In the brave new world of cloud, security teams must be as agile as possible. This means leveraging proactive monitoring tools, locking down access points, and forecasting requirements

Bill Kleyman, Executive Vice President of Digital Solutions, Switch; Writer/Speaker

January 18, 2017

4 Min Read

In the cloud – just as in the physical world – the evolving threat dynamic is moving beyond services, users, and applications to new attack targets in the Internet of Things ranging from CCTV installations, refrigerators – and possibly even drones. This new paradigm will present many challenges for organizations; consider this, Gartner recently predicted that by 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud, bypassing enterprise security controls.

So, what does this mean for the modern organization? Where should companies be focusing their efforts when working to secure their cloud and IT environments? The new digital challenge is that our configurations and workloads will be at risk, requiring out-of-the-box thinking and new security strategies. Here are four examples of what I mean:

Greater Focus on Endpoints and Users
We all remember the good old days of traditional AV. We’re pretty far beyond that now with the next-generation of new endpoint protection (EPP) and endpoint detection and response (EDR) systems. This will require advanced capabilities around sandboxing, cloud integration, and intelligent threat analytics that offer new ways to secure users, your mobile environment, and how data interacts with endpoints.

Companies like Trend Micro, CrowdStrike, CarbonBlack, and others fall into the EPP/EDR market. They’ve introduced a new generation of endpoint security that integrates with overall managed security solutions and utilize machine-learning capabilities and security artificial intelligence to look into malformed files, deep metadata analytics, and even powerful offline capabilities. This helps mobile users leveraging a variety of devices to be secure and still consume digital content from their organizations.

Security Automation and Orchestration
Automated IT systems you can incorporate into your security architectures will be a big business in 2017 and beyond. With security workflow automation, you can intelligently control massive settings and environment changes encompassing multiple data centers and global locations. In other words, instead of manual process and configurations, you can use automation tools to ensure you have the right security policies in place. The great impact here is that you can have heterogeneous security systems all automatically managed by a single system.

The other big automation security control factor revolves around users. Today, there are powerful user-control automation systems which can integrate with human resource and business processes. I often see organizations working with hundreds, sometimes thousands, of contacts. Managing user identities isn’t always easy – and many times it’s a very manual process. This needs to stop. Rogue accounts, lost users, misconfigured permissions, and forgotten access controls are ALL security holes. Today’s automation software tools allow organizations to onboard and offboard entire subsets of users. Plus, they will integrate with HR systems and even alert administrators as well as HR when new users are created or removed.

Internal Security Lifecycle Management
This falls into the manual category of security control. New tools around security event and information management (SIEM) give administrators a lot more control around their security ecosystem. Remember, it’s not just a firewall any longer. We have app firewalls, security analytics, network forensics and intelligence, and a lot of other tools helping keep our infrastructure secure. Aggregating logs and events is going to be critical to catch problems before they become major issues. Furthermore, you’ll be able to control updates, patches, and see which systems need to be updated. Even in large organizations, you can still find old Cisco or Juniper devices which haven’t patched in ages. How much do you know about what’s going in your cloud ecosystem?

Testing, cloud-to-cloud security, and file watermarking
Cloud and virtualization have made it much easier to test out new types of security systems. If you’re planning on new cloud deployments or are working with an expanding data footprint, it’s critical for you to look at new technologies aimed at new wave IT initiatives that help with cloud vulnerability management, compliance, visibility, app security, and even penetration testing. There are other technologies that will interrogate the requesting source, and help further lock down data being sent down via authentication, watermarking, and advanced access rights management. The point is that emerging security technologies are specifically taking aim at new types of cloud and physical threats. Don’t be afraid to test out these systems or work with a partner to help guide the way.

At the end of the day, my biggest piece of advice is for organizations to remain agile with your cloud security. This means leveraging proactive monitoring tools, locking down access points and forecasting requirements. No environment will ever be 100% safe. Your goal should be to create as much visibility into your environment you can, and have contingency plans for as many security events as possible.

Related Content:

 

About the Author(s)

Bill Kleyman

Executive Vice President of Digital Solutions, Switch; Writer/Speaker

 

Bill Kleyman brings more than 15 years of experience to his role as Executive Vice President of Digital Solutions at Switch. Using the latest innovations, such as AI, machine learning, data center design, DevOps, cloud and advanced technologies, he delivers solutions to customers that help them achieve their business goals and remain competitive in their market. He was ranked #16 globally in the Onalytica study that reviewed the top 100 most influential individuals in the cloud landscape; and #4 in another Onalytica study that reviewed the industry's top Data Security Experts.

 

He enjoys writing, blogging and educating colleagues about everything related to technology. His published and referenced work can be found on WindowsITPro, Data Center Knowledge, InformationWeek, NetworkComputing, AFCOM, TechTarget, DarkReading, Forbes, CBS Interactive, Slashdot and more.

 

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights