{"id":48794,"date":"2023-11-21T10:14:06","date_gmt":"2023-11-21T15:14:06","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=48794"},"modified":"2024-04-16T16:34:25","modified_gmt":"2024-04-16T20:34:25","slug":"cybersecurity-and-the-cloud-moving-over-isnt-as-easy-as-flipping-a-switch","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/cybersecurity-and-the-cloud-moving-over-isnt-as-easy-as-flipping-a-switch\/","title":{"rendered":"Cybersecurity and the Cloud: Moving Over Isn’t as Easy as Flipping a Switch"},"content":{"rendered":"

We discuss what to keep in mind about cybersecurity and the cloud to ensure the process of cloud migration is as secure and smooth as possible.<\/h2>\n
\n

Lift and shift. While this phrase is not new, it now regularly relates to moving infrastructure to the cloud. But what about cybersecurity and the cloud? Providers promise seamless transitions as if you were moving a server from one rack to another. While moving to the cloud can put companies in a more secure position, you must take proper care. Assuming everything is the same about cloud cybersecurity can be a costly mistake.<\/strong><\/p>\n

Cybersecurity Cloud No-Brainers<\/h2>\n

From a physical security perspective, moving infrastructure to the cloud will almost always be more secure. Large cloud providers place infrastructure in state-of-the-art data centers with top-of-the-line physical security measures.<\/p>\n

Often, organizations do not have the budget, time or expertise to build their own on-premise data centers to these specifications. We have seen the full spectrum of data centers over the years (umbrellas over server racks to protect from a leaky roof, anyone?). Even the most advanced data centers we see on-premises do not match those of the large cloud providers.<\/p>\n

What Hasn\u2019t Changed About Cloud Cybersecurity<\/h2>\n

Requirements and basic control concepts have not changed as cloud infrastructure continues to proliferate. User access, change management<\/a>, and firewalls are all still there. Control frameworks such as COBIT, ISO 27001, NIST CSF, and the CIS controls still apply and have great value. Sarbanes-Oxley controls are still a driver of security practices for public companies.<\/p>\n

What Changes When Migrating to the Cloud<\/h2>\n

How the controls of the past used to perform has changed with the transition to the cloud<\/a>. Here are some common examples:<\/strong><\/p>\n

Cloud security administration is more in-depth.<\/h3>\n

Some of the most high-risk access roles in organizations, admin rights, are a main target of malicious actors. Handling admin rights in the cloud is different and needs proper due care. Knowing which roles are administrative in nature can be confusing, so it\u2019s important to implement them correctly from the start. Separation of duties in relation to key administration and key usage is essential.<\/strong><\/p>\n

Having the proper tools to administer access can be daunting. Don\u2019t assume your cloud provider will guide you through all these intricacies. Plan ahead.<\/p>\n

Perimeter security has changed.<\/h3>\n

While layered security has always been important, it becomes even more important in the cloud. Several news stories have appeared where breaches occur due to things like \u201ccontainers being exposed to the internet\u201d with a large cloud provider\u2019s name associated.<\/p>\n

At first blush, most people blame the cloud provider – but most often, these breaches are the cloud customer\u2019s fault. Some important items to think about are proper demilitarized zones (DMZs) for critical and regulated data, firewall configurations, and proper restriction of admin rights to those resources.<\/p>\n

Securing connectivity becomes more important.<\/h3>\n

Servers and other hardware won\u2019t be sitting down the hall when moving infrastructure to the cloud. Access will almost always be remote, thus creating new security challenges<\/a><\/strong>. Understanding all ingress and egress points is essential, as is putting proper controls around them.<\/p>\n

Encryption.<\/h3>\n

Encrypting data will be a top concern for many organizations when it comes to cybersecurity in the cloud, as the data is now \u201csomewhere else.\u201d The good news is the native encryption tools of many large cloud providers are advanced, and most of the time, they can automatically encrypt data at rest using a strong algorithm.<\/p>\n

This is a huge step up right off the bat for many companies. Because encryption is so important in the cloud, key management becomes a high-risk control. Policies, procedures and controls around key management need to be well-thought-out.<\/p>\n

Don’t fear the cloud, embrace cloud security.<\/h2>\n

While some challenges may be present, as outlined above, moving to the cloud is most often a great move for an organization. Improved security, improved performance, and potential cost savings are only a few benefits of a cloud migration. Multiple cloud security frameworks exist to provide a secure path to adoption, so organizations do not have to approach this \u201cblind.\u201d<\/strong><\/p>\n

A cloud security framework can guide you through the process of secure adoption and also provide assurance over cloud adoptions you have already performed.<\/p>\n

\n

\n
\n Wonder what a cyber attacker sees when they target your organization? Wonder no more. Watch a live network attack demo simulated by an industry-leading offensive security expert. In our on-demand webinar, you\u2019ll learn how to uncover vulnerabilities that the average pen test misses. \n <\/div>\n
\n \n\n WATCH WEBINAR\n <\/a>\n <\/div>\n <\/div>\n","protected":false},"excerpt":{"rendered":"

We discuss what to keep in mind about cybersecurity and the cloud to ensure that cloud migration is as secure and smooth as possible.<\/p>\n","protected":false},"author":456,"featured_media":48800,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[23785],"coauthors":[23762],"class_list":["post-48794","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cybersecurity","resource-categories-blogs","orbitmedia_post_topic-cybersecurity"],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2024-09-16 00:04:46","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/48794"}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/456"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=48794"}],"version-history":[{"count":4,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/48794\/revisions"}],"predecessor-version":[{"id":51560,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/48794\/revisions\/51560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/48800"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=48794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=48794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=48794"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=48794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}