Simple acronyms that protect your cloud


Public clouds offer many advantages. Their rapid adoption, however, has led many organizations to assume that the vendor manages security. This mistaken belief leads to data breaches on other security issues that can affect a company’s reputation. A recent study shows that 81% of clients would stop engaging with a brand online as a result of a violation. Technological acronyms abound and security is no exception. Let’s take a look at several of these acronyms such as ICES, CSPM, CWPP, and CASB and discuss how they help organizations strengthen their security measures.

Cloud Security Posture Management (CSPM)

Offsite infrastructure management offers the convenience of outsourcing the management of IT resources to third-party vendors. However, this convenience does not exempt companies from certain security measures. Service providers are only responsible for managing the infrastructure. The configuration and securing of applications and data is the responsibility of the company.

CSPM refers to a set of IT security tools used to monitor services configuration errors. The goal is to identify these issues so that companies can take action to enforce security policies.

The capabilities of CSPM tools include:

Visibility – With data and applications spread across multiple departments, it is difficult to get a clear picture of inventory.

Compliance – Information in the cloud is subject to the same security protocols as that of on-premises data centers. The CSPM provides tools to show compliance with these regulations.

Risk detection – CSPM tools detect internal and external threats to information stored offsite.

Remediation – Some tools not only monitor configuration errors, but can sometimes make corrections to resolve the issues.

Cloud Workload Protection Platform (CWPP)

Cloud computing offers flexibility and scalability in the deployment of applications. As businesses use the cloud more, the attack surface multiplies. Workload management is a security mechanism to protect the attack surface. Its purpose is to protect the processes and resources that support an application. Securing the workload in the cloud can be difficult. With workloads transferred between multiple hosts and providers. Common points of attack include:

  • Containerized applications
  • Cloud-based endpoints
  • Cloud based storage
  • Applications running on virtual machines

Cloud Access Security Broker (CASB)

The security of applications hosted offsite should also include the security of traffic between onsite infrastructure and offsite infrastructure. Some of the challenges with traffic management include accidental data exposure and malicious intent to steal information. A CASB helps solve these problems by instituting a broker that sits between end users and cloud systems. The access broker can:

  • Encrypt sensitive data
  • Block unusual account activity
  • Enforce access policies to sensitive information

Cloud infrastructure rights management (CIEM)

As the complexity of cloud services Increasingly, organizations are exposed to threats caused by application services with excessive permissions. A service identity is a role that a service uses to access resources. Unless principle privilege is used, these services can disclose access to sensitive data, perform a malicious attack, reconfigure network settings, or gain access to other identities.

CIEM is the best solution for managing access and enforcing any privilege in the cloud.

Cloud infrastructure, by nature, is complex. The calculation starts and slows down in a few minutes, even a few seconds. Identities can exist briefly or sit dormant for years, and their permissions are never set in stone. The ephemeral nature of the cloud makes it even more difficult to continuously monitor resources with full visibility.

IT and security organizations use Cloud Infrastructure Entitlements Management (CIEM) solutions to manage identities and access privileges in cloud and multicloud environments. Sometimes referred to as Cloud Entitlements Management or Cloud Permissions Management solutions, CIEM solutions apply the principle of least privilege of access to infrastructure and cloud services, helping organizations defend against data breaches, malicious attacks and other risks. posed by excessive cloud permissions.

The complexity of the cloud increases when the business demands accelerated production schedules without anticipating the proliferation of cloud data and the potential slippage of permissions. Stakeholders often want to accelerate development that adds identities and resources with countless endpoints. Their understanding is that the cloud offers infinite scalability and that the error cloud is the ultimate solution to always protecting assets. It’s an inability to grasp their part of the shared responsibility model of the public cloud.

Cloud Native Application Protection Platform (CNAP)

The term Cloud-Native Application Protection Platform is the convergence of methodologies from CSPM and CWPP. According to Gartner, “There is synergy in the combination of CWPP and CSPM capabilities, and several vendors are pursuing this strategy. The combination will create a new category of Cloud-Native Application Protection (CNAP) that analyzes developing workloads and configurations and protects workloads and configurations at runtime.

This approach reflected the need for a comprehensive cloud security platform. CNAPP stands for Cloud-Native Application Protection Platform. Gartner has recognized the growing needs of securing applications in the cloud. CNAPP solutions aim to manage the workload and security of the configuration by analyzing them during development and protecting them during execution.

Cloud Identity Access Management (CIAM)

CIAM helps organizations manage human identities. This is how companies give users access to applications. The proliferation of web applications means that users have multiple channels to interact with a company’s systems. Common channels include mobile devices, partner apps, and IoT devices.

Common features include:

  • Customer registration
  • Self-service account management
  • Single sign-on
  • Multifactor authentication

Traditionally, security has been managed at the application level. This approach relied on user IDs and passwords to protect access to these systems. As companies implement cloud solutions, this approach is inadequate. Ideally, security protocols should encompass cloud and on-premises applications. Below are some things to consider when evaluating a comprehensive security tool.

  • Does it support encryption?
  • Does the tool support all your cloud platforms (AWS, GCP, Azure)?
  • Does it effectively list your identities and find effective permissions?
  • Locate your data and tell you who and what is accessing the data?
  • Can it provide a continuous and contextual audit / view of configuration changes or drifts?
  • Does it support security between the cloud and legacy systems?
  • Does your tool help you solve your challenges?

IAM challenges

Appropriate implementation I AM The protections ensure that end users have access to data and systems with the appropriate permissions. The complexity of distributed applications makes implementing IAM difficult. Some of these challenges include:

Lack of consistency and standards

It is not unusual for businesses to use multiple vendors. Everyone is likely to have different tools and procedures for managing identities. With so many tools and standards to follow, there is the potential for inconsistencies between systems. The result creates additional vulnerabilities in the security position of the organization.

Excessive privileges

Organizations are often trapped in the habit of giving users more access than necessary to minimize bottlenecks in a person’s ability to do their job. Unfortunately, excessive privileges can be detrimental to a business. These privileges are problematic in that they allow employees to access sensitive data, install unapproved or unlicensed software, or inadvertently cause errors in these systems.

Identity sprawl

Identity sprawl occurs when the central directory service of an organization’s directory service is not integrated with that of the systems to which it does. Therefore, administrators must manage identities between systems.

Password fatigue

The number of credentials that a user has to manage can cause user frustration. Research shows that the average company employee keeps track of 191 passwords. As a result, employees reuse passwords. While 91%of users understand the risk of reusing passwords a huge 59% admit to doing it anyway.

Security for remote work

Many organizations give employees more options for when, where, and how they work. As remote working becomes more prevalent, administrators need to extend security measures to:

  • Browser-based applications
  • User behavior in these applications
  • User location
  • The type of device they are using

How Sonrai Dig can help

Managing identities and access in a multi-cloud or hybrid environment is a complex task that requires comprehensive capabilities to secure your data. If you want help exploring your options, Sonrai can help you select the right cloud security tool.

The post office Simple acronyms that protect your cloud appeared first on Sonrai security.

*** This is a Syndicated Security Bloggers Network blog by Blog – Sonrai Security written by Eric Kedrosky. Read the original post on:

Source link

Leave A Reply

Your email address will not be published.