What first-time cloud users need to do
By Digital News Asia December 31, 2015
- Cloud security risks rising, attacks growing at 45% YoY globally
- Enterprises to spend US$2bil in next 5yrs to shore cloud defences
MANY organisations are moving to virtualised and cloud-based infrastructure, according to cybersecurity firm Fortinet.
Businesses are virtualising servers, desktops, network functions, and more, while the cloud (whether public, private, or hybrid) is quickly becoming the dominant platform for enterprises both big and small, the company said in a statement.
“The potential benefits are well-proven, but security is just as important as in physical and on-premises environments,” said Michelle Ong (pic above), Fortinet’s country manager for Malaysia.
Apple, Amazon and Microsoft – considered the gold standard among cloud computing providers – have all suffered the ignominy of being breached by hackers, Fortinet said.
Cloud security risks are rising, with attacks growing at 45% year-on-year globally, according to cloud security firm Alert Logic.
In the next five years, US$2 billion will be spent by enterprises to shore up their cloud defences, according to Forrester Research.
“First-time cloud users can be most at risk, simply because of their unfamiliarity with the new environment, and the added burden of having to grapple with a new way of managing users, data and security,” said Ong.
Fortinet advises first-time cloud users to adhere to the five security must-dos before taking the plunge:
1) Know the cloudy areas
There are three main segments in any cloud deployment – the cloud vendor, the network service provider, and the enterprise, Fortinet said.
During vendor selection, ask the cloud vendor what security services it provides and which security vendors it works with.
The cloud is a dynamic environment and requires regular updates to the security architecture to stay up with the latest threats. How does the cloud vendor guard against new security exploits and zero-day vulnerabilities?
Also find out where the boundaries are in the shared security models that come with the cloud service.
Understand the extent of your cloud provider’s responsibilities – and your own. In some cloud services, such as IaaS (Infrastructure-as-a-Service), it is the responsibility of the enterprise to secure its applications and data in the cloud.
It is therefore important to know what security appliances and vendors the cloud provider offers or allows the enterprise to deploy in the cloud to do just that.
2) New apps, new fortifications
Before you move an application into the cloud, consider adding new fortifications to the existing security measures you have built around your application’s authentication and login processes.
To fortify the access to your cloud application, you should have a granular data access scheme. You can do so by tying access privileges to roles, company positions and projects.
This will add an additional layer of protection when attackers steal your staff’s login credentials, Fortinet said.
Account hijacking may sound basic but this age-old breach has been flagged by the Cloud Security Alliance as a continuing top threat for cloud users.
To fortify your login process, consider implementing two-factor authentication (2FA), posture checking and the use of one-time passwords.
A good tip is requiring user IDs to be changed at initial logins.
3) Embrace encryption
Data encryption is one of your biggest security allies in the cloud, and it should be non-negotiable when it comes to file transfers and emails, Fortinet argued.
While it may not prevent hacking attempts or data theft, it can protect your business and save an organisation from incurring hefty regulatory fines when the dreaded event happens.
Ask your cloud vendor about their data encryption schemes. Find out how it encrypts data that is at rest, in use, and on the move.
To understand what data should be encrypted, it helps to get a handle of where they reside – whether in your cloud vendor’s servers, the servers of third-party companies, employee laptops, office PCs, or USB drives.
4) Wrestling with the virtual
Physical security appliances are typically not designed to handle the data that is in the cloud. This is where virtual security appliances come in – to secure traffic as it flows from virtual machine to virtual machine.
Such appliances are built to handle the complexities of running multiple instances of applications, or multitenancy. They therefore let businesses exert fine security control over their data in the cloud.
Ask your cloud provider how it safeguards its virtual environment and find out what virtual security appliances it is using.
If you are building your own private or hybrid cloud, consider getting virtual security products that focus on granular control.
5) Don’t be in the dark about shadow IT
There is no shortage of anecdotes and reports out there that point to how the unauthorised use of applications and cloud services, or shadow IT, is on the rise among businesses. The uncontrolled nature of this poses a security threat and governance challenge.
Your new cloud application will be at risk because of this.
Consider the simple scenario in which your employees use their smartphones to open a file on their device. It is likely that the phone will make a copy of the file, which could then be sent to an unapproved online storage destination when the phone does its routine automatic backup.
Your secure corporate data has just been moved to an insecure location.
Preventing access to shadow IT is unlikely to stop its growth in any given organisation. It is more effective to educate your users and use technology to manage the issue.
Encryption, network monitoring and security management tools can help defend your first cloud app against the risks of the shadow IT.
Internal affairs: Threats within your organisation
The cloud: Three questions all businesses should ask
‘The cloud is safer than you think’
For more technology news and the latest updates, follow us on Twitter, LinkedIn or Like us on Facebook.
Author Name :
By commenting below, you agree to abide by our ground rules.