Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/6/2018
04:10 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Most Businesses to Add More Cloud Security Tools

Cloud adoption drives organizations to spend in 2019 as they learn traditional security practices can't keep up.

Three quarters of organizations plan to buy more cloud security tools in 2019 as a means to better secure increasingly complex cloud environments, new research shows.

The data comes from Alcide, which today released its "2018 Report: The State of Securing Cloud Workloads." Nearly 350 security, DevOps, and IT pros weighed in to share their cloud security plans. Most are struggling to secure complex cloud setups, and think more tools will help.

Results show cloud security workflows remain fragmented. Across all company sizes, about 53% of respondents distribute their cloud workloads across a hybrid infrastructure; 18% use multi-cloud. The larger the business, the higher the degree of fragmentation, researchers found.

More than 20% of organizations with more than 1,000 employees are using at least 10 cloud security tools, compared with 3% of medium-to-large businesses with less than 1,000 workers. Many respondents were unsure how many solutions were being used to secure their cloud workflows, a problem which experts point out can hold the entire business back.

"Fragmented stacks and poor visibility into deployed solutions are very often constraints of business velocity, due to difficulties in scaling securely and reliable," the report said.

Despite the potential for business slowdown, 75% percent of respondents expect their cloud security stack to increase over the next year. One-quarter expect it will remain the same, and none expect to use fewer cloud security tools in 2019. The tools they're looking to buy are "quite different than existing security tool stacks," explains Alcide CTO Gadi Naor.

As it stands, organizations currently use cloud security controls for security groups (63%), host-based threat protection (59%), file integrity monitoring (44%), account compliance features (42%), and visibility tools (3%). Naor expects as they invest in security tools, they will more closely focus on microservices architecture, threat protection, and serverless architecture.

There seems to be a gap between the growth of serverless computes and the expertise needed to secure them, researchers report. While 60% of respondents say their business' serverless computes are "very secure," none were ready to admit they were "completely secure." Despite some security concerns, 57% of serverless users are running it in production and development.

Part of the challenge in cloud security is the shared responsibility model, which dictates how cloud providers and customer handle security for applications deployed in the cloud, Naor says.

Who's in Charge

So who handles all these purchases? While the responsibility for securing the cloud still largely falls to corporate IT (46%), specialized DevOps or DevSecOps teams are taking over the job within 34% of organizations. Alcide researchers say this indicates a trend toward specialization.

Most (73%) of security professionals still manually configure their application security policies. Forty-four percent of medium-large businesses, and 74% of large enterprises, have at least three people involved with configuring security for any app. It's a time-consuming process that can leave the company exposed to human error, which Naor calls "a weak link."

He advises companies to drive their security awareness and understanding before they adopt new tech. "This is where I recommend enterprises take a step back and build their security stack before you build your applications on new technologies," he explains.

Alcide is far from the only company to find holes in enterprise cloud security. In its 2018 Cloud Security Report, Crowd Research Partners found only 16% of businesses report their traditional security tools are sufficient to manage security across the cloud. Eight-four percent say traditional security tools don't work at all, or have limited functionality, in the cloud.

Visibility of cloud data is also an issue. Only 7% of businesses have strong visibility of all critical data, Forcepoint found, and 58% say they only have slight control over information in the cloud. On top of that, data from RedLock shows nearly half of databases in the cloud aren't encrypted.

Related Content:

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...