Google wants to be sure that it finds bugs in its services before the bad guys do. The company announced on Friday that it’s setting aside $1 million next year to fund independent security research into Drive, its cloud storage product. Google has more than 500 security experts on its staff, but it also works with independent researchers to try to make sure it isn’t overlooking any vulnerabilities.
“Keeping files safe in Google Drive is super important,” Kevin Nelson, product manager for Google Drive, wrote in the announcement. “That's why Drive uses Google’s highly-secure, custom-built data centers to store your photos, videos, and other documents. But it’s not just fences, cameras, and lasers that keep things safe — it’s people.” Google has been trying to woo businesses over to its cloud storage, where it competes with companies such as Microsoft and Carbonite, and it wants to show that Drive is a secure place to put sensitive business data.
The grants range from $500 to $3,133.70 and are awarded to “top performing, frequent vulnerability researchers” who will poke and prod at Google Drive to see if there are any flaws in its security. The money is part of Google’s Vulnerability Research Grants program, launched earlier this year, which extends to other services including YouTube and Blogger. Researchers don’t have to identify specific vulnerabilities after receiving a grant – Google just wants to incentivize experts to better understand its architecture.
Google has also had a separate “bug bounty” program since 2010, which rewards security researchers for identifying vulnerabilities and reporting them to Google. In January, Google reported that it had paid more than $1.5 million in bounties in 2014 to experts who found code execution flaws, authentication errors, and other vulnerabilities in its services. Many of the vulnerabilities were in developer and preview builds of programs, which meant that Google was able to fix them before those programs made it out into the wild.
Google Drive itself has never been hacked on a large scale, although last year more than 5 million Gmail usernames and passwords were posted on a Russian web forum. Almost all of those accounts proved to be out of date, and Google reset the passwords of those affected just to be sure, but in theory the hack could have affected Drive since all Google services are linked to a single user account. Google recommends that users employ two-step verification, which uses a code sent to a smartphone as an additional layer of security when logging on from a new device.