By Vinay Venkataraghavan, CTO - Technology Partnerships, Palo Alto Networks\n\n\n\nCloud strategy is a top priority for nearly every organization today. The shift to the cloud has created tremendous opportunities, but also introduced new risks that must be managed. Many leaders who raced to adopt the cloud now want to know what it will take to be as secure in their cloud deployments as they are on-premises.\n\nMuch of achieving the goal relies on two industry categories for cloud security technologies. Analyst firm Gartner refers to them as Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP).\n\nCSPM platforms help to define, configure, and monitor the state of cloud workloads and infrastructure deployments. CSPM capabilities are fundamental to be able to manage change and detect abnormal activity across all of an organization\u2019s large-scale cloud assets. CWPPs, on the other hand, help protect cloud native workloads, including container- and microservices-based applications.\n\nEnsuring consistent, effective security across the many cloud environments organizations are running on today requires a platform that enables both CWPP and CSPM capabilities. Namely, it requires understanding the baseline of what is deployed and how it should work, and then being able to detect abnormalities while protecting applications and data.\n\nKeys to elevating cloud security posture\n\nOrganizations should examine several vital areas when seeking to improve cloud security posture:\n\nSecurity is a key component of the cloud operating model\n\nAn increasingly common way to manage cloud deployments is with a cloud operating model that defines how services are deployed and managed. The cloud operating model enables organizations to represent all aspects of cloud infrastructure as code (IaC).\n\nSecurity should not be thought of as an independent layer in a cloud operating model. It has to be integrated at every layer to enable the most secure posture possible.\n\nA common approach for enabling IaC is with a tool such as HashiCorp\u2019s Terraform or an AWS CloudFormation template. These resource templates can define how a service should be deployed. It\u2019s critical that organizations manage and inspect these templates to make sure the default configuration for a service is secure and has the right network configuration and proper permissions to limit risk. By defining the optimal secure policy and integrating that into a cloud operating model, it\u2019s possible to improve cloud security posture.\n\nBe prepared for the cloud\n\nOftentimes, I tell CXOs that their security objectives haven\u2019t changed with the cloud. Many of the best practices in the cloud match what has been done on-premises, with fundamental concepts like protecting the perimeter and assigning least-privileged access to resources.\n\nWhat has changed, however, is the scale and dynamism of the cloud and how that impacts security. Sure, some of the practices are similar, but how we facilitate it is different. We must react faster, and we need to be more proactive. There is a clear need to have platform capabilities that automate best practices, operate at cloud scale, and are ready to act at cloud speed.\n\nSo, ultimately, what I offer to leaders is this: what you need to do for effective security in the cloud hasn\u2019t changed, but how you do it must.\n\nTo learn more, visit us here.\n\n\n\n About Vinay Venkataraghavan:\n\nVinay has extensive experience in architecting, building cloud native, containerized applications, and security products. Vinay has spoken at many conferences including AWS reinvent, Google Next, and Microsoft Ignite, among others, and is passionate about sharing his knowledge to help enterprises secure their digital and cloud footprint. He believes that security does not have to be difficult to adopt and that automation along with DevSecOps is a winning combination. He has built numerous solutions and integrations that have made security cloud native.