Securing your data and applications in the cloud has never been more important.
The headlines are a constant reminder of the disruptive (or calamitous) impact on a business in the wake of a breach. Many of 2017’s most high-profile breaches were a reminder of the vulnerabilities that can come from both inside and outside your organization.
While there is no single solution to prevent every attack, proactively building a cloud security awareness throughout the organization is the first line of defense for blocking the malicious activity that often precedes a breach.
Here are 4 practices that should be driving your security strategy in 2018:
- Understand your security responsibility
- Make sure your team’s’ cloud security skills are up to the challenge
- Implement security at every level of deployment
- Build a security-first culture
1. Understand your security responsibility
In the cloud, the entire security framework operates under a shared responsibility model between provider and customer. For this model to be effective, a clear understanding of each side’s roles and responsibilities is an essential starting point.
From an infrastructure perspective, the cloud service provider is responsible for ensuring sufficient levels of physical security at their data centers. The service provider manages security throughout their entire global infrastructure, from their physical presence to the underlying foundational resources that provide compute, storage, database, and network services. Together, these features provide a secure cloud environment.
Customers who import data and utilize the provider’s services are responsible for using those services and features provided to design and implement their own security mechanisms. This may include access control, firewalls (both at the instance and network levels), encryption, logging and monitoring, and more.
AWS, Azure, and Google Cloud have all adopted a shared responsibility model. Check your service level agreements with each provider to fully understand the obligations on each side.
2. Make sure your team’s’ cloud security skills are up to the challenge
According to McAfee, 36% of organizations are adopting cloud even while admitting the right security skills are not in place.
36% of organizations are adopting cloud even while admitting the right security skills are not in place.
In 2017, millions of customer records and other sensitive data were exposed as a result of human error and poorly configured security settings in services like Amazon Simple Storage Service (S3). Researchers at RedLock found that 40% of organizations using cloud storage have accidentally exposed one or more of these services to the public. Hackers and other bad actors are fully aware of human fallibility, and they are perfectly positioned to exploit security vulnerabilities when a business takes shortcuts.
In these instances, it’s not a failure of technology, but a lack of understanding about the importance of security and a lack of skills that put your business at risk.
Just as business pressures impact the rush to migrate in the first place, the pace and volume of new services and updates released by the leading public cloud vendors makes it challenging for teams to keep up. Cloud providers have been quick to develop and release innovative technologies to keep cloud data and applications secure. For example, AWS GuardDuty, released in November, is essentially an intelligent threat detection service, and the first that uses artificial intelligence and machine learning to detect suspicious activity.
It is crucial for companies to invest the time and resources required to train your internal cloud teams to correctly and effectively design safe, secure, auditable, and traceable cloud solutions that also meet the demands of your business.
3.Implement security at every level of deployment
Your infrastructure is only as secure as its weakest link. Threats are not limited to external sources. Your teams must be prepared to correctly architect against risks from non-malicious internal breaches or loopholes in user privileges to the most sophisticated attacks, and everything in between.
By implementing security measures at every layer of your deployments, you are minimizing the attack surface area of your infrastructure.
Amazon Web Services, Microsoft Azure, and Google Cloud Platform offer a range of services and tools that your teams can use to design, implement, and architect the proper level of security to protect your data and applications in the cloud. Your teams should have a full understanding of the managed security services offered by your cloud service provider, as well as the knowledge and skills to architect the relevant safeguards within their respective parts of the development and deployment lifecycle.
4.Build a security-first culture
Cloud adoption impacts your entire business, from technical changes at the infrastructure level to cultural changes that touch all levels and teams of employees. Therefore, security must be part of your business strategy, and it must be reinforced from the very top of your organization.
Without an understanding of the impact of security at every layer of deployment, best practices can be overlooked, mistakes can occur, shortcuts may be taken, and vulnerabilities will be quietly designed into solutions. Building a security-first culture will ensure that security is at the forefront of all corresponding methodologies, practices, processes, and procedures.
By issuing a ‘security-first’ directive and backing it up with action across all areas of the business, your organization will more confidently operate in the cloud.
Cloud Computing Solutions: 7 Trends for the Future
The world of cloud computing is in a state of flux. Not long ago, the cloud was considered an emerging technology, known only to IT specialists. Today it is a part of everyday life – 96% of businesses use the cloud in one form or another, and this number only looks set to grow. Whether ...
AWS Security Groups: Instance Level Security
Instance security requires that you fully understand AWS security groups, along with patching responsibility, key pairs, and various tenancy options. As a precursor to this post, you should have a thorough understanding of the AWS Shared Responsibility Model before moving onto discussi...
7 Key Cybersecurity Threats to Cloud Computing
When businesses consider cloud computing, one of the major advantages often cited is the fact that it can make your business more secure. In fact, in recent years many businesses have chosen to migrate to the cloud specifically for its security benefits. So, it might surprise you to lea...
DevSecOps: How to Secure DevOps Environments
Security has been a friction point when discussing DevOps. This stems from the assumption that DevOps teams move too fast to handle security concerns. This makes sense if Information Security (InfoSec) is separate from the DevOps value stream, or if development velocity exceeds the band...
Top 10 Things Cybersecurity Professionals Need to Know
There has been an increase in data breaches over the recent years. With almost 143 million Americans who have had their data compromised in data breaches. These breaches include all sorts of sensitive data, including financial information, election controversies, social security, just t...
AWS Fundamentals: Understanding Compute, Storage, Database, Networking & Security
If you are just starting out on your journey toward mastering AWS cloud computing, then your first stop should be to understand the AWS fundamentals. This will enable you to get a solid foundation to then expand your knowledge across the entire AWS service catalog. It can be both d...
The Convergence of DevOps
IT has changed over the past 10 years with the adoption of cloud computing, continuous delivery, and significantly better telemetry tools. These technologies have spawned an entirely new container ecosystem, demonstrated the importance of strong security practices, and have been a catal...
How DevOps Increases System Security
The perception of DevOps and its role in the IT industry has changed over the last five years due to research, adoption, and experimentation. Accelerate: The Science of Lean Software and DevOps by Gene Kim, Jez Humble, and Nicole Forsgren makes data-backed predictions about how DevOps p...
New Security & Compliance Service: AWS Security Hub
This morning’s Andy Jassy keynote was followed by the announcement of over 20 new services across a spectrum of AWS categories, including those in Security and Compliance, Database, Machine Learning, and Storage. One service that jumped out to me was the AWS Security Hub, currently...
Interview: Q&A with John Visneski
Security is a top priority for organizations of all types, with research firm IDC projecting 10% spending growth to $91 billion dollars in 2018. For leadership, security is important considering the cost, regulation, and reputation at stake when breaches occur. According to a joint ...
Building Security Teams in a Competitive Talent Market: These Are The Droids You’re Looking for
John Visneski is the Head of Security and DPO at The Pokemon Company International. If you missed the webinar we organized in collaboration with John Visneski you can still watch it on demand, simply click here. The reasoning behind the popularity of this perspective is clear, if no...
Microsoft Ignites Cloud Industry With Nadella Keynote
On Monday, Microsoft kicked off its Ignite conference, an annual gathering of developers and IT professionals. Over the next week, attendees will learn about upcoming Microsoft innovations in IoT, artificial intelligence, machine learning, and cloud (all while getting some good networki...