Evolving your security operations strategy to fit the cloud

By Oliver Pinson-Roxburgh, Alert Logic

The decision to move to the cloud may seem an obvious one. It’s faster, more scalable, and more agile. However, security remains a concern, and rightly so. The foundational infrastructure delivered by cloud providers is secure, but guaranteeing the protection of the applications, workloads, and data you run on top of it is your responsibility—and it isn’t one to be taken lightly.

A traditional on-premises security operations strategy simply won’t cut it anymore. In its place, you need a cloud-specific security strategy to protect your critical data from an ever-growing variety of advanced threats. Outlined in this article are four elements for any security official to consider when making the jump to a cloud system.

Deployment speed

The speed of the cloud is a huge asset, but it also can be a major issue when it comes to security. Traditional security approaches aren’t suited to the speed of the cloud, where development and deployment happen simultaneously.

Perimeter security tools will often focus on securing applications after a development cycle is completed, and once the updates are deployed—which doesn’t work with cloud innovation, where development is a constant.

Consequently, you need to shift your security operations strategy in order to meet the accelerated development process. Your cloud-based applications can then be continuously developed and deployed, while also conforming to the regulatory requirements that help keep your organisation both secure and compliant.

Elastic perimeters 

In the world of traditional security, cybersecurity architectures rely on network and application assumptions about static IP addresses, fixed perimeters, and choke points. This type of security doesn’t translate naturally to cloud environments.

In the cloud, security perimeters are in constant flux and with traditional security solutions unable to keep up with the changes, it results in security gaps and a much larger attack surface that generates thousands of possible security events, each requiring investigation.

To address the challenge of constantly moving elastic security perimeters and the high volume of security events generated, you need to design your security operations strategy around detecting vulnerabilities and identifying attacks in real time without getting bogged down and sifting through a flood of noise and false positives.

Evolving threats

Threat profiles within the cloud are constantly changing. It’s of the utmost importance to keep pace with the threat landscape as it evolves and continue educating yourself on the newest attack methods.

Tools and training cannot be a one-time investment, and conversely, requires constant attention to keep cybersecurity threat detection tools up to date, patched, and working in an integrated fashion—on top of constantly retooling and training to keep pace with the increasing frequency, sophistication, and diversity of global threats.

Your security operations strategy must include teams that are equipped with the latest tools, threat intelligence, security content, training, time, and budget to stay ahead of new security threats.

Personnel shortage

Finally, there is a shortage of one million workers in cybersecurity in the US alone. 62 percent of organisations say that it takes over three months to fill open information security positions within their organisation, or that they can’t fill those positions at all. 

Even if all candidates in the hiring pool had the specific expertise required be knowledgeable about cloud and hybrid security threats, there simply aren’t enough experts out there to provide the 24/7/365 real-time monitoring required to solidify the security of your applications, workloads, and data.

It’s a numbers game you will ultimately fail to win, so you must account for that when planning your cloud security strategy.

What’s abundantly clear is that companies developing in the cloud need to adjust their security operations strategy to fit new and emerging requirements.

Before the cloud, the main question of cybersecurity was what was the best way to build out your security operations team. But for the cloud, the question is about whether it even makes sense to build it in-house or not.

Today, it’s virtually impossible for most companies, except for the largest, to build out their own security operations centre (SOC), and manage recruiting and retaining staff. For most organizations it’s simply too expensive, costing millions of dollars per year to maintain, and, for all the reasons above, companies are often not prepared to deal with the new demands of cloud security.

That’s why most companies now are considering a Security-as-a-Service solution. Rather than building cloud security capabilities themselves, they’re buying cloud-native solutions along with round-the-cloud coverage by certified security analysts to identify, verify and escalate real threats.

By using a fully managed Security-as-a-Service, cloud security management is simplified into a single service. Security-as-a-Service solutions provide companies with cloud-based security and compliance reporting, backed by security experts to manage those solutions 24/7/365, allowing companies to focus on what they do best—instead spending their time worrying about security.

Oliver Pinson-Roxburgh is the EMEA Director for Solutions Architecture at Alert Logic,  a cloud security solution provider that helps clients to address security concerns in the cloud and more traditional networks.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s