What you need to prepare for effective security in the cloud hasn’t changed, but how you do it must. Credit: Getty Images By Vinay Venkataraghavan, CTO – Technology Partnerships, Palo Alto Networks Cloud strategy is a top priority for nearly every organization today. The shift to the cloud has created tremendous opportunities, but also introduced new risks that must be managed. Many leaders who raced to adopt the cloud now want to know what it will take to be as secure in their cloud deployments as they are on-premises. Much of achieving the goal relies on two industry categories for cloud security technologies. Analyst firm Gartner refers to them as Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP). CSPM platforms help to define, configure, and monitor the state of cloud workloads and infrastructure deployments. CSPM capabilities are fundamental to be able to manage change and detect abnormal activity across all of an organization’s large-scale cloud assets. CWPPs, on the other hand, help protect cloud native workloads, including container- and microservices-based applications. Ensuring consistent, effective security across the many cloud environments organizations are running on today requires a platform that enables both CWPP and CSPM capabilities. Namely, it requires understanding the baseline of what is deployed and how it should work, and then being able to detect abnormalities while protecting applications and data. Keys to elevating cloud security posture Organizations should examine several vital areas when seeking to improve cloud security posture: File integrity monitoring: This is a cornerstone capability for application and data workload security—making sure files are not modified in unexpected or unauthorized ways.Microsegmentation: This is a best practice for cloud environments because in the cloud, the perimeter is not defined by a single ingress point that a single firewall can protect. With cloud native applications that have been decomposed into microservices, there is a need to minimize the attack surface. Microsegmentation accomplishes this by segmenting a virtual cloud network into small, well-defined slices with precise rules and policy for access.DevSecOps: Shifting security into the earliest stages of development can also help improve cloud security posture. With DevSecOps, security testing and compliance are integrated as code is developed, rather than vulnerability assessments being performed at the end of the application development process.Permissions management: This is a challenge many organizations face in the cloud. How many times have we all seen public reports of AWS S3 cloud storage buckets left open and exposed to the internet? Often, users will use overly permissive identity and access management (IAM) roles just because it’s easier than defining fine-grained access controls and permissions for resources. Tighter permissions are simply required for effective security. Security is a key component of the cloud operating model An increasingly common way to manage cloud deployments is with a cloud operating model that defines how services are deployed and managed. The cloud operating model enables organizations to represent all aspects of cloud infrastructure as code (IaC). Security should not be thought of as an independent layer in a cloud operating model. It has to be integrated at every layer to enable the most secure posture possible. A common approach for enabling IaC is with a tool such as HashiCorp’s Terraform or an AWS CloudFormation template. These resource templates can define how a service should be deployed. It’s critical that organizations manage and inspect these templates to make sure the default configuration for a service is secure and has the right network configuration and proper permissions to limit risk. By defining the optimal secure policy and integrating that into a cloud operating model, it’s possible to improve cloud security posture. Be prepared for the cloud Oftentimes, I tell CXOs that their security objectives haven’t changed with the cloud. Many of the best practices in the cloud match what has been done on-premises, with fundamental concepts like protecting the perimeter and assigning least-privileged access to resources. What has changed, however, is the scale and dynamism of the cloud and how that impacts security. Sure, some of the practices are similar, but how we facilitate it is different. We must react faster, and we need to be more proactive. There is a clear need to have platform capabilities that automate best practices, operate at cloud scale, and are ready to act at cloud speed. So, ultimately, what I offer to leaders is this: what you need to do for effective security in the cloud hasn’t changed, but how you do it must. To learn more, visit us here. About Vinay Venkataraghavan: Vinay has extensive experience in architecting, building cloud native, containerized applications, and security products. Vinay has spoken at many conferences including AWS reinvent, Google Next, and Microsoft Ignite, among others, and is passionate about sharing his knowledge to help enterprises secure their digital and cloud footprint. He believes that security does not have to be difficult to adopt and that automation along with DevSecOps is a winning combination. He has built numerous solutions and integrations that have made security cloud native. Related content brandpost Sponsored by Palo Alto Networks Operational technology systems require a robust Zero Trust strategy in 2024 Zero Trust provides a foundation for creating a stronger security posture in 2024. By Navneet Singh, vice president of marketing, network security, Palo Alto Networks Dec 05, 2023 6 mins Security brandpost Sponsored by Palo Alto Networks What is code-to-cloud security intelligence? Securing applications can only be achieved with a platform approach where developers and security teams share the same single source of truth. By Ankur Shah, SVP and GM of Prisma Cloud at Palo Alto Networks Nov 14, 2023 5 mins Security brandpost Sponsored by Palo Alto Networks Securing your AI-powered network transformation: A guide for C-suite leaders AI allows organizations to embrace digital transformation and customize platformization to visualize total infrastructure and manage security threats in real-time—meeting the potential challenges of 2024. By Anand Oswal, SVP of Product, Network Security at Palo Alto Networks Nov 09, 2023 4 mins Artificial Intelligence brandpost Sponsored by Palo Alto Networks Part 2: Guarding against sophisticated threats: Strategies for your best defense Advanced threats are often highly persistent and can rapidly pivot when encountering roadblocks. Keen insights uncover threat actors’ ability to perform deep reconnaissance to understand their targeted environments thoroughly. Learn more today. By Stephanie Regan with David Moulton Oct 25, 2023 2 mins Cybercrime Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe