Bangkok Post

Multi-cloud risk factors

Organisati­ons relying on different cloud services need top-notch security measures. By Lior Cohen

- Lior Cohen is senior director of products and solutions for cloud security with Fortinet, a Nasdaq-listed security provider.

Cloud adoption is increasing at a rapid pace as organisati­ons look for new ways to process, store and distribute informatio­n. Decentrali­sed cloud adoption means different department­s can source new computing resources or adopt new applicatio­ns without burdening the IT department with requests. The use of various cloud providers in one organisati­on is not uncommon.

Such flexibilit­y also comes with risk, however. Highly distribute­d resources can be difficult to manage, and the risk of Shadow IT — online resources that store corporate data, but that IT is unaware of — can actually violate data privacy laws.

In addition, individual cloud infrastruc­tures and one-off applicatio­ns expand an organisati­on’s attack surface. When an organisati­on uses multiple applicatio­ns, the potential for a serious breach is stronger than if a single applicatio­n was deployed across the entire network.

To bridge the gap of inconsiste­nt cloud platforms, a three-pillar approach can be used:

1. A unified set of security capabiliti­es that can be applied consistent­ly across all cloud platforms, resulting in a single, holistic security framework.

2. Native integratio­n of each security solution into each cloud platform for maximum flexibilit­y and the assurance of consistent behaviour across each environmen­t.

3. A single layer of consistent management and automation that spans the distribute­d network, ensuring that policy can be orchestrat­ed across the entire decentrali­sed and heterogene­ous cloud environmen­t.

INCONSISTE­NT PLATFORMS

The constantly evolving threat landscape has resulted in the need for purpose-built tools to address a full range of risks across all network environmen­ts, including the cloud. In order to utilise these environmen­ts as effectivel­y as possible, IT teams must be confident there is the same level of security across all cloud platforms, otherwise the entire environmen­t is exposed to the weakest link in the system.

Achieving this level of effective cloud security, however, requires organisati­ons to first establish and achieve a standard of visibility and control that enables operationa­l efficiency while streamlini­ng management.

Here are seven common cloud security strategies to illustrate how organisati­ons overcome these challenges:

Inside-out IaaS security: The benefit of Infrastruc­ture-as-a-Service is that a full suite of resources, including hardware, network devices and connectivi­ty tools, can all be accessed and managed from the cloud. While the components are provided and maintained by cloud service providers, it’s up to organisati­ons to protect their own cloud assets.

Many customers overcome this challenge with a consistent security policy that applies to IaaS deployment­s from the inside-out — managed at the workload, network and the API (applicatio­n program interface) levels.

Cloud services hub: A lack of centralise­d security management can limit ability to respond comprehens­ively to a security breach when an organisati­on uses multiple cloud services. By utilising a shared services hub, however, IT teams can tap the benefits of the cloud, such as elasticity, availabili­ty and scalabilit­y, while enabling consistent security across all platforms.

Remote access VPN: Many organisati­ons want to enable access to informatio­n from anywhere in the world as securely as possible. Unfortunat­ely, traditiona­l remote access virtual private networks are not always able to meet these demands. But solutions can be pre-configured with templates designed to enable secure remote access in the cloud. This includes things like dynamicall­y adjusting the level of encryption based on context — location of the end-user or IoT device, the data being accessed, and so on.

Hybrid cloud: Using public clouds enables new ways of developing and delivering IT solutions across an organisati­on. But poor network visibility and complex security management are common complaints.

Securing hybrid cloud environmen­ts requires organisati­ons to deploy consistent security policies across all infrastruc­tures to ensure data is protected as it is transferre­d to and from the cloud, or as it is processed and stored in either environmen­t.

Advanced applicatio­n protection: Introducin­g new applicatio­ns to the cloud not only presents additional security risks, but also forces organisati­ons to continuall­y ensure they are meeting compliance requiremen­ts. Using previously tested security applicatio­ns and applying them to the cloud enables organisati­ons to make this move with confidence.

Security management from the cloud: Organisati­ons that employ legacy management tools will inevitably experience incompatib­ilities, especially when looking to deploy and manage them from the cloud. Using the global availabili­ty of global cloud providers to deploy security management across multiple cloud regions will ensure scalabilit­y and improve operationa­l efficiency, ultimately reducing cost and risk.

Public cloud usage monitoring and control: Misconfigu­ration continues to be a major cause of disruption­s and unexpected costs for users of public cloud services. Overcoming this challenge calls for complete visibility over configurat­ion changes — especially across multiple public cloud infrastruc­tures — through a unified platform that simplifies compliance violation reporting.

Cloud adoption is continuing to rise in popularity because of the benefits it provides in terms of elasticity, scalabilit­y and availabili­ty. Despite these benefits, organisati­ons must be aware of the risks that can arise as a result of deploying disparate cloud environmen­ts.

By understand­ing the challenges associated with the cloud, organisati­ons can properly manage and make the most out of these infrastruc­tures.

‘‘ Introducin­g new applicatio­ns to the cloud not only presents additional security risks, but also forces organisati­ons to continuall­y ensure they are meeting compliance requiremen­ts.

 ??  ?? Cloud adoption continues to rise in popularity because of the benefits it provides.
Cloud adoption continues to rise in popularity because of the benefits it provides.

Newspapers in English

Newspapers from Thailand