{"id":1027888,"date":"2024-01-24T02:42:39","date_gmt":"2024-01-24T07:42:39","guid":{"rendered":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/cloud-computing-security-start-with-a-north-star-itpro-today.php"},"modified":"2024-01-24T02:42:39","modified_gmt":"2024-01-24T07:42:39","slug":"cloud-computing-security-start-with-a-north-star-itpro-today","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cloud-computing\/cloud-computing-security-start-with-a-north-star-itpro-today.php","title":{"rendered":"Cloud Computing Security  Start with a &#8216;North Star&#8217; &#8211; ITPro Today"},"content":{"rendered":"<p><p>    Cloud computing has followed a similar journey to other    introductions of popular technology: Adopt first, secure later.    Cloud transformation has largely been enabled by IT functions    at the request of the business, with security functions often    taking a backseat. In some organizations, this has been due to    politics and blind faith in the cloud services providers    (CSPs), e.g.,     AWS, Microsoft, and GCP.  <\/p>\n<p>    In others, it has been because security functions only knew and    understood on-premises deployments and simply didn't have the    knowledge and capability to securely adapt to cloud or     hybrid architectures and translate policies and processes    to the cloud. For lucky organizations, this has only led to    stalled migrations while the security and IT organizations    played catch up. For unlucky organizations, this has led to    breaches, business disruption, and loss of data.  <\/p>\n<p>    Related: What Is Cloud    Security?  <\/p>\n<p>    Cloud security can be complex. However, more often than not, it    is ridiculously simple  the misconfigured S3 bucket being a    prime example. It reached a point where malefactors could    simply look for misconfigured S3 buckets to steal data; no need    to launch an actual attack.  <\/p>\n<p>    It's time for organizations take a step back and improve    cloud security, and the best way to do this is to put security    at the core of cloud transformations, rather than adopting the    technology first and asking security questions later. Here are    four steps to course correct and implement a security-centric    cloud strategy:  <\/p>\n<p>    Related:     Cloud Computing Predictions 2024: What to Expect From FinOps,    AI  <\/p>\n<p>    For     multi-cloud users, there is one other aspect of     cloud security to consider. Most CSPs are separate    businesses, and their services don't work with other CSPs. So,    rather than functioning like internet service providers (ISPs)     where one provider lets you access the entire internet, not    just the sites that the ISP owns  CSPs operate in silos, with    limited interoperability with their counterparts (e.g., AWS    can't manage Azure workloads, security, and services, and vice    versa). This is problematic for customers because, once more    than one cloud provider is added to the infrastructure, the    efficacy in managing cloud operations and cloud security starts    to diminish rapidly. Each time another CSP is added to an    organization's environment, their attack surface grows    exponentially, unless secured appropriately.  <\/p>\n<p>    It's up to each company to take steps to become more    secure in multi-cloud environments. In addition to developing    and executing a strong security strategy, they also must    consider using third-party applications and platforms such as    cloud-native application protection platforms (CNAPPs), cloud    security posture management (CSPM), infrastructure as code    (IaC), and secrets management to provide the connective tissue    between CSPs in hybrid or multi-cloud environments. Taking this    vital step will increase security visibility, posture    management, and operational efficiency to ensure the security    and business results outlined at the start of the cloud    security journey.  <\/p>\n<p>    It should be noted that a cloud security strategy  like    any other form of security  needs to be a \"living\" plan. The    threat landscape and business needs change so fast that what is    helpful today may not be helpful tomorrow. To stay in step with    your organization's desired state of security, periodically    revisit cloud security strategies to understand if they are    delivering the desired benefits and make adjustments when they    are not.  <\/p>\n<p>    Cloud computing has transformed organizations of all    types. Adopting a strategy for securing this new environment    will not only allow security to catch up to technology    adoption, it will also dramatically improve the ROI of cloud    computing.  <\/p>\n<p>    Ed Lewis is Secure Cloud Transformation    Leader at Optiv.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.itprotoday.com\/industry-perspectives\/cloud-computing-security-start-north-star\" title=\"Cloud Computing Security  Start with a 'North Star' - ITPro Today\">Cloud Computing Security  Start with a 'North Star' - ITPro Today<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cloud computing has followed a similar journey to other introductions of popular technology: Adopt first, secure later. Cloud transformation has largely been enabled by IT functions at the request of the business, with security functions often taking a backseat. In some organizations, this has been due to politics and blind faith in the cloud services providers (CSPs), e.g., AWS, Microsoft, and GCP <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cloud-computing\/cloud-computing-security-start-with-a-north-star-itpro-today.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[494695],"tags":[],"class_list":["post-1027888","post","type-post","status-publish","format-standard","hentry","category-cloud-computing"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/1027888"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=1027888"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/1027888\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=1027888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=1027888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=1027888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}