The Perimeter Isn't Shattered; It's Just Moved
The survey results cited in this post are interesting, but before we abandon the idea of protecting the perimeter, we should consider the idea that the definition of the word perimeter has fundamentally changed. When you owned your own physical data center, guarding the perimeter (network) was a sound strategy, until the bad guys find ways in (and they always do). It's akin to moving into a gated community and leaving your expensive home unlocked and the windows open; once the bad guys get over the fence, they have free run of the place. Simply adding more guards at the gate or raising the height of the fences works only temporarily, until someone finds a bigger ladder. We have to protect closer to home -- at the virtual machine (workload) level. This is especially important as more companies are increasing investments in private and public cloud infrastructure. Yes, protect the perimeter, but the new perimeter is at the VM and workload.
There are a growing number of products that do this on the market, so how should you evaluate them? Here are 5 essential ingredients that will keep your business safe at the workload level:
1. On Demand: Modern cloud security solutions must be able to be switched on, instantly. It should take just minutes to set up and configure non-intrusive visibility and protection – at the virtual machine (workload) level. This contrasts with traditional software or security appliances, which often take days or weeks to configure and get running. The solution must also be able to run in "read-only" or audit mode, making it ideal for visibility and compliance use cases.
2. Comprehensive: Your cloud security solution should be 'always-on' and provide a full suite of security and compliance capabilities including: workload firewall management, multi-factor network authentication, configuration security monitoring, software vulnerability assessment, intrusion detection, file integrity monitoring and more. Many offerings on the market today only support some of these features.
3. Works Anywhere: Moving from physical data centers to cloud technologies won't happen overnight. And most companies are investing in cloud technologies from multiple vendors. This makes good business sense as the market matures and you spread risk around. You certainly don't want to be locked into a single cloud provider that may, one day, be surpassed in features, performance or reliability. So choose a security platform that is agnostic to the infrastructure it runs on. It should give you visibility and enforcement in any environment: virtual data center, private cloud, public cloud, or mixed (hybrid).
4. Operates at Any Scale: Pick a cloud security solution that provides hands-free security automation and orchestration that's built-in, making it fast and simple to provision elastic compute needs for the business, at any scale. If the platform uses an agent model, check the size of the agent. If it's larger than 6MB, beware; the solution will not scale. Ensure that the platform supports full automation and orchestration capabilities, making it faster and easier to support fully elastic infrastructure needs.
5. Invest in a Platform, Not a Feature: Choose a security platform, not a security feature. Vendors come out with new features all the time, oftentimes leap-frogging each other. Future-proof your decision by examining how fast new features come to market, and how disruptive they are to existing implementations. Make sure the platform itself is architected to scale and that it is fully integrated through open APIs with the virtual infrastructure tools you already use today.
User Rank: Apprentice
12/14/2014 | 10:30:50 AM