Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

IT Pros Underestimate Number of Cloud Apps in Their Environments: CSA

A new survey from the Cloud Security Alliance (CSA) shows that many IT and security pros underestimate the number of cloud-based applications that are running in their environments.

A new survey from the Cloud Security Alliance (CSA) shows that many IT and security pros underestimate the number of cloud-based applications that are running in their environments.

The survey, which features responses from 165 IT and security professionals from around the world, found that 54 percent of respondents said they have 10 or fewer cloud-based applications running in their organization, with 87 percent indicating that they had 50 or fewer applications running in the cloud.

On average, that came to 23 apps per organization. But those estimates are far lower than commonly reported by vendors and research reports, which count more than 500 cloud apps present.  

“We found these results particularly interesting and at the same time concerning,” said Jim Reavis, CEO of the CSA, in a statement. “It’s hard to control what you can’t see. If you are only seeing one tenth of your actual cloud usage, it’s impossible to put cloud policies in place to protect users and data. This tells us that cloud app discovery tools, along with analytical tools on cloud app policy use and restrictions, are very important in the workplace, especially when it comes to sensitive data being used by cloud applications.”

Advertisement. Scroll to continue reading.

Rob Fry, senior information security architect at Netflix, said that the company thought before an audit it was using maybe 50 to 100 cloud providers internally.

“We discovered that there were there were over 600,” he said. “It was a big wake up call for us. We realized that the concept of trying to control it should just go away. We learned that you have to be in line and communicating with the business. We don’t want to dictate to business, telling them this is the next big thing and pick providers. We make an effort to go out and talk to users.”

Cara Beston, PricewaterhouseCoopers’ cloud assurance leader and a partner in its risk assurance practice, noted that automated software tools allow enterprises to identify existing and new cloud services that are communicating through the enterprise’s network.

“Additional analysis capabilities can help to identify the actual cloud service, IP addresses using the service, the location of use, extent of usage across the enterprise and the size of data downloads and uploads from the service,” she said.

She tied the growth of shadow IT to the explosion of SaaS offerings supporting relatively discrete business and operational processes. Today’s employees, she said, have easy access to standard solutions for managing human resources, customer relation management systems and other back office functions with low to no upfront investment or ongoing operating expense, which allows them to make decisions about using technology without going through traditional procurement, business or IT approval processes.

Juan Walker, principal security strategist at EMF Broadcasting, said his company had to get out in front of the issue of shadow IT, and has a few discovery processes in place to detect applications.

“When we find something we advise on best use cases and security,” he said in an email. “We have also developed a trusted advisor and consultant relationship [with] business units. In most cases they come to us for advice before deploying – especially when it has infosec implications. “

“If we find an application we don’t want in the environment,” he added. “We recommend others that are safer to use.”

The last resort, he said, is to block applications within the environment and on company-issued devices.

The survey, which was sponsored by Netskope and Okta, also found that the vast majority of the respondents have policies and procedures in place to protect data and compliance. Nearly 80 percent of policy enforcement in cloud apps is in cloud storage and cloud backup, indicating serious concerns about data leakage and protection. Additionally, when it comes to bring-your-own-device (BYOD) policies, more than 50 percent of respondents report having a BYOD policy, and more than 80 percent believe it is at least somewhat followed.

“Beyond raising awareness around cloud service risk, the findings here are intended to provide usage intelligence that helps IT, security, and business decision-makers take action,” said JR Santos, global research director of the CSA, in the statement.

“By consolidating and standardizing the most secure and enterprise-ready cloud services, knowing what policies will have the most impact, and understanding where to focus when educating users, we can improve the protection of data and applications in the cloud,” Santos said.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.