As cloud computing has evolved, weve entrusted more and more of our data to it. Our everyday correspondence is in the cloud. Our favorite applications are in the cloud, and, more and more, our most sensitive data is in the cloud. To protect the integrity of your organizations assets, youll need a comprehensive cloud security strategy.
However, the cloud isnt a single piece of hardware or software. Its a complex ecosystem of computers, routers, apps, websites, files, services, and more. As such, your organizationssecurity posturehas to be just as versatile and flexible as the systems it protects.
Crafting a cloud security strategy in 2024 requires a clear understanding of modern threats, countermeasures, and best practices. With the right knowledge and tools at your disposal, you can educate your staff, secure your data, and take full advantage of what the cloud has to offer.
Because the cloud encompasses so many different systems, it can be difficult to pin down exactly what a modern cloud security strategy should look like. In broad terms, cloud security refers to any process thatsafeguards data in the cloud, whether that data is in an app, a file storage system, or a development platform. This means implementing smart security policies, and updating them over time as threats change.
Cloud computing hasbeen around since the 1960s, but didnt become widely available until the 1990s. As cloud computing has advanced, security protocols have had to keep pace with it. Early cloud security solutions could control access to remote systems and offer basic data protection, but not much else.
Over time, cloud security has become more sophisticated. Todays security solutions offer continuous monitoring, real-time incident response, and a focus on theshared responsibility model. Essentially, employees are responsible for keeping their own data secure, while organizations and service providers are responsible for keeping the systems that store the data secure.
While no two organizations will employ the exact same protocols, there are a few elements that every good cloud security strategy needs:
As of 2022,60% of all corporate datalives in the cloud and that number is not likely to go down anytime soon. As organizations shift their resources from local servers to cloud apps, company policies must evolve to address a different set of security risks. IT and security teams need to be aware of the latest cybersecurity threats as well as the countermeasures for them.
The world of cybersecurity moves fast. Security researchers find an average of72 new vulnerabilities per day. A good security suite can block most of these potential exploits but probably not all of them. To keep pace with emerging threats, your organization should be proactive. Resources such as theLookout Threat Intelligence Platformcan keep you apprised of new vulnerabilities as they emerge and help you analyze current patterns and trends. You should alsoassess your security postureregularly, and have solid, actionable plans in place to deal with threats of varying severity.
Depending on your organizations field, you may have to comply with governmental or industry regulations. The finance, manufacturing, education, retail, and transportation industries, for example, must hold their sensitive data toespecially strict standards. Organizations that do business in Europe have to follow GDPR guidelines, while theHealth Insurance Portability and Accountability Act (HIPAA)protects patient privacy in the United States. These regulations apply whether you store your data on premises or in the cloud.
There are two major threats to any cloud-based system: external threat actors and internal misuse. A sound cloud security strategy must account for both. To lay the foundation for a solid security posture, you should verify users constantly, restrict access to sensitive data, and protect data when its in use.
Not every employee needs to access every piece of data at your organization. The principle of least privilege grants employees the absolute minimum level of clearance they need to do their jobs. For example, an intern might only be able to access clerical data, a manager might be able to access sensitive records, and an IT specialist might be able to access just about everything. Minimizing privileges reduces the risk of unauthorized access, and limits how much damage an attacker could do with a compromised account.
Older cloud security systems focused on access control, or determining which users were authorized for certain systems. While access control is a good starting point, it doesnt help with accidental data leakage, misconfigured permissions, or compromised accounts.
Instead, your security team should adopt adata-centric approach. Data-centric solutions focus on classifying sensitive data appropriately, and either granting or limiting access on a file-by-file basis. Implementing a DLP policy can help you analyze data usage patterns, grant or deny access situationally, and encrypt files at every stage of the process.
Modern-day threat actors frequently use mobile devices as an entry point into corporate systems. Thats why any mobile device with access to your corporate resources needs to be secured. Many organizations usemobile device management (MDM)to keep track of corporate-owned devices, but MDM doesnt cover employees personal devices.Mobile endpoint securitycan complement your existing MDM while giving you more comprehensive coverage over corporate and personal devices.
