Cloud Security Made Simple in New Guidebook For Lean Teams

Cloud
computing
was
the
lifeline
that
kept
many
companies
running
during
the
pandemic.
But
it
was
a
classic
case
of
medicine
that
comes
with

serious

side
effects.

Having
anywhere,
anytime
access
to
data
and
apps
gives
companies
tremendous
flexibility
in
a
fast-changing
world,
plus
the
means
to
scale
and
customize
IT
at
will.
The
cloud
is
an
asset
or
upgrade
in
almost
every
way.

With
one
glaring
exception:
cybersecurity.

The
cloud
promised
to
make
companies
more
secure
and
security
more
straightforward.
Yet
over
the
same
time
period
that
the
cloud
took
over
computing,
cyber
attacks
grew
steadily
worse
while
security
teams
felt
increasingly
overwhelmed.

Why?

We
will
explain
shortly.
For
lean
security
teams,
the
more
important
question
is
how
to
make
cloud
security
work,
especially
as
the
cloud
footprint
grows
(a
lot)
faster
than
security
resources.
Will
the
cloud
always
cast
a
shadow
on
cybersecurity?

Not
with
the
strategy
outlined
in
a
free
ebook
from
Cynet
called “The
Lean
IT
Guide
to
Cloud
Security
“.
It
explains
how
security
teams
with
less
than
20,
10,
or
even
5
members
can
make
cloud
security
work
from
here
forward.


Storms
Brewing
in
the
Cloud

The “cloud
rush”
prompted
by
the
pandemic
certainly
caught
hacker’s
attention.
Attacks
on
cloud
services

rose
630%

in
2020
and
topped
on-premises
attacks
for
the

first
time
.
The
sudden
increase
in
cloud
adoption
explains
some
of
that
uptick

the
cloud
was
a
larger
target
than
before.
But
this
really
had
nothing
to
do
with
the
pandemic.

It
was
only
a
matter
of
time
before
hackers
started
relentlessly
targeting
the
cloud,
now
costing
businesses

$3.8
million

on
average
with
each
successful
breach.

Clouds
look
to
hackers
like
prime
targets,
more
appealing
than
almost
any
other.

On
the
one
hand,
clouds
house
huge
stores
of
valuable
data
along
with
mission-critical
applications.
They
are
where
the
valuable
targets
live,
so
they’re
an
obvious,
even
inevitable
attack
vector.

On
the
other
hand,
clouds
either
complicate
or
compromise
many
of
the
cyber
defenses
already
in
place,
while
coming
with
complicated
defensive
requirements
of
their
own.
Many
cloud
environments
end
up
insecure,
making
them
an
easy
attack
vector
as
well.

As
long
as
hackers
continue
to
see
clouds
as
equally
vulnerable
and
valuable,
the
onslaught
of
attacks
will
only
get
worse.
The
damages
will
too.


Making
Sense
of
the
Shared-Responsibility
Model

A
big
reason
that
cloud
security
gaps
are
so
common
(and
so
gaping)
is
because
of
the
unique
way
we
approach
cloud
cybersecurity.

Most
cloud
providers
rely
on
the
shared-responsibility
model,
where
security
responsibilities
are
split
between
the
vendor
and
the
customer.

Typically,
customers
handle
data
accountability,
endpoint
protection,
and
identity
and
access
management.
Vendors
deal
with
application
and
network
controls,
host
infrastructure,
and
physical
server
security
(sharing
agreements
vary).

Research
consistently
shows
that
customers
are
confused
about
what
is
and
isn’t
their
responsibility.
But
even
among
those
that
aren’t
confused,
the
dividing
line
between
responsibilities
can
(and
has)
lead
to
contentious
disputes
or
security
loopholes
waiting
for
hackers
to
find
them.

Problematic
as
the
shared-responsibility
model
may
be,
it’s
standard
practice.
What’s
more,
it
can
be
a
tremendous
asset
to
learn
security
teams
in
particular
provided
they
know
their
responsibilities…and
pick
the
right
partner.


Cloud
Security
Starts
with
Vendor
Selection

For
better
or
for
worse,
the
shared-responsibility
model
obligates
cloud
customers
to
form
security
partnerships
with
their
vendors.
And
some
vendors
are
better
than
others.

Thoroughly
vetting
any
cloud
provider
must
be
a
prerequisite,
but
that
takes
time
on
the
part
of
the
evaluator
and
transparency
on
the
part
of
the
provider.
Certifications
like
STAR
Level
2
verify
a
provider’s
security
credentials,
but
some
companies
go
a
step
further
and
hire
risk
management
services
to
evaluate
a
particular
cloud.
In
any
case,
the
goal
is
to
get
independent,
objective
proof
the
provider
takes
security
seriously.

Upon
selecting
a
vendor,
following
their
security
guidance
(to
the
letter)
could
not
be
more
important.
Failure
to
do
so
has
caused
more
than
a
few
cloud
attacks.
Lean
teams
can
make
major
improvements
to
cloud
security,
often
at
no
cost
whatsoever,
by
simply
doing
what
the
vendor
says
to
do.


The
Key
Pieces
for
Lean
Security
Teams

Picking
the
right
provider/partner
solves
a
big
part
of
the
cloud
security
puzzle.
That
said,
important
and
ongoing
responsibilities
still
fall

entirely

on
the
security
team.
These
can
be
the
weak-points
that
open
the
door
to
cloud
attacks

but
the
right
tools
address
each
of
the
key
responsibilities
facing
cloud
customers,
and
the
right
vendors
integrate
more
of
those
tools
onto
platforms
to
consolidate
cloud
security
in
a
manageable
form.

In
the
free
ebook “The
Lean
IT
Guide
to
Cloud
Security
“,
Cynet
describes
what
the
optimal
cloud
security
toolkit
looks
like,
along
with
how
lean
security
teams
can
take
advantage
of
similar
strengths
without
increasing
staff
or
ballooning
security
spending.

The
ebook
offers
an
effective
guide
to
cloud
security
to
the

many

companies
struggling
to
protect
their
most
important
IT.
By
design,
however,
it’s
also
a
practical
and
accessible
framework
designed
to
help
security
teams
of
any
size
secure
cloud
deployments
of
any
size.

If
cloud
security
falls
on
your
shoulders,
use
the
guidance
from
Cynet
to
make
the
maximum
impact
for
the
minimal
investment.


Find
out
the
keys
to
success
in “The
Lean
IT
Guide
to
Cloud
Security”
by
downloading
the
free
ebook.

Leave a Reply

Your email address will not be published. Required fields are marked *