Cloud Security: People, Process, and Technology

Cloud Security: People, Process, and Technology

“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards – and even then I have my doubts.”- Security Expert, Gene Spafford

Your workloads are potentially more secure in the public cloud than in your own data center. When security considerations give the CISO pause, I suggest a holistic view of cloud security:

  • Most public cloud providers maintain security responsibility from the physical infrastructure layer up through the hypervisor.
  • Hyperscale providers like Microsoft Azure and AWS invest millions in security infrastructure, personnel and ongoing audits to support their hardened compute environments and compliance milestones.
  • A poorly-designed application will be exploitable regardless of where it resides.
  • Placing your workloads into a compliant cloud provider only means their internal controls, processes, and infrastructure meet those compliance requirements. Your applications might not.
  • Understanding encryption and key management is critical, and public cloud providers will generally offer self-managed or vendor-managed key systems depending on the needs of your organization.

If you’re approaching a cloud migration with a security-first mindset, you can allow the cloud provider to handle the underlying infrastructure, letting you focus on serving the business.  Security continues to focus on three pillars: people, process and technology. You can throw a multitude of whiz-bang security systems in front of your applications, but if your people are vulnerable to social engineering or your processes lack security rigor, your applications and data are ripe for breach.

At minimum, I recommend exploring the following processes and technologies (some of which are free to use):

  • Utilize identity access management and granular policies while minimizing root access
  • Require multi-factor authentication for ALL accounts
  • Continuously audit access rights
  • Install AMI/VM-based firewalls around your cloud workloads
  • Conduct vulnerability assessments as needed/required
  • Evaluate a SIEM solution geared for public cloud
  • Evaluate managed security services to complement your security team

Some of the above solutions are offered by public cloud providers with varying degrees of efficacy. If you are unsure of the optimal security process and technology mix for your organization, a managed security provider (CDW works with several) can shore up your security posture and serve as your outsourced security staff as needed.

To view or add a comment, sign in

More articles by Eric James

  • Jevons Paradox in IT: How ‘Optimization’ Turned into Overload

    What can a 19th-century economist teach us about IT modernization? Plenty, as it turns out. In 1865, William Stanley…

  • Why Small Businesses Need CDW Amplified Services

    Let's get the facts and figures out in the open, courtesy of the CDW Modern IT Infrastructure Insight Report: 63% of…

  • Cloud Migrations: The Easy Way and the Right Way

    I've witnessed an uptick in conversations with SaaS providers looking to modernize their core revenue-generating…

  • Azure Active Directory: Fact vs Fiction

    Perhaps one of Microsoft's greatest masterstrokes was including an entitlement of Azure Active Directory with every…

    5 Comments
  • The "5 Whys" of Application Downtime

    Now that the torches have been extinguished and pitchforks put back in storage, let's seek some perspective on "The…

    1 Comment
  • IoT, Cloud, and the Culture of Fear

    Last week we received a collective wake-up call: bringing down key internet services didn’t require maliciously…

    1 Comment
  • Hyperscale Cloudapalooza

    Walking the well-trafficked halls of O’Hare, I was keenly aware of ad bombardment. Every wall and overhang seemed to…

    1 Comment
  • Dear Prudence: I'm Conflicted About Cloud

    Dear Prudence, My CEO just knocked on my door and told me to look at moving our data center into the cloud. He was…

    3 Comments

Others also viewed

Explore content categories