Cloud will re­quire a brand new se­cu­rity ar­chi­tec­ture ex­pert at Help AG say

Help AG cre­ates a Cloud Se­cu­rity Blue­print, with own ex­pe­ri­ence as model

Network Middle East - - CONTENTS -

The last few years have seen a dra­matic shift in cloud up­take in the re­gion, with cus­tomers mov­ing from an af­fir­ma­tive “no” to a “maybe” and then a def­i­nite “yes” within the space of a few years.

For se­cu­rity ser­vice providers such as Help AG, this meant hav­ing to adapt to sup­port cus­tomers with an in­creas­ing ap­petite for cloud. And this re­quired cre­at­ing a brand new ar­chi­tec­ture for se­cur­ing cloud work­loads, says Ni­co­lai Solling, CTO at Help AG.

There are fun­da­men­tal chal­lenges with cloud plat­forms, Solling ob­serves. The first one is the ob­vi­ous loss of con­trol of data and cor­po­rate IT as­sets. Sec­ond are the nu­mer­ous tech­ni­cal is­sues be­cause cloud fun­da­men­tally changes the way se­cu­rity is han­dled.

Cloud also changes how cy­ber­crim­i­nals op­er­ate, Solling says. Granted, Saas plat­forms, es­pe­cially the ma­jor ones such as Of­fice 365, are fun­da­men­tally se­cure. But cy­ber at­tack­ers are not de­terred by this-they sim­ply switch to a dif­fer­ent at­tack model.

This led Help AG to cre­ate a Cloud Se­cu­rity Blue­print, built from scratch.

The blue­print is based upon Help AG’S own ex­pe­ri­ence in mov­ing to the cloud, Solling says. “Like any other or­gan­i­sa­tion, we are heavy users of IT our­selves and we face the same se­cu­rity chal­lenges. When it was our own turn to adopt cloud ser­vices, we iden­ti­fied key chal­lenges that come with se­cur­ing cloud ar­chi­tec­tures, which led us to de­velop rel­e­vant tech­ni­cal so­lu­tions for that,” Solling ex­plains.

Help AG had to tackle three chal­leng- es: The first chal­lenge is that the iden­tity of the user is un­der in­creas­ing pres­sure than ever be­fore. When faced with a rel­a­tively se­cure ar­chi­tec­ture such as cloud, the de­fault op­tion is to go for the weak­est line - the end user.

The other chal­lenge is how to se­cure end­points that have to ul­ti­mately com­mu­ni­cate with cloud plat­forms. The third as­pect of the blue­print is con­fi­den­tial­ity and con­trol of data. Mov­ing to the cloud means putting data onto third-party en­vi­ron­ments. But wher­ever that data sits, the or­gan­i­sa­tion still needs tech­ni­cal con­trol of the con­fi­den­tial­ity of that data.

“The end re­sult is a set of tech­nol­ogy tools and ca­pa­bil­i­ties that pro­vides Help AG with vis­i­bil­ity around cloud and the vul­ner­a­bil­i­ties therein, and then, de­pend­ing on whether it’s a Saas or an Iaas or Paas, the kind of ap­proach that is re­quired,” Solling says.

Wher­ever data sits, IT still needs con­trol, Solling says.

Newspapers in English

Newspapers from UAE

© PressReader. All rights reserved.