5 Factors to Secure & Streamline Your Cloud Deployment
How a Midwestern credit union overcame the challenges of speed, cost, security, compliance and automation to grow its footprint in the cloud.
Cloud computing promises significant costs savings and more streamlined management of mission-critical information technology, data processing and storage needs. But is it secure?
Vibrant Credit Union (VCU), a Midwestern-based full service financial services credit union that offers both online services and storefront branches, continues to grow their footprint in the cloud. As their needs grow, so does their emphasis on security. Steve McAtee, Vibrant's CIO, was tasked with migrating securely to the cloud without inflating the credit union’s IT budget. Like most well-managed organizations, Vibrant relentlessly pursued a strategy of doing more without increasing costs, and avoiding any compromise in its security posture.
McAtee’s strategy to improve his company's security capabilities involves continuously monitoring and automating its cloud security for vulnerabilities in its Amazon Web Services (AWS) environment. Additionally, the company is able to use this new, continuous approach to eliminates the pain of annual regulatory compliance audits. This successful path to the cloud includes five key factors:
Factor 1: Speed
Moving to the cloud enables VCU to spin up resources and shut them down dynamically in an on-demand basis. The elasticity of cloud computing enables continuous development, allowing organizations to release software as rapidly as they can. But be warned: the speed of continuous development will increase the volume of vulnerabilities in your environment if it’s not well aligned with the security practices of your organization.
Factor 2: Cost
The advent of the cloud will forever change the landscape of IT budgets. No longer are you responsible for housing, powering, and maintaining a farm of depreciating hardware assets. Vibrant was able to convert the capital expense associated with provisioning data centers into a more flexible consumption-based operating expense. They are no longer tied down to physical data centers, but rather are able to move elastically in the cloud based on the needs of the business.
Factor 3: Security
While it is true that in the cloud, it’s easier to rebuild servers, it’s much more painful to do so if you haven’t properly protected your data. The speed and agility of the cloud works to the hackers’ advantage because in the cloud, more data is moved, processed, stored and accessed globally (including by mobile devices). This increases the data’s vulnerability to security breaches and the corresponding adverse legal, regulatory and business consequences.
An automated attack runs 24/7/365 waiting to find vulnerabilities – the attackers way in. Attackers are doing things in a programmatic fashion. Vibrant found that automation is great for detecting and exploiting the risk, but you also need to be armed with automation and visibility so you can identify vulnerabilities before an attacker leveraging automation can detect them.
Factor 4: Compliance
Migrating to the cloud does not relieve an organization of its legal and regulatory responsibility for the data that is put into the cloud. In fact, moving to the cloud now has its own collection of industry-specific laws, regulations and compliance standards.
Compliance with these regulations is imperative. Failure to comply will result in administrative orders and penalties with the potential to damage your business and brand reputation. While some framework controls are met by the cloud providers themselves, organizations need to be able to validate and prove that security standards are met. Even with a small cloud environment, manual monitoring would be extremely burdensome, if not impossible. Many organizations combine the skills of their compliance and security experts into one team. Those teams are supported by the use of security automation tools, lik, for example, the Evident Security Platform (ESP) that can continuously monitor and manage the security and compliance risks and vulnerabilities in an Amazon Web Services (AWS) environment.
Factor 5: Automation
If you were to manually audit your cloud infrastructure, it can consume several hours, even weeks of your most valuable resources, security experts. Adding up all the discovery, auditing, remediation, and training time required to deploy and protect cloud accounts without leveraging automation, equates to losing at least one staff member to these activities -- and that’s just to maintain the existing security state. If you wish to move the ball forward and implement advanced security controls or compliance frameworks, you can expect to consume up to 3 full-time bodies just to achieve baseline security practice.
These were all motivating factors in Vibrant Credit Union’s own move to continuous cloud monitoring and compliance. Operating in the cloud represents a different reality than what you may have worried about just a few years ago, when the introduction of the cloud and the use of cloud services in the supply chain would actually increase security vulnerabilities. McAtee and his small team moved to the cloud to enforce compliance and security policy and instead of causing a security problem, the move helped them leverage security automation and improve how they get things get done.
About the Author
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024