves in your customers' relationship to your business. Whether you’re decomposing an SOA monolith, or developing a new application cloud natively, it’s not a question of using microservices – not doing so will be a path to eventual b...
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, will describe how NetApp designed a three-year program of work to migrate 25PB of a major telco's enterprise data to a new STaaS platform, and then secured a long-term contract to manage and operate the platform. This significant program blended the best of NetApp’s solutions and services capabilities to enable this telco’s successful adoption of private cloud storage and launchi...
Enterprises are adopting Kubernetes to accelerate the development and the delivery of cloud-native applications. However, sharing a Kubernetes cluster between members of the same team can be challenging. And, sharing clusters across multiple teams is even harder. Kubernetes offers several constructs to help implement segmentation and isolation. However, these primitives can be complex to understand and apply. As a result, it’s becoming common for enterprises to end up with several clusters. Thi...
Digital transformation leaders have poured tons of money and effort into coding in recent years. And with good reason. To succeed at digital, you must be able to write great code. You also have to build a strong Agile culture so your coding efforts tightly align with market signals and business outcomes. But if your investments in testing haven’t kept pace with your investments in coding, you’ll lose. But if your investments in testing haven’t kept pace with your investments in coding, you’ll...
Containers are rapidly finding their way into enterprise data centers, but change is difficult. How do enterprises transform their architecture with technologies like containers without losing the reliable components of their current solutions? In his session at @DevOpsSummit at 21st Cloud Expo, Tony Campbell, Director, Educational Services at CoreOS, will explore the challenges organizations are facing today as they move to containers and go over how Kubernetes applications can deploy with lega...
Today most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes significant work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reducti...
DevOps at Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to w...
Is advanced scheduling in Kubernetes achievable? Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations? In his session at @DevOpsSummit at 21st Cloud Expo, Oleg Chunikhin, CTO at Kublr, will answer these questions and demonstrate techniques for implementing advanced scheduling. For example, using spot instances ...
SYS-CON Events announced today that Cloud Academy has been named “Bronze Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Cloud Academy is the leading technology training platform for enterprise multi-cloud infrastructure. Cloud Academy is trusted by leading companies to deliver continuous learning solutions across Amazon Web Services, Microsoft Azure, Google Cloud Platform, and the most...
The last two years has seen discussions about cloud computing evolve from the public / private / hybrid split to the reality that most enterprises will be creating a complex, multi-cloud strategy. Companies are wary of committing all of their resources to a single cloud, and instead are choosing to spread the risk – and the benefits – of cloud computing across multiple providers and internal infrastructures, as they follow their business needs. Will this approach be successful? How large is the ...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In their Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, and Mark Lav...
Many organizations adopt DevOps to reduce cycle times and deliver software faster; some take on DevOps to drive higher quality and better end-user experience; others look to DevOps for a clearer line-of-sight to customers to drive better business impacts. In truth, these three foundations go together. In this power panel at @DevOpsSummit 21st Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, industry experts will discuss how leading organizations build application success from all...
DevSecOps – a trend around transformation in process, people and technology – is about breaking down silos and waste along the software development lifecycle and using agile methodologies, automation and insights to help get apps to market faster. This leads to higher quality apps, greater trust in organizations, less organizational friction, and ultimately a five-star customer experience. These apps are the new competitive currency in this digital economy and they’re powered by data. Without ...
A common misconception about the cloud is that one size fits all. Companies expecting to run all of their operations using one cloud solution or service must realize that doing so is akin to forcing the totality of their business functionality into a straightjacket. Unlocking the full potential of the cloud means embracing the multi-cloud future where businesses use their own cloud, and/or clouds from different vendors, to support separate functions or product groups. There is no single cloud so...
For most organizations, the move to hybrid cloud is now a question of when, not if. Fully 82% of enterprises plan to have a hybrid cloud strategy this year, according to Infoholic Research. The worldwide hybrid cloud computing market is expected to grow about 34% annually over the next five years, reaching $241.13 billion by 2022. Companies are embracing hybrid cloud because of the many advantages it offers compared to relying on a single provider for all of their cloud needs. Hybrid offers bala...
With the modern notion of digital transformation, enterprises are chipping away at the fundamental organizational and operational structures that have been with us since the nineteenth century or earlier. One remarkable casualty: the business process. Business processes have become so ingrained in how we envision large organizations operating and the roles people play within them that relegating them to the scrap heap is almost unimaginable, and unquestionably transformative. In the Digital ...
These days, APIs have become an integral part of the digital transformation journey for all enterprises. Every digital innovation story is connected to APIs . But have you ever pondered over to know what are the source of these APIs? Let me explain - APIs sources can be varied, internal or external, solving different purposes, but mostly categorized into the following two categories. Data lakes is a term used to represent disconnected but relevant data that are used by various business units wit...
The nature of the technology business is forward-thinking. It focuses on the future and what’s coming next. Innovations and creativity in our world of software development strive to improve the status quo and increase customer satisfaction through speed and increased connectivity. Yet, while it's exciting to see enterprises embrace new ways of thinking and advance their processes with cutting edge technology, it rarely happens rapidly or even simultaneously across all industries.
It has never been a better time to be a developer! Thanks to cloud computing, deploying our applications is much easier than it used to be. How we deploy our apps continues to evolve thanks to cloud hosting, Platform-as-a-Service (PaaS), and now Function-as-a-Service. FaaS is the concept of serverless computing via serverless architectures. Software developers can leverage this to deploy an individual "function", action, or piece of business logic. They are expected to start within milliseconds...
With the rise of DevOps, containers are at the brink of becoming a pervasive technology in Enterprise IT to accelerate application delivery for the business. When it comes to adopting containers in the enterprise, security is the highest adoption barrier. Is your organization ready to address the security risks with containers for your DevOps environment? In his session at @DevOpsSummit at 21st Cloud Expo, Chris Van Tuin, Chief Technologist, NA West at Red Hat, will discuss: The top security r...