Cloud-based resources have found their way into nearly every aspect of computing. While they have proven to generally be secure, enterprises are still directly responsible for protecting their systems and data in this environment.

It is not enough to take the cloud service provider’s word that their systems are secure and impenetrable. Enterprises need to assure their systems are secure by taking measures on their own behalf to supplement what their providers already have in place.

Four Ways to Secure Cloud-Based Resources

Consider these four factors that can help provide enterprise level security to cloud resources.

1. Embrace Centralized Management

The basic premise of cloud-based architecture is the distribution of data and processes beyond the enterprise’s perimeter. Each cloud-based service has servers that exist outside the enterprise and are therefore beyond IT’s direct control. Without security that limits access at the perimeter, every server needs to control access to its own resources. With hundreds or even thousands of servers in use by an enterprise, it isn’t realistic to consider IT managing each server’s access permissions individually.

The realistic way to manage server access is to establish a centralized control that defines access by user role and data type, and then propagates those rules across cloud-based services. Controlling factors need to be based on the data itself rather than the physical location of the servers. This is because data can frequently be migrated to the most appropriate location that provides access, and audit controls must be based on the data regardless of its location.

2. Invest in Federated Identity Management

Maintaining universal user identity in a distributed environment is essential to maintaining valid access. Since data can reside in multiple servers accessed by multiple applications, identity management must be able to assign and revoke user permissions regardless of location and application.

Federated identity management needs to manage access permissions for internal systems owned and controlled by the enterprise. It must also seamlessly apply the same permission levels to users accessing externally supplied computing resources. This single point of identity management simplifies the process and allows the enterprise to control access to both internal and external applications.

3. Understand the Vendor

Cloud service vendors typically offer differing service-level agreements (SLAs) that cover the most common risks and compliance issues. It is incumbent on IT to find out which areas are not adequately covered by the SLA and provide their own mitigation processes or work with the vendor to close the gaps between standard offerings and required enterprise-level protection. Government regulations have made compliance and completely assured cybersecurity protection increasingly important — and, in some cases, mandatory.

4. Get Cyber Intrusion Protection

The reality of networked computing is that data thieves will continue to exist and exploit ready opportunities. The increased complexity of operating multiple computing resources distributed across wide regions makes building an effective defense difficult. There is no single method to protecting enterprise systems, and IT needs to perform all the normal precautions to keep their systems regularly updated against newly discovered threat vectors.

The use of reputation-based tools has become important since it adds an alert layer to existing signature-based virus detection tools. In addition, the proliferation of cloud-based systems allows individuals to connect enterprise networks to unvetted services. Whitelisting certain services can also help prevent rogue services from gaining network access and injecting exploits.

Protecting enterprise data and services has always been a challenge, and today’s cloud-based infrastructure adds a layer of complexity. Security professionals need to know the connecting systems that make up their enterprise and put the best resources in place to maintain their security. By collaborating with service providers, regularly updating hardware and developing an enterprisewide server management strategy, IT can reduce the number of security gaps within today’s network infrastructure.

More from Cloud Security

What is data security posture management?

3 min read - Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across multiple types of environments. If you have any doubt, your enterprise should consider acquiring a data security posture management (DSPM) solution. With the global average…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

The importance of Infrastructure as Code (IaC) when Securing cloud environments

4 min read - According to the 2023 Thales Data Threat Report, 55% of organizations experiencing a data breach have reported “human error” as the primary cause. This is further compounded by organizations now facing attacks from increasingly sophisticated cyber criminals with a wide range of automated tools. As organizations move more of their operations to the cloud, they must also become increasingly aware of the security risks and threats that come with it. It’s not enough anymore to simply have a set of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today