Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud Security

09:40 AM
Dan Reis
Dan Reis
Dan Reis

Security in a Cloud-Hybrid World

When an application and its data processing and storage can easily shift between geographic locations, organizations need to implement security systems to ensure they don't unknowingly violate a regulatory framework regardless of geography. \r\n

Organizations have clearly embraced the cloud to run major areas of their computing needs. As cloud adoption has progressed they have used it to increase their processing power by dispersing data center, hosted and local computing resources. Though this increase of cloud computing hasn't been a one-for-one replacement of traditional computing, it has provided organizations with the flexibility to increase their computing resources through an on-demand rapid deployment model that can deliver computing power at lower capital expenditure.

Within the sphere of traditional computing, organizations have substantial expertise in the deployment, configuration and maintenance of network, data and user security systems. A hybrid mixture that includes traditional data centers, on-premises devices integrated with public cloud service increases the complexity to deploy security in a consistent, contiguous manner across every computing environment. As application, data and user activity can dynamically move between environments, cloud adds stress to an organization's ability to track each element and continually maintain appropriate security.

Cloud providers secure their systems through a wide array of security technology with defined configurations. A cloud provider has a different set of requirements to protect their systems and customers than a client organization may have for their own applications, data and users. When an organization adds cloud computing as a part of their normal computing mix, they need to consider security systems that are currently in use. They also need to include the configuration and location of application processing and data storage as well as user access capabilities and policies. Organizations need to be sure that existing security can be consistent and effectively maintained across an entire computing spectrum, including their cloud instances. There are many characteristics unique to cloud computing. To secure systems, applications and data in the cloud one can't simply replicate their existing tools, products, security profiles and configurations into their cloud environment and expect the same security results.

Complying with local and global regulations is more complex with geographically dispersed computing and data storage. Security control mechanisms might not address all the necessary regulatory requirements when systems are sharing processing between local and cloud sites. An example issue to consider can be an application that spans different computing environments, even crossing borders. Since many states apply different data protection regulations and penalties, if a breach occurs, unnoticed compliance requirements can have far reaching and unexpected impact on an organization. When an application and its data processing and storage can easily shift between geographic locations, organizations need to implement security systems to ensure they don't unknowingly violate a regulatory framework regardless of geography. An organization can help contain the risk of regulatory exposure by utilizing visibility into and control of their entire security ecosystem across every computing environment. This can be helped by contractual agreements with a cloud supplier that define allowed geographic locations to run applications and store data to eliminate the risk of inadvertent breaches.

A cloud vendor will manage access to their cloud resource via various forms of access such as identity management along with permissions processed by a firewall or other systems used for access management. A cloud vendor's identity management and access policies will be more general and open to give a wide array of clients and client customers access to the cloud systems. They have to be more open because it's bad business for a them to inadvertently block a client, or their customer's access to a client's site. It's not a question of whether cloud vendors implement security, it's whether it addresses a client's unique security policies to deliver the protection they require. When dealing with a mixed environment, an organization should not assume that the policies and security systems a cloud vendor applies will meet their needs.

Having additional cloud security is the responsibility of a client. This will likely be a more granular set of rules for user access control to the client's applications and data. Because a cloud instance can be brought up easily and quickly by any department or individual within a company, it's more difficult to ensure each new instance meets established security protection levels. And a hybrid environment can make it easier to create gaps in security through misconfigurations, incorrect profiles and other elements across local and cloud systems. This includes web or other firewalls, identity management, intrusion detection, data loss prevention or other systems. And any gap can make it more difficult to meet protection requirements, impacting incident investigation by masking critical information that weaken and incident response. A client can address these areas by contracting with their cloud or another vendor to incorporate additional security tools and unique configurations for their cloud instances. Or they can configure and deploy their own security systems, policies and configurations into their cloud instances to address their unique security requirements.

Organizations need to ensure that they understand the unique characteristics of cloud so they create appropriate security rules and policies -- and when implementing security systems that they can achieve the same security protection as their dedicated computing for their cloud instances. It's crucial to be aware of the fundamental differences between securing cloud, where a deployed system runs in shared environment with unknown parties versus dedicated environments that organizations completely control. It helps to understand the differences between cloud and local system configuration and operations. This allows an organization to take advantage of the flexibility of cloud and its cost advantages without sacrificing security.

— Dan Reis, SecurityNow Expert

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Malware Attacks Declined But Became More Evasive in Q2
Jai Vijayan, Contributing Writer,  9/24/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-30
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW07 allows an attacker to change some special parameters without authentication. This issue affects: WAGO 750-852 version FW07 and prior versions. WAGO 750-880/xxx-xxx version FW07 and prior versions. WAGO 750-881 ve...
PUBLISHED: 2020-09-30
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362 version FW03 and prior versions. WAGO 750-363 version ...
PUBLISHED: 2020-09-30
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a local user with specialized access to obtain sensitive information from a detailed technical error message. This information could be used in further attacks against the system. IBM X-Force ID: 185370.
PUBLISHED: 2020-09-30
Use of hard-coded cryptographic key vulnerability in August Connect Wi-Fi Bridge App, Connect Firmware allows an attacker to decrypt an intercepted payload containing the Wi-Fi network authentication credentials. This issue affects: August Connect Wi-Fi Bridge App version v10.11.0 and prior version...
PUBLISHED: 2020-09-30
An improper Input Validation vulnerability in the code handling file renaming and recovery in Bitdefender Engines allows an attacker to write an arbitrary file in a location hardcoded in a specially-crafted malicious file name. This issue affects: Bitdefender Engines versions prior to 7.85448.