Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Cloud Considerations Beyond Security

While securing cloud systems is a top priority, if organizations can’t satisfy auditors that regulated data is being managed in a way that is compliant – the move to the cloud may be a non-starter.

While securing cloud systems is a top priority, if organizations can’t satisfy auditors that regulated data is being managed in a way that is compliant – the move to the cloud may be a non-starter.

For most organizations, securing the cloud just isn’t enough. As surprising as that may be to some technologists, sound security – as difficult as it is – is not enough. Beyond keeping data secure, many (if not most) enterprises must also answer to any number of government, industry, and internal regulatory compliance and policy obligations. This means that in addition to securing various systems, as I covered in my previous column, “Considerations for Ensuring Security When Moving to the Cloud,” the security controls that are in place must be verifiable and reportable to any governing authority.

Cloud Computing and ComplianceThere are many ways that a move to the cloud can affect compliance efforts. A very important consideration is the cloud’s impact on data governance. How securely is your data being managed by the cloud provider? How can you (if it’s even possible) collect the information needed to report on who had access to the data? When did they access that data? Should they be able to have access in the first place? And what did they do with the data? Questions like this demonstrate where security and compliance collide.

It also highlights one of the biggest challenges: where do the security obligations with the cloud provider end, and where do they begin? The answers will be quite different depending on the cloud services in question, for example whether it is a Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), or public or provided cloud. In fact, the answers to these questions may affect whether it is safe to move data to a particular cloud service. It is vital and necessary to put in place appropriate controls to both protect your data, and also make certain that it meets regulatory compliance obligations.

Centralized Identity is a Foundation to Cloud Security and Compliance. When data is moved to the cloud, identity and access control plays a central role for both security and regulatory compliance. This is a much more significant issue than simply managing identities “in the cloud.” Enterprises need to find technologies that enable them to extend the enforcement of access rights from their on-premise systems out to their SaaS and cloud environments. This way, users who don’t currently have access to protected customer information, or any other sensitive information with on-premise applications, won’t inadvertently end up with access on your cloud systems. Not only is this important, but having identities properly managed across these systems means that when your organization is audited, it’s straightforward to verify who has access to what data.

These capabilities are important for managing users and data, and also for workloads. Consider the example of a virtual machine that contains financial information significant to a public company. Because of its Sarbanes-Oxley relevance, this virtual machine can’t be allowed to run outside a certain controlled and secure internal domain. But if identity and related policy information can be encapsulated within the workload, it can be stopped should someone try to shift that workload to an off-premise cloud.

Another reason why it is important for an identity management capability to be able to span physical, virtual, and cloud systems is because this eliminates the need for entirely different identity management systems for each environment. Such a hodgepodge could require entire various subsets of controls, across many disparate systems, for example for regulations such as the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), and others. Having the ability to centrally manage identity throughout all of these environments will make your compliance management and governance initiatives much more straightforward. For example, there would be no need to add new controls for HIPAA in a move to a private cloud – it could be as straightforward as extending the existing identity policy to the new cloud environment.

In another scenario, consider employees that leave the company or have their job roles change. It is more manageable if access can be centrally de-provisioned, or their access privileges updated across all the various cloud, virtual, and physical systems. If such centralized identity management isn’t in place, the risk of leaving orphaned accounts in various environments escalates significantly.

Additionally, it is important to use other monitoring tools, when possible, to observe the effectiveness of the policies and controls in place. This would include log monitoring, identity and access management reports, security information and event management. These tools should also be integrated with your identity and access management system whenever feasible.

Advertisement. Scroll to continue reading.

Many enterprises have already virtualized much of their environment, and they’re increasing their use of cloud services. This is rapidly shifting where data is located, and how IT systems are managed. The need for the security and compliance controls that enterprises have used for years on-premise is not going away – in fact, they need to be extended to cloud environments. Few technologies, if any, are as important as those that achieve a capacity to handle identity management.

Read More in SecurityWeek’s Cloud and Virtualization Security Section

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...