Where are you using WebAssembly?
Wasm promises to let developers build once and run anywhere. Are you using it yet?
At work, for production apps
At work, but not for production apps
I don’t use WebAssembly but expect to when the technology matures
I have no plans to use WebAssembly
No plans and I get mad whenever I see the buzzword
DevOps / Security / Software Development

5 Quick Ways to Reduce Exposure and Secure Cloud Data

Switching to public cloud services introduces an efficient, new way to work, but it also raises concerns about the security of assets stored in the cloud.
Mar 3rd, 2023 6:15am by
Featued image for: 5 Quick Ways to Reduce Exposure and Secure Cloud Data

Switching to public cloud services is now a necessary strategy for most organizations’ long-term growth plans. But how do they adapt and expand their cybersecurity capabilities to protect their assets, data and customers within their cloud environment?

Traditional security measures don’t work in the cloud simply because there’s no perimeter to protect. Manual processes cannot occur at the necessary scale or speed, and the lack of centralization makes visibility extremely difficult.

Organizations with a multicloud environment have an expanded attack surface. Their cybersecurity strategy does not revolve around physical data centers and on-premises servers alone. Instead, there’s also a vast, sprawling network of endpoints, as well as virtual servers, remote applications, cloud workloads, containers and network communications between the environments.

Here are five simple ways organizations can reduce the risk of exposure by continually searching for and removing unnecessary attack surfaces in the cloud.

1. Segmentation

Segmentation is a security technique that divides your cloud environment into smaller zones to maintain separate access to every part of the network. These segments help contain attacks and limit damage in the event of a breach.

Segmentation can be based on device type or functions, as well as user identity. It involves using different cloud accounts, virtual private clouds (VPCs), subnets and roles for different types of workloads. Organizations should also aim to avoid overlapping application production, development and integration workload.

2. Encryption

Cloud encryption is the process of transforming data from its original plain text format to an unreadable format, such as ciphertext, before it is transferred to and stored in the cloud. This process renders the information indecipherable and useless without the encryption keys. This applies even if the data is lost, stolen or shared with an unauthorized user.

Every reputable cloud service provider (CSP) — the business or entity that owns and operates the cloud — offers basic security, including encryption. However, cloud users should implement additional measures to ensure data security.

For organizations that use a cloud-based model or are beginning the shift to the cloud, it is important to develop and deploy a comprehensive data security strategy that is specifically designed to protect and defend cloud-based assets. Organizations should consult their cybersecurity partner to select an optimal third-party encryption tool and integrate it within the existing security tech stack.

3. DevSecOps

DevSecOps is the practice of incorporating security at an earlier point in the software development life cycle. It serves the dual purpose of increasing quality while reducing risk. While many DevOps teams may have been reluctant to follow such an approach in the past, today’s threat landscape all but requires a security-first mindset.

Further, shifting left helps prevent delays later in the development process, when problems are more complex, costly and time-consuming to address. A comprehensive security strategy can help mitigate issues within the development process by implementing tools, automation and standards to enable engineers to follow the desired security behavior. These tools reduce developer friction as well as reduce the likelihood that unsafe or default configurations will be used.

4. Multifactor Authentication (MFA)

Multifactor authentication (MFA) is the process of requiring more than one piece of evidence to authenticate a user’s identity. This evidence might include security questions, email/text confirmation or logic-based exercises to assess the user’s credibility. MFA is a necessity within every cloud native security strategy. Organizations should also consider using hard tokens for high-impact environments such as GovCloud deployments.

5. Cloud Security