Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Articles

8/13/2019
07:00 AM
Kacy Zurkus
Kacy Zurkus
Edge Articles
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Moving on Up: Ready for Your Apps to Live in the Cloud?

Among the complications: traditional security tools work poorly or not at all in the cloud, and if a company screws up, the whole Internet will know.

Some people dread moving. Understandable. Others, however, get a real charge from the opportunity to purge, scale down, and take only what they need.    

As the digital landscape changes, organizations are doing some purging of their own as they move to the cloud. But that transition isn't as easy as packing up dishes and linens, putting boxes on a truck, and heading off to a new destination.

Migrating to the cloud is challenging because not only must organizations determine what they will need in the cloud, but all of those applications must then be rebuilt in a new environment. All the while, the attack surface in need of defense is expanding, and the rules that worked in a network environment might not be enough in the cloud.

"A major factor complicating cloud security is that traditional security tools work poorly or not at all in the cloud," says Dan Hubbard, CEO at Lacework. "Even if the most skilled cloud migration staff members recognize that security is important and necessary, businesses are often fuzzy about the details of cloud security."

Moving at the Speed of DevOps
The speed at which businesses now operate has directly impacted the speed at which applications are developed and moved to the cloud. Because no one has the gift of hindsight to truly prepare for threats in this new environment, security teams have their work cut out for them.

It's no surprise, then, that a recent report from Bitglass found as more organizations transition to the cloud, 93% of survey respondents said they are at least moderately concerned about their ability to use the cloud securely.

Historically, security has come to what is often called the "far right" of the development process — meaning organizations often need to decide whether to slow down business in order to fix a vulnerability or sign off on a risk and allowing the application to go into production, explains Chris Carlson, VP of cloud agent platform at Qualys.

"The opportunity is for security leaders to use new security tools that integrate easily and well with these new cloud IT development production tools to actually make Web applications in the cloud even more secure than they were when they were on-premise," he says.

Rethinking Security in the Cloud
When migrating to platform-as-a-service (PaaS) offerings, organizations are looking at a reimplementation of functionality against cloud offerings, according to Dr. John Michener, chief scientist at Casaba Security.

"These can be quite secure, but there is a major potential gotcha: If they screw up within a corporation, the exposure may be corporate-wide. If they screw up an access settings in the cloud, the exposure is likely to be Internet-wide, Micherner says.

In addition, reliable standards have yet to be established, says Dr. David Brumley, CEO of ForAllSecure and a professor at Carnegie Mellon University. People are still trying to determine the best ways to ensure policies are in place.

"The security principles that have traditionally existed on the network are still critical in the cloud, but the cloud exacerbates age-old problems," he says. "Organizations still need to do access control and ensure the protection of data in the event that something does get in your system."  

The most successful organizations are rethinking how they perform security and moving to a combination of security as a centralized governance and tooling organization with security distributed within the development teams, according to Hubbard. "With that solutions need to fit into these modern deployments, straddling the needs of both security and application development," he says.

When companies migrate to software-as-a-service (SaaS) offerings from in-house hosted equivalents, they are unlikely to have significant security issues. This is why organizations should first migrate to appropriate SaaS implementations, such as Office 365, Salesforce, and SAP HANA, Casaba Security's Michener advises. "

I would expect organizations to keep legacy apps in-house or migrate them to [Internet-as-a-service] instances that are equally as convenient and economical, but custom in-house apps would be the target for PaaS migration," he says.

Keeping Up with the Business
In many organizations, applications were moved to the cloud before their security teams really knew what the threats in the cloud were. Now they're playing catch-up, while more applications are migrating. While doing so, organizations need to remember that security is not a "true" or "false," Brumley says. Companies are migrating to the cloud to increase accessibility and be able to iterate faster, but at the same time security will become more difficult simply by definition.  

To get ahead, it's important to build defense in depth and have a strategy in place, says Kory Daniels global director, iSecOps at Trustwave. "The organization should have a framework that allows an adaptive and agile mentality of identifying proper use cases," he says.

In addition, for each specific app, the security team needs to know what data exists on the app, who has access to that data, and what concerns are associated with moving that data. "If we have the ability to identify the key things we want to protect, then we look at our ability to ensure we have the proper controls in place to lock down data to the best of our ability without inhibiting business," Daniels says.

And because there's no way of truly knowing what all the threats are in the cloud, "it's important to have the people, process, and technology from detection and response to ensure that you can at least identify where the threats are being exploited," he adds.

Related Content:

Image source: blackboard via Adobe Stock

 

Kacy Zurkus is a cybersecurity and InfoSec freelance writer as well as a content producer for Reed Exhibition's security portfolio. Zurkus is a regular contributor to Security Boulevard and IBM's Security Intelligence. She has also contributed to several publications, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
ABOUT THE EDGE

Dark Reading's new section for features, threat data and in-depth perspectives
More about The Edge

 
 
Contest: Name That Toon