Shadow IT refers to employees using unapproved technologies to do their jobs, rather than relying exclusively on company-issued tools. This issue has become even more pervasive with the rise of remote work andbring-your-own-device (BYOD) policies. While shadow IT isnt necessarily a bad thing, you do need to account for it in your cloud security strategies. Acloud access security broker (CASB)acts as an intermediary between your workers and the cloud, helping you identify and monitor third-party apps.
In the past, organizations favored virtual private networks (VPNs) and identity access management (IAM) services to facilitate remote work. However, these tools are binary: either a user is logged in, or theyre not. That makes VPNs and IAMs relatively easy to compromise, especially with a stolen device orsocially engineered credentials.
Zero trust network access (ZTNA)is a more nuanced and more secure option for remote access. With ZTNA, you can analyze user behavior and grant granular access to sensitive data. Depending on an employees device, location, and network security, a ZTNA solution could let them into your system right away, or require them to complete multiple login and multi-factor authentication (MFA) challenges.
Anything in the cloud is, by definition, on the internet, and storing files on theinternet presents different security risksthan storing them on a local machine. Cloud files are subject to social engineering attempts, compromised employee accounts, and malware kits. Asecure web gateway (SWG)can neutralize many of these threats by analyzing internet traffic, enforcing acceptable use policies, and blocking potentially dangerous URLs and IP addresses.
While your employees are your best defense against cybersecurity threats, they may also be your largest source of uncertainty. Their access patterns and endpoints can change rapidly from assignment to assignment. That could make improper data usage or worse, a compromised account hard to spot.User and entity behavior analytics (UEBA)can learn normal employee behavior over time and flag suspicious behavior based on login location, frequency of access, data sharing habits, and more.
Azero-trust modelassumes that anyone attempting to access your organizations systems could be a threat actor. Instead of logging in once and staying logged in, a zero-trust approach makes employees enter their usernames, passwords, and MFA credentials on every device, in every location, and on every network. While this adds a few extra minutes of work for employees each day, it also makes it incredibly difficult for stolen devices or compromised passwords to threaten your sensitive data.
With the right credentials in hand, a threat actor may need only a few minutes to pull off a complicated attack. Real-time monitoring allows you to flag and analyze incidents as they happen, rather than after the fact. Ensure that your security solution provides monitoring features, and have a plan in place to report, contain, and neutralize incidents as they happen. Be sure that this plan includes a way to restore normal operations as quickly as possible.
Unless you test your systems, you wont know for sure whether they can actually deter a cyber attack. Perform regular security assessments that test your organizations access controls, encryption, network segmentation, and intrusion detection capabilities. Frequentvulnerability management, where you scan for and patch known vulnerabilities, can help your assessments succeed.
You should also perform regular security audits. Rather than testing your systems directly, audits review your security control settings and address any instances of noncompliance. Communicating the results of these audits is also a good way to let the rest of your organization know what youre doing to promote cybersecurity behind the scenes.
Teach your employees about common cybersecurity threats, including phishing, password spraying, and unsolicited downloads. Ensure your workers know how to craft strong passwords and change them frequently. Learn about the data permissions they need to do their jobs and explain how they can responsibly store, modify, and share that data.
You should also have a system in place for reporting security issues. Once your employees know what to look for, they should be able to spot phishing attempts, internal vulnerabilities, and malicious websites. Not only will this help keep your data safe, but your staff may also feel more invested in your organizations cybersecurity practices.
Cloud computing is a huge, complex, and occasionally unwieldy concept. As such, your organizations cloud security strategy needs to be robust, versatile, and adaptable. However, relying on dozens of different tools is time-consuming and can result in an inconsistent security posture. Asecurity service edge (SSE)solution combines SWG, ZTNA, and CASB technologies into a comprehensive platform. TheLookout Cloud Security Platformis a data-centric SSE solution with built-in DLP and UEBA capabilities.
For more information on how to manage and protect your data in the cloud, read the Lookout report onHow to Build an Effective Data Security Strategy. In it, youll learn why cloud computing has become so popular and why this popularity makes it a tempting target for threat actors. The report suggests five practical steps to safeguard your organizations data, from performing continuous risk assessment to identifying unsanctioned apps. Once you know the risks, your organization can leverage the clouds full potential.
