Secure the Cloud—All Hands on Deck
The cloud is storming. There has been intense surge of cloud adoption in businesses throughout every vertical over the past year, but I believe this astonishing trend is only the beginning. I feel that a massive, measured adoption of the cloud will continue, but—perhaps even more shockingly—without the security planning, controls, tools, and skillsets that would be considered standard when protecting a traditional technology infrastructure.
It’s time for all hands on deck when it comes to protecting the critical cloud infrastructure of our businesses. Cloud adoption is forging value propositions that impact every function within an organization and creating larger attack surfaces as a result. Security teams of all types, no matter their background or experience, must now be security champions within every department, including DevOps, HR, Sales, and Finance. Security is now a critical seat at the business table with a lofty goal of protecting everything everywhere—and especially in the cloud. Cloud security requires a major shift in mindset and operational capability to properly secure an organization.
Some businesses may not categorize themselves as cloud adopters, but all it takes is utilization of Microsoft’s Office 365 Suite or a SaaS application for critical business data to live in the cloud. This is why we’re at a critical juncture where almost every organization needs to strategize, architect, and adopt a secure cloud methodology to ensure identities, data, and workloads are protected and secure.
In that light, here are 3 critical components to securing your organization’s cloud implementation:
Protecting the Cloud
Look for future topics in this CRITICALSTART series on how to secure your cloud infrastructure, including in-depth reviews of:
- Zero Trust Cloud Security
- DevSecOps
- CSPM (Cloud Security Posture Management)
- Cloud IR (Incident Response)
Framework
Most security practitioners recognize from experience that frameworks add clarity and context to cybersecurity program development on many levels. The same is true when selecting cloud-oriented frameworks, and many organizations often mix traditional risk-centric approaches with common threat vectors to formulate a valid framework. A typical approach is to map NIST CSF guidelines and standards, especially if already prevalent in the current framework, to a cloud security provider like Amazon’s AWS or Microsoft’s Azure to bridge language, processes, and expertise back to the business where the security team has already communicated proven value. For security operations specialists, mapping controls around MITRE ATT&CK Cloud Matrix can also be extremely valuable in determining threat vectors and risks to the organization while determining current capabilities or uncovering gaps. But a good framework is only the start for most businesses to secure their digital transformations.
Secure Architecture
Architecting a holistic security implementation in the cloud alongside ever-changing business requirements is an enormous challenge. It’s an art as much as a science. Different skillsets are required for weaving a secure setup in the cloud compared to traditional infrastructure. The security team’s mission is to protect the business, so whether this capability exists in-house (which is rare) or if resources are needed to augment and architect a secure space that can be executed upon, great care should be taken in creating foundations for a successful program. Be sure to account for the breadth of cloud business operations including: CSP (AWS, Azure, GCP, etc.), Applications (both custom and SaaS), Data/DB Repositories (data types and integrations), and Identity and Access Management (IAM/PAM). Gain as much insight over the complete cloud deployment as possible by understanding any current operations through visibility tools that assist in identifying specifics that may help craft a true and potent cloud security plan.
Cloud Security Tools
Knowing which tools to look for and procure is paramount, as many of the security tools utilized today by organizations simply don’t translate—well or at all—to the cloud. This can be frustrating and hard to navigate, especially when leveraging hybrid cloud infrastructures. The list below, while not an in-depth look at the cloud security landscape, is developed from leading organizations in the cloud security space. It’s concise and segmented via overall prioritized categories and can provide a good starting point for your organization.
Identity
- SSO, MFA, PAM (Privileged Access Management)
- API, Non-human Access, Tokens
Applications (a.k.a. DevSecOps or Shift Left Cybersecurity)
- Application Security Testing (SAST, DAST, IAST, RASP)
- Code Vulnerability Remediation
- API, Microservices
Network & Routing
- SASE, WAF
- Microsegmentation
- CASB, SD-WAN, CDN
Data
- DLP (Data Loss Prevention)
- Encryption At-Rest & In-Transit, Key Management
Workloads & Containers
- EDR (Endpoint Detection & Response) & Workload Protection
- Container Orchestration Pre-Deployment & Runtime Security
Security Operations
- CSPM (Cloud Security Posture Management)
- Log Management & SIEM (AWS GuardDuty or Azure Security Center)
- Automation, UBA (User Behavior Analysis), SOAR
- MDR (Managed Detection & Response)
These strategies come directly from successful cloud security implementations both large and small. As you reference this guide in the development of your own cloud security program, be sure to watch for a series of new topics including:
- Zero Trust Cloud Security
- DevSecOps
- CSPM (Cloud Security Posture Management)
- Cloud IR (Incident Response)
These in-depth reviews should provide a solid starting point, but if you need any further clarification on fully integrated toolsets with your cloud security program, please reach out and mention me specifically. It’s an exciting privilege to share more insights around this incredibly important topic!
Mitchem Boles, CCSP, CISSP, AWS
Additional Resources:
Secure your infrastructure. Meet compliance standards. Reduce risk. Learn more about CRITICALSTART’sCybersecurity Consulting Service.
Interested in Vulnerability Management? Our team will identify, classify, prioritize, remediate, and mitigate software vulnerabilities. Learn more.
Ready to talk to an Expert? Contact us now.
Stay Connected on Today’s Cyber Threat Landscape
RELATED RESOURCES
- Webinar
Analyst-Led, AI-Assisted: The Future of Cybersecurity Defense
Discover how human expertise and AI innovation are transforming the way organizations combat cyber t... - Webinar
Critical Start Platform Updates
We are excited to announce the latest enhancements to Critical Start’s Cyber Operations Risk &... - Datasheet
Critical Start Asset Visibility
Critical Start Asset Visibility gives you a single source of truth for your asset inventory, uncover...
RESOURCE CATEGORIES
- Buyer's Guides(1)
- Consumer Education(40)
- Consumer Stories(2)
- Cybersecurity Consulting(7)
- Data Breaches(15)
- Data Privacy(43)
- Incident Response(2)
- Interview(51)
- MDR Services(77)
- MobileSOC(9)
- News(5)
- Press Release(96)
- Research Report(11)
- Security Assessments(4)
- Thought Leadership(20)
- Threat Hunting(3)
- Video(1)
- Vulnerability Disclosure(1)