Hide & Seek: Security Teams Lack Visibility in the Cloud

Hide & Seek: Security Teams Lack Visibility in the Cloud

- in Cloud Security
Comments Off on Hide & Seek: Security Teams Lack Visibility in the Cloud

T leaders stay on the hot seat regarding their capacity to constantly display the nation in their information and operations. How hot is your seat?
It’s no mystery that the cloud is rapidly gaining popularity as a preferred infrastructure platform for corporations of all sizes. All indicators endorse that this upward trend maintains unabated concerns about protection problems — get admission to facts, geographic vicinity of touchy facts, compliance, and visibility and security controls constructed into groups’ public and hybrid cloud environments — are nevertheless pinnacle of mind amongst CSOs and CIOs.

Hide & Seek: Security Teams Lack Visibility in the Cloud 1

Much of the tension about running inside the cloud is partially rooted in fear of turning into the following safety breach headline. These testimonies gain large traction inside the press. However, they don’t paint the whole photograph about cloud safety. The issue underlying the maximum of this apprehension is a lack of visibility into an organization’s cloud surroundings, which alerts a loss of manipulating. Once control is misplaced, goes the wondering, CSOs and CIOs fear large repercussions to their commercial enterprise.


A look at sponsored through Evident.Io and The SANS Institute, Orchestrating Security inside the Cloud, surveyed nearly 500 humans in agency IT departments about their cloud infrastructures. It found out that while 40% of groups stated they shop or technique touchy information within the cloud, absolutely one-1/3 (33%) of the survey individuals said they do no longer have enough visibility into their public cloud vendors’ operations.

This sheds light on the state of the relationship between cloud provider vendors (CSP) and clients. This lack of insight and ability to behave quickly prevents a few clients from fully believing and leveraging their cloud for the worry of vulnerabilities. The lack of ability to continuously monitor the nation in their data and operations is a first-rate motive of difficulty amongst IT leaders – despite everything, they’re the ones on the hook for reducing the vulnerabilities in their assets. If they cannot spot issues or fully draw close how it’s affecting them, they fail to function as a protector of the employer’s highbrow property.

This is a completely actual subject, but it’s also critical to remember that the connection among CSPs and clients consists of a shared responsibility version for safety. The CSP maintains robust protection and compliance controls across their complete infrastructure platform: data center controls, core community/hardware controls, operational safety practices like records disposal, and exchange manipulation. The consumer is responsible for anything they control on the cloud platform. Amazon explains this thoroughly when it comes to their Amazon Web Services: “AWS has secured the underlying infrastructure, and you must relax anything you put on the infrastructure.”

Considering this, security insight, visibility into your facts and programs, and precisely how this is functioning within your cloud environment. In other phrases, it is approximately your facts, but it is also about how your data is being handled in the cloud. Hackers are not discerning where the statistics are living; they simply need an easy manner to get in and get admission to it.

Companies that migrate from on-premise surroundings to the cloud quickly locate that the usage of conventional safety era and agent-based totally answers don’t offer the perception they want. While they may nonetheless be capable of getting important data, it’s normally brought after it’s too past due. It does not provide the context that identifies essential service configuration or troubles with controls.

The cloud model is exclusive and requires a safety solution built, especially for the manner wherein cloud clients engage with their sources. Customers are looking for a continuous manner to integrate insight into their information, applications, functionality alongside how it is all being transacted in the cloud — specifically now that a few safety may be computerized.

You may also like

5 Things That Belong in Your Winter Break Carry-On

Whether you’re headed home for the holidays or