Blog courtesy of Lookout. Regularly contributedguest blogsare part of MSSP Alertssponsorship program. Read more Lookout news and guest blogs here.
The rest is here:
Crafting a Robust Cloud Security Strategy in 2024 - MSSP Alert
- Open source cloud computing slow to catch on, survey finds [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Oracle CFO: no acquisitions needed to compete in cloud [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- IDC Survey: U.S. Corporations Aim to Tackle IT Challenges with Cloud Computing [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Where does the ICO's new cloud guidance take you? [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- ChinaSoft International Signs Strategic Cooperation Agreement with Alibaba Cloud Computing to Develop PaaS Platform [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- IT Leaders Forum: Shedding light on cloud computing [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Oracle Public Cloud Computing [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Oracle Cloud Computing - Video [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Cloud Computing 101 - Video [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Lenovo Gets Into Cloud Computing - Video [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Cloud Computing Certification Training | Cloud Computing Training By Simplilearn - Video [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Cloud Computing - Video [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Succeeding or Failing with Cloud Computing - Video [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Demystifying the Cloud - Video [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- N: Cloud Computing, Syria PM Defects, US to Clean Agent Orange and MORE! - Video [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Cloud Computing - Tv9 - Video [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- AWS 101 Cloud Computing Seminar-Bangalore - Video [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Trust - The Key to Cloud Computing Growth in Europe [Last Updated On: October 6th, 2012] [Originally Added On: October 6th, 2012]
- Cloud Computing Saves Health Care Industry Time And Money [Last Updated On: October 6th, 2012] [Originally Added On: October 6th, 2012]
- Synnex CEO Kevin Murai: Tablets, Mobile, Cloud Computing (p3) - Video [Last Updated On: October 6th, 2012] [Originally Added On: October 6th, 2012]
- Enterprise computing IS the cloud [Last Updated On: October 8th, 2012] [Originally Added On: October 8th, 2012]
- 44 Percent Of US Execs To Tackle IT Challenges Through Cloud [Last Updated On: October 8th, 2012] [Originally Added On: October 8th, 2012]
- ZapThink Announces Expansion of Cloud Computing for Architects Course [Last Updated On: October 9th, 2012] [Originally Added On: October 9th, 2012]
- Euro Zone Eyes Cloud Computing to Kick Start Economy [Last Updated On: October 9th, 2012] [Originally Added On: October 9th, 2012]
- Advantages, challenges of cloud computing discussed Oct. 10 at NJIT [Last Updated On: October 10th, 2012] [Originally Added On: October 10th, 2012]
- Dell Expands Cloud Client Computing Solutions for VMware View®, Desktop as a Service and Channel Offerings to Europe [Last Updated On: October 10th, 2012] [Originally Added On: October 10th, 2012]
- Cloud West to Focus on Entertainment Delivery, Network Infrastructure, and Investment, More at Nov. 8-9th Forum [Last Updated On: October 10th, 2012] [Originally Added On: October 10th, 2012]
- IBM, AT&T Offer Secure Passage to the Cloud [Last Updated On: October 11th, 2012] [Originally Added On: October 11th, 2012]
- Cloud computing company hits new fundraising heights [Last Updated On: October 11th, 2012] [Originally Added On: October 11th, 2012]
- Cloud computing firm hits new fundraising heights [Last Updated On: October 11th, 2012] [Originally Added On: October 11th, 2012]
- Cloud computing: here we go again [Last Updated On: October 11th, 2012] [Originally Added On: October 11th, 2012]
- Chinese Want to Put Computer 'Brains' in the Cloud [Last Updated On: October 11th, 2012] [Originally Added On: October 11th, 2012]
- CenturyLink Unveils Cloud Product [Last Updated On: October 12th, 2012] [Originally Added On: October 12th, 2012]
- Cloud Security Evolves in Wellington [Last Updated On: October 14th, 2012] [Originally Added On: October 14th, 2012]
- 2X ApplicationServer XG Joins the Intel AppUp SMB Service Hybrid Cloud [Last Updated On: October 15th, 2012] [Originally Added On: October 15th, 2012]
- Piston Cloud to Exhibit and Present at the 2012 OpenStack Summit in San Diego [Last Updated On: October 15th, 2012] [Originally Added On: October 15th, 2012]
- How to get your first cloud computing job [Last Updated On: October 15th, 2012] [Originally Added On: October 15th, 2012]
- DreamHost Adds Public Cloud Computing Service: DreamCompute [Last Updated On: October 15th, 2012] [Originally Added On: October 15th, 2012]
