The cloud certainly offers many advantages, but as with any large-scale deployment, the cloud can also offer unforeseen challenges. The notion of the cloud just being "someone else's data centre not mine" is just plain wrong, it assumes you're relinquishing security responsibility because "someone else will take care of it all."
Yes its true, cloud systems, networks, and applications are not physically located within your control, but security responsibility and risk mitigation are. Cloud infrastructure providers allow a great deal of control in terms of how you set up that environment, what you put there, how you protect your data, and how you monitor that environment. Managing risk throughout that environment and providing alignment with your existing security framework is what's most important.
Privacy and Risk
With the EU's General Data Protection Regulation (GDPR), organisations have increased requirements when protecting data in the cloud. And the solution isn't as simple as deploying data loss prevention software in a data centre because the data centre has become fragmented. You now have a various services, systems, and infrastructures that aren't owned by you but still require visibility and proper control.
Cloud services and infrastructures that share or exchange information also become difficult to manage: Who owns the service-level agreements? Is there a tool that monitors it all? DevOps has forced companies to go as far as implementing microsegmentation and adjusting processes around firewall rule change management. Furthermore, serverless computing has provided organisations with a way to cut costs and speed productivity by allowing developers to run code without having to worry about infrastructures and platforms. Without a handle on virtual private clouds and workload deployments, however, things can spin out of control and you start to see data leaking from one environment just as you've achieved a level of control of security in another.
Several steps can be taken to help mitigate risk to an organisation's data in the cloud.
1. Align to your needs
First, align your cloud environment with cybersecurity frameworks. Often, organisations move to the cloud so rapidly that the security controls historically applied to their on-premises data centres don't migrate effectively to the cloud. Furthermore, an organisation may relax the security microscope on software-as-a-service (SaaS) applications such as Microsoft Office 365. But even with these legitimate business applications, data may end up being leaked if you don't have the right visibility and control. Aligning cloud provider technology with cybersecurity frameworks and business operating procedures provides for a highly secure, more productive implementation of a cloud platform, giving better results and a successful deployment.
Cloud systems and networks should be treated the way you treat your LAN and data centre. Amazon's Shared Responsibility Model, for example, outlines where Amazon's security responsibility ends and your security responsibility begins. While threats at the compute layer exist — recent cloud data breaches have shown a breakdown in an organisation's security responsibility area, namely operating system security, data encryption, and access control. If your organisation has standards that govern the configuration of servers, vulnerability management, patching, identity and access management, encryption, segmentation, firewall rules, application development, and monitoring, see to it that those standards are applied to cloud services and are audited as a matter of course.
3. Stop the rogues
Not so long ago, you would see organisations struggle with employees who set up unsecured wireless access points in an attempt to gain flexibility. Nowadays wireless controllers providing rogue detection and intrusion prevention system capabilities have helped rein in that activity. With the cloud, employees are setting up cloud storage accounts, serverless computing environments, and virtual private networks (VPN's) as needed to circumvent cumbersome change control procedures, cut costs, and gain similar flexibility and efficiency. By rearchitecting legacy networks, readjusting old processes and procedures, implementing cloud proxy or cloud access security broker (CASB) technology, and coupling that with strong endpoint security controls and an effective awareness campaign, an organisation can provide that level of flexibility and efficiency but still provide for data protection.
4. Keep a close eye on things
The cybersecurity operations centre (CSOC) should no longer be concerned with just the local network and data centres. The operational monitoring procedures, threat hunting, intelligence, and incident response that the SOC uses also apply to cloud environments where the organisation's data resides. Monitoring SaaS applications where corporate data may reside is challenging but can be done using effective endpoint security coupled with the monitoring of cloud access solutions (CASB, proxy, and others). For a serverless environment, depending on your CSOC requirements, this may mean the application of third-party monitoring platforms or solutions beyond what cloud providers offer. In all cases, event logging and triggers need to feed back to the CSOC to be correlated with local event data, analytics, and threat intelligence.
With all the cloud services available, it's no wonder companies struggle to manage risk. It takes a lot of coordinated effort and time to successfully set up and maintain a cloud based system.
Cloud Computing Security: Foundations and Challenges
Organisations must include security in technology decisions if security is to continue to protect the business, and security must understand the needs of the business and changes in technology that you are using. To help to prevent people from seeking their own solutions to technology problems, IT and security teams must evolve their assets and functions to accommodate that speed and convenience or find themselves constantly trying to catch up