Improving the cloud security posture consists of a set of policies, controls, procedures, and technologies that need to work together to protect an organization’s cloud-based assets.
From authenticating access to filtering malicious traffic, cloud security posture can be configured and made better to the exact needs of the business. With the emergence of Cloud Security Posture Management (CSPM) technologies, the cloud platform-specific rules can be orchestrated centrally reducing administration overheads.
The way cloud security can be delivered varies on a couple of factors:
Most of the cloud security discussions and implementations depend on the cloud provider or the available cloud security solutions in place (also security solutions which can be extended to the cloud).
However, the implementation of cloud security processes should be a joint responsibility between an organization and the cloud service provider. A significant portion of any business also depends on cloud storage, communications, or infrastructure. Therefore, protecting the crown jewels in the cloud should be a key priority.
With the basics in place, let’s talk about the role of cloud security architecture. It essentially defines the design principles and best practices that need to be in place when building out a cloud environment. To establish what design principles, need to be in place – it is important to determine the potential threat vectors at each layer of the cloud environment or the cloud-related deployments. The following lists a high level limited list of threats that we see across most of the cloud-based deployments:
IaaS: All threats listed in OWASP top 10, VM weakness exploitation, VM Isolation failure, DoS/DDoS, and Data leakage.
PaaS: In addition to threats faced at the IaaS layer, Privilege escalation, compromised authorization
Note that the above list is not exhaustive and only lists common threats we periodically see in a public cloud environment.
To mitigate the above threats and to define the minimum security checklist or design principles, an organization should be able to have a crisp cloud security architecture in place. Covering a wide range of security architecture patterns is beyond the scope of an answer to one question, but we have defined the basics principles and 8 “must-haves” that would help you mature your organization’s security posture, to a better state:
Besides, the key must have discussed above, from an incident management standpoint – it is crucial to implement a process to communicate with external stakeholders as part of incident management. Implement communication cadence with distinct groups, business units, and individual roles notified in the event of an incident and update definitions for Critical, High, Moderate, and Low vulnerability as per industry standards. For example, a CVSS score of 8.0 or higher for Critical vulnerabilities.
Improve your Cloud Security Posture – Talk to Our Delivery Head