- Aryaka Receives 2012 Cloud Computing Excellence Award [Last Updated On: October 17th, 2012] [Originally Added On: October 17th, 2012]
- Making a Europe fit for the cloud [Last Updated On: October 17th, 2012] [Originally Added On: October 17th, 2012]
- Cisco Execs Plumb The Limits Of Cloud Computing [Last Updated On: October 17th, 2012] [Originally Added On: October 17th, 2012]
- Cloud firm invests in new network [Last Updated On: October 17th, 2012] [Originally Added On: October 17th, 2012]
- AirWatch Receives 2012 Cloud Computing Excellence Award [Last Updated On: October 17th, 2012] [Originally Added On: October 17th, 2012]
- Dell Extends Cloud Client Computing Portfolio with New Solutions Validated by Citrix [Last Updated On: October 17th, 2012] [Originally Added On: October 17th, 2012]
- Pano Logic and Alliance InfoSystems Join Forces to Deliver Zero Client Computing [Last Updated On: October 17th, 2012] [Originally Added On: October 17th, 2012]
- 5 Cloud Business Benefits [Last Updated On: October 17th, 2012] [Originally Added On: October 17th, 2012]
- Alteva Receives 2012 Cloud Computing Excellence Award [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- Open Text profit beats estimates on cloud services [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- Cloud computing improves nurse call system [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- Cloud computing: Top five tax considerations for your business [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- OKI and ISID to Provide Chemical Information System as Cloud Computing Services [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- As Mobile Grows, So Does Cloud Computing [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- IBM Analytical Decision Management SaaS - IBM Cloud TechTalk October 2012 - Video [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- JAX London 2012: Achieving genuine elastic multitenancy with Waratek Cloud VM for Java - Video [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- Microsoft 2020 technology future vision - Video [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- Infinity Cloud Point of Sale and Complete Retail Suite.mp4 - Video [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- Small Business IT Support, Computer Support, Web Design Atlanta - Video [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- Cloud Computing - Simplified - Video [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- How Allied Valve Used the Cloud to Expand in Bakken Oilfield - Video [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- Cloud Computing in the Public Sector - Video [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- Cloud Computing | Sacramento | Data Protection | IT Consulting | Symmetry Managed Servces - Video [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- The Business Value of Cloud Computing - Video [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- GYMNAZO Owner/Coach Michael Hughes is excited about edufii - Video [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- Automation in the age of cloud computing - Video [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- Cloud Computing.mp4 - Video [Last Updated On: November 1st, 2012] [Originally Added On: November 1st, 2012]
- Cloud computing in 2013: a conversation with Appcore's CEO [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- Cloud adoption growing in India: study [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- Eastday-Microsoft picks city for cloud computing [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- Towards a blue sky: How SMEs can avoid Cloud Computing confusion [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- Consultancy Services - Video [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- Axxis Solutions Sponsors FIBA Technical Seminar on Cloud Computing - Video [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- RightScale Webinar: 451 Research Webinar: Cloud Dos and Don'ts - Video [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- Apple Technology (Vishwa Bandhu Gupta) - Video [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- Mind Tree Ltd. - Video [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- BIM Cloud Computing [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- Entreda discusses cloud services for small and medium businesses - Video [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- Austin IT Company | Computer Networking [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- Cloud Computing and Services - After Effects Template - Video [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- FieldStorm App Tour - Video [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]
- The Hon Brendan O'Connor's speech: AccountRight Live launch event - Video [Last Updated On: November 3rd, 2012] [Originally Added On: November 3rd, 2012]