CIO Influence
CIO Influence News Cloud Security

Cloud Security Architecture Needs to Be Strategic, Realistic, and Based on Risk

Cloud Security Architect

Global IT research and advisory firm Info-Tech Research Group has released a new research blueprint to help organizations plan the components necessary to build a cloud security architecture. The blueprint walks organizations through how to identify risks and the security services required to mitigate them.

Top iTechnology Machine Learning News: Oracle Announces MySQL HeatWave ML the Easiest, Fastest, and Least Expensive Way for Developers to Add Powerful Machine Learning Capabilities to their MySQL Applications

The cloud is becoming increasingly more accessible and prevalent as a business enabler. Info-Tech’s research indicates that the cloud transition can bring tremendous value; however, it can also bring additional unforeseen risks. Access to new services and capabilities can be a game changer for organizations of all kinds. But, as with any change, the firm cautions that there is an element of risk, and IT needs to take steps to ensure that any cloud deployments meet security standards.

The cloud comprises five key elements, all of which need to be present for a service to be counted as a cloud service. The new research blueprint outlines these elements as the following:

  1. On-Demand Self-Service – The ability to spin services up without contacting the vendor, typically through a console.
  2. Broad Network Access – Resources can be accessed over the open internet.
  3. Resource Pooling – Resources are shared among cloud customers, though tenants are functionally walled off from one another.
  4. Rapid Elasticity – This is the ability to “pay as you go” and spin things up or down as needed.
  5. Measured Service – Cloud providers charge with granularity appropriate to the service model.

With many cloud vendors proposing to share the security responsibility, it can be challenging for organizations to develop a clear understanding of how they can best secure their data off-premises. The challenge for IT security professionals is enabling access to the features and capabilities that cloud services can provide without putting the organization at undue risk. Move too far in either direction, and the cloud deployment will not succeed due to over-encumbrance or failure to mitigate crucial security risks. Info-Tech recommends that security professionals understand the tools and strategies at their disposal to appropriately secure and govern their environments.

Top iTechnology SaaS News: DÜRR NDT Applauded by Frost & Sullivan for Digitizing and Streamlining Nondestructive Testing (NDT) Workflow With Its Seamless NDT Workflow Management Software

IT departments have been sharing responsibilities with third parties for years, from software vendors to managed service providers and consultants, cloud security is no different. The cloud brings this relationship into sharper focus, and old security techniques may no longer be as effective as they once were. Cloud providers are responsible for the security of the cloud. They manage the hardware, facilities, and other physical components of the cloud and some of the software and cloud networking. Organizations maintain responsibility for security in the cloud. Identity and access management, data classification, server-side encryption, and networking traffic are all areas that need to be managed by the cloud consumer.

Info-Tech’s blueprint explains that a cloud security architecture needs to be strategic, realistic, and based on risk. The NIST approach to cloud security is to include everything security-related into a cloud architecture to be deemed “secure.” However, it is possible to have a robust and secure cloud architecture using a risk-based approach to identify the necessary controls and mitigate services for a cloud environment.

As organizations continue to adopt a cloud environment, Info-Tech recommends organizations consider the following when planning the components needed to build a holistic cloud security architecture strategy:

  1. Cloud Security Alignment Analysis – Explore how the cloud changes and whether the enterprise is ready for the shift to the cloud.
  2. Business Critical Workload Analysis – Analyze the workloads to be migrated to the cloud. Consider the various domains of security in the cloud, taking into account the cloud’s unique risks and challenges as they pertain to the organization’s workloads.
  3. Cloud Security Architecture Mapping – Map the organization’s risks to services in a reference model to build a robust launch point for the security architecture.
  4. Cloud Security Strategy Planning – Map the organization’s risks to service in a reference architecture to build a robust roadmap.

Top iTechnology Quantum Computing News: Zapata Computing Earns DARPA Award for Quantum Benchmarking

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

AIG Appoints Roshan Navagamuwa as Executive VP and Chief Information Officer

Business Wire

indie Semiconductor Extends Radar Leadership with World’s First 240 GHz Silicon Transceiver

PR Newswire

Percona Announces General Availability of Percona Platform

Leave a Comment