Welcome!

Agile Computing Authors: Yeshim Deniz, Carmen Gonzalez, Liz McMillan, Elizabeth White, Janakiram MSV

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Linux Containers, Cloud Security, @BigDataExpo

@CloudExpo: Article

Four Things to Consider for E-Signature Security in the Cloud

Striking the right balance to manage risk while ensuring maximum adoption

As the number of companies adopting cloud-based solutions continues to increase, security remains top of mind for vendors, companies and their customers. Organizations of all types and sizes are opting for cloud e-signatures for many reasons including speed-to-market, agility and a lower total cost of ownership. What organizations concerned with cloud security may not know is that all e-signature solutions are not created equal; enterprise-class cloud e-signatures enable security that is beyond simply passing a security audit or obtaining certification. There are four areas organizations should keep in mind when considering SaaS e-signatures.

1. Data Protection
Recent large-scale data breaches and general concern over personal privacy in digital spaces have understandably left many wondering if their customer data is secure. E-signature solution vendors have the responsibility to ensure data is safe, which includes protecting against privacy breaches or malware attacks and ensuring that data is encrypted in transit and at rest.

In order to demonstrate that the organization has adequate controls for data protection, including technology and processes, the e-signature service host should meet the strictest certification standards like Service Organization Controls (SOC) 2, which reflects that the organization has adequate controls for data protection, including technology and processes.

The good news is that cloud computing has matured over the years and now offers trustworthy infrastructure solutions with stringent security protocols in place. However, the infrastructure used not only needs to ensure high availability, but also that the data is securely backed up and is protected against unauthorized access. The e-signature provider should be leveraging a mature, trusted and certified cloud infrastructure solution such as Amazon Web Services rather than relying on in-house servers. Finally, when evaluating an e-signature vendor, it's important to ask what security protocols and controls are in place to ensure it is keeping data safe and secure.

2. Strong Identification, Authentication & Attribution
Security and user identification, authentication and attribution are important considerations for organizations wanting to embrace cloud-based technologies. Identification is the progress of verifying someone's identity either in person or remotely, whereas authentication is the process of verifying user credentials (most often user name and password) prior to giving access to a system - in this case, e-signing. Many financial services, insurance, healthcare and government organizations require advanced authentication methods to validate the identity of signers. Examples of identification can include email, SMS text passcode, Q&A and third-party authentication services. The e-signature solution should offer a variety of ways to authenticate signers depending on:

  • The legal and compliance risk
  • The likelihood of fraud
  • The value of the process being automated

3. Tamper-Evident E-Signatures
With tamper-evident controls, all parties involved in a transaction can trust the integrity of a signed document. If the document has been adjusted even slightly, it will invalidate any signatures and alert signers to the fact that it has been tampered with.

In order to ensure these controls are properly in place, digital signature technology should be applied at each signature location, creating a digital fingerprint of the document (called a hash) that can be used at any point to verify the integrity of the electronic record. This verification should take place in the document rather than sending the use to the vendor's website to validate the signature. Since e-signatures are only as good as the security that protects them, it's important that any attempt to tamper with any part of the document, for example adding or deleting words or replacing pages, should be visible. An enterprise-class e-signature solution should demonstrate this tampering by invalidating all the signature areas within the document.

4. Detailed Evidence Through an Embedded Audit Trail
The hashing of information into the document not only secures a document but it also creates a reliable and consistent audit trail of who signed, in what order, at what time and in what locations. Further, using e-signatures built on digital signature technology, the audit trail is securely embedded into the document. That means that all electronic signatures, the time stamping and the audit trails would be embedded directly within the document and not stored separately in the cloud or ‘logically' associated in a vault or proprietary database.

Organizations should have access to this data without having to depend on a vendor or its systems for access. This type of vendor independence is a concern for many organizations looking at cloud applications and gives users peace of mind that their valuable business records will remain in their control for as long as their retention policies require. An embedded audit trail means your e-signed records will work seamlessly with your content management systems or your chosen system of record.

When it comes to electronic signatures, taking a multi-pronged approach will ensure the highest level of security for documents and data that pass through a cloud e-signature solution. At the same time, it's important to choose an enterprise-class e-signature solution that offers additional security measures like embedding all data associated with the transaction into the document, reliably reproducing that data as evidence in the event of a dispute and enabling the reduction of risk around non-compliance. Ultimately, this multilayer approach to cloud e-signature security will foster customer confidence and protect an organization's reputation.

As organizations ponder these security features and requirements, it is highly recommended that they apply a level of controls and safeguards comparable to the paper process. Some organizations have a tendency to believe that putting a process online requires stricter security, however security and usability can at times be opposing forces. Organizations must strike the right balance so to manage risk while ensuring maximum adoption.

More Stories By Tommy Petrogiannis

Tommy Petrogiannis is CEO & Co-Founder of Silanis. As President and CEO, he is responsible for setting the company strategy and vision, building corporate culture and ensuring the entire team is working towards the corporate goal of delivering the ‘best possible customer experience’.

Within Silanis, Tommy has inspired a deeply-rooted culture of charitable giving and community involvement, supporting causes proposed by employees as well as those to which the company has a longstanding commitment. These have included the Royal Victoria Hospital’s Tiny Survivors Program, Canderel Cancer Run, Leukemia & Lymphoma Society, Kids Code Program and others.

Tommy’s two decades of IT experience include positions at Compaq and Matrox Electronics.

He holds a BS in engineering from Concordia University.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
NHK, Japan Broadcasting, will feature the upcoming @ThingsExpo Silicon Valley in a special 'Internet of Things' and smart technology documentary that will be filmed on the expo floor between November 3 to 5, 2015, in Santa Clara. NHK is the sole public TV network in Japan equivalent to the BBC in the UK and the largest in Asia with many award-winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology and will be covering @ThingsExpo Silicon Val...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend @CloudExpo | @ThingsExpo, June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
Most technology leaders, contemporary and from the hardware era, are reshaping their businesses to do software in the hope of capturing value in IoT. Although IoT is relatively new in the market, it has already gone through many promotional terms such as IoE, IoX, SDX, Edge/Fog, Mist Compute, etc. Ultimately, irrespective of the name, it is about deriving value from independent software assets participating in an ecosystem as one comprehensive solution.
SYS-CON Events announced today that Hitachi Data Systems, a wholly owned subsidiary of Hitachi LTD., will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City. Hitachi Data Systems (HDS) will be featuring the Hitachi Content Platform (HCP) portfolio. This is the industry’s only offering that allows organizations to bring together object storage, file sync and share, cloud storage gateways, and sophisticated search an...
SYS-CON Events announced today that Hitachi, the leading provider the Internet of Things and Digital Transformation, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Hitachi Data Systems, a wholly owned subsidiary of Hitachi, Ltd., offers an integrated portfolio of services and solutions that enable digital transformation through enhanced data management, governance, mobility and analytics. We help globa...
Five years ago development was seen as a dead-end career, now it’s anything but – with an explosion in mobile and IoT initiatives increasing the demand for skilled engineers. But apart from having a ready supply of great coders, what constitutes true ‘DevOps Royalty’? It’ll be the ability to craft resilient architectures, supportability, security everywhere across the software lifecycle. In his keynote at @DevOpsSummit at 20th Cloud Expo, Jeffrey Scheaffer, GM and SVP, Continuous Delivery Busine...
NHK, Japan Broadcasting, will feature the upcoming @ThingsExpo Silicon Valley in a special 'Internet of Things' and smart technology documentary that will be filmed on the expo floor between November 3 to 5, 2015, in Santa Clara. NHK is the sole public TV network in Japan equivalent to the BBC in the UK and the largest in Asia with many award-winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology and will be covering @ThingsExpo Silicon Val...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
SYS-CON Events announced today that CollabNet, a global leader in enterprise software development, release automation and DevOps solutions, will be a Bronze Sponsor of SYS-CON's 20th International Cloud Expo®, taking place from June 6-8, 2017, at the Javits Center in New York City, NY. CollabNet offers a broad range of solutions with the mission of helping modern organizations deliver quality software at speed. The company’s latest innovation, the DevOps Lifecycle Manager (DLM), supports Value S...
SYS-CON Events announced today that Hitachi, the leading provider the Internet of Things and Digital Transformation, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Hitachi Data Systems, a wholly owned subsidiary of Hitachi, Ltd., offers an integrated portfolio of services and solutions that enable digital transformation through enhanced data management, governance, mobility and analytics. We help globa...
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in compute, storage and networking technologies, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Analytic. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
SYS-CON Events announced today that Juniper Networks (NYSE: JNPR), an industry leader in automated, scalable and secure networks, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. The company co-innovates with customers and partners to deliver automated, scalable and secure network...
The age of Digital Disruption is evolving into the next era – Digital Cohesion, an age in which applications securely self-assemble and deliver predictive services that continuously adapt to user behavior. Information from devices, sensors and applications around us will drive services seamlessly across mobile and fixed devices/infrastructure. This evolution is happening now in software defined services and secure networking. Four key drivers – Performance, Economics, Interoperability and Trust ...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at Dell EMC, introduced a methodology for capturing, enriching and sharing data (and analytics) across the organization...
SYS-CON Events announced today that T-Mobile will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. As America's Un-carrier, T-Mobile US, Inc., is redefining the way consumers and businesses buy wireless services through leading product and service innovation. The Company's advanced nationwide 4G LTE network delivers outstanding wireless experiences to 67.4 million customers who are unwilling to compromise on ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...