HomeNewsIndia NewsStay Ahead of the Curve, Ensure greater Cloud Security

    Stay Ahead of the Curve, Ensure greater Cloud Security

    Nikhil Taneja | Managing Director - INDIA & SAARC, Radware
    Nikhil Taneja | Managing Director – INDIA & SAARC, Radware

    Whether organisations have migrated some or their entire infrastructure to the cloud, or are still considering the move, they should be thinking about security. Too often, organizations assume a certain level of protection from a cloud service provider and don’t take steps to ensure applications and data are just as safe as those housed in the data center.

    The sheer range of cloud technology has generated an array of new security challenges. From reconciling security policies across hybrid environments to keeping a wary eye on cloud cotenants, there is no shortage of concerns. An increasingly complex attack landscape only complicates matters and requires security systems that are vigilant and able to adapt.

    Below are nine tips to consider before, during, and after a cloud migration to stay ahead of the curve when evaluating security solutions for cloud service :

    Plan for Hybrid Environments: The majority of organizations will have applications housed across hybrid environments, requiring CIOs to coordinate security policies across these environments. It might be tempting to rely on cloud service provider for security, but that could lead to risky inconsistencies. Identify security services that overlay a number of different cloud-based apps and provide the same technology and policy management for on-premise applications.

    Start with Low Risk Assets: As companies begin migrating to the cloud, they should start with data and apps that are less sensitive or mission-critical. CRMs, for example, might not be as sensitive to downtime or data loss. Until they have vetted the reliability and security of a cloud service provider, should avoid migrating high-risk assets.

    Maintain User Confidentiality: If the cloud provider is defending against encrypted attacks, it might inadvertently compromise user confidentiality. After all, detecting encrypted attacks requires some level of decryption of both legitimate and malicious traffic. It’s important that companies check with the cloud provider to see what solutions it uses and whether their sensitive information will stay private.

    Know What’s in the Cloud: A company’s employees are almost certainly using cloud-based applications without the knowledge of IT teams, leaving a trail of vulnerabilities and data leakage. Unapproved cloud-based apps can lead to malware, posing a risk to the network. This problem has generated a new category in the security space: the cloud access security broker.

    Don’t Become Collateral Damage: Understand the architecture and security offered by the cloud provider. Sharing computing resources/space can result in outages throughout the network, degraded performance, or denied access for users in certain geographies. If one shares space with the target of an attack, one could become collateral damage. Its important to know if the cloud provider can separate attack traffic from clean traffic to prevent attacks on cotenants of a cloud platform?

    Understand Compliance Implications: If encrypted sessions are being terminated in the cloud, its critical to make sure that the provider’s platform or location fit both internal and industry compliance standards. Companies may be required to upgrade or modify security protocols to ensure the cloud service complies.

    Detect Where You Can, Mitigate Where You Should: Monitoring for attacks at a company’s own data center is relatively easy, but cloud adoption means critical assets aren’t as “close” as they use to be. That distance can negatively impact timely detection. Organisations should place detection capabilities in front of their cloud-based assets just as they would in their data center. It allows them to assess the attack and determine the appropriate response. For example, turning to cloud scrubbing if it’s a volumetric attack.

    Understand the Security Capabilities of  Cloud Vendors: As with any service category, cloud hosting providers have different strengths and weaknesses. Some differentiate based on price, others on speed, and others on security. Organisations need to be sure to understand the security capabilities of its provider.

    Separate Security Requirements from Hosting Requirements:  Organisations ought to be careful to not let business units outside IT take ownership of security. Business units are under a lot of pressure to leverage the cloud to speed time-to-market and reduce costs. Security becomes a secondary consideration. Most of these business teams don’t have the skills or knowledge to assess security requirements.

                                                                                                                                                                    

    ELE Times Bureau
    ELE Times Bureauhttps://www.eletimes.ai/
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    LEAVE A REPLY

    Please enter your comment!
    Please enter your name here

    Related News

    Must Read

    Nuvoton Launches Arbel NPCM8mnx System-in-Package (SiP) for AI Servers and Datacenter Infrastructure

    Breakthrough BMC Innovation Powers Secure, Scalable, and Open Compute...

    STMicroelectronics joins FiRa board, strengthening commitment to UWB ecosystem and automotive Digital Key adoption

    STMicroelectronics has announced that Rias Al-Kadi, General Manager of the...

    NEPCON ASIA 2025: Showcasing the Future of Smart Electronics Manufacturing

    NEPCON ASIA 2025, taking place from October 28 to...

    Renesas Expands Sensing Portfolio with 3 Magnet-Free IPS ICs & Web-Based Design Tool

    New Simulation & Optimization Platform Enables Custom Coil Designs...

    IEEE IEDM, 2025 Showcases Latest Technologies in Microelectronics, Themed “100 Years of FETs”

    The IEEE International Electron Devices Meeting (IEDM) is considered...

    OMNIVISION Introduces Next-Generation 8-MP Image Sensor For Exterior Automotive Cameras

    OMNIVISION announced its latest-generation automotive image sensor: the OX08D20, 8-megapixel (MP) CMOS...

    Vishay Intertechnology Expands Inductor Portfolio with 2000+ New SKUs and Increased Capacity

    Vishay Intertechnology, Inc. announced that it has successfully delivered...

    Keysight to Demonstrate AI-enabled 6G and Wireless Technologies at India Mobile Congress 2025

    Keysight Technologies will demonstrate 20 advanced AI-enabled 6G and...

    Ashwini Vaishnaw Approves NaMo Semiconductor Lab at IIT Bhubaneswar

    As part of a big push towards the development...