Philippe Lignac - discussing sales techniques, sales negotiations, sales management and other business topics

Jun 7, 2019

Cloud security - Busy Securing the Fort when Users Leave the Door Open?

07 June Posted by Philippe Lignac No comments


Busy Securing the Fort when Users Leave the Door Open?

















There have been few technological innovations that have impacted the course of business processes as much as the cloud. The promise of the cloud offers faster communications, greater collaboration, and a more profitable bottom line. Conversely, cloud infrastructure also creates new security vulnerabilities which enterprises struggle to patch.

It is a never-ending work for the enterprise security team to select, deploy and configure the best security solutions for their environment.

However, on a day to day basis they are faced with the ONE consistent problem that continues to plague security solutions worldwide. Is the generation of too many alerts to the enterprise security teams and the burn out of professionals overwhelmed by a false positive?

The most dangerous and insidious threat of all

Whilst your security team focus on perimeter defenses and endpoint security, there is one element that your CISOs could easily deal with. This is probably the most dangerous and insidious security threat your company have to face with: “The internal misconfiguration of cloud resources.”

Cloud misconfiguration is one of the most preventable, yet common security issues facing organizations migrating to the cloud today.

A simple misconfiguration to set a single option in a company’s cloud service can create a major security risk for the organization and its customers. Almost every day, news of a new data breach spreads like wildfire online. Virtually everyone with any kind of digital footprint has fallen victim to having their personal information made public.

A Common Issue “Cloud Misconfiguration” 

Misconfiguration means that the public cloud server instances, such as storage and compute, are configured in such a way that they are vulnerable to breaches.

Cloud misconfiguration is a matter of human error. In many cases, dev ops or IT professionals accustomed to local infrastructure attempt to recreate their local solutions in the cloud, uneducated and unaware of the intricacies of working with a cloud provider’s particular set of features.

Run Books? Who reads manuals?

The cloud has created a lot of excitement within organizations and many departments such as DevOps, Marketing, Sales, Product development people are busy giving their company a new competitive edge in their respective markets and use cloud resources to do so.  The reality is that cloud configuration is complex, and many companies are still immature. Even though companies are using run books and best practices documents, users simply forget to follow the rules.

While simple misconfiguration seems like a “duh, dummy” moment, the reality is, if it's not done right any security systems layered by the security department on top of your cloud can’t stop hackers running away with your data.

So, what are you to do?

  • Use a cloud management company, such as Cass, which will use their supervision tool to constantly monitor your cloud resources and immediately spot configurations holes.
  • Protect your security team from false alerts, by using the experts within Cass to diagnose and filter the wave of alerts.
  • Go straight to the answer by using Cass recommendations to fix the security mishap.

The complexities of cloud computing, and the chance of human error will hurt you if you do not do anything and can ruin all the security measures you are putting in place to keep undesirable visitors out.


0 comments:

Post a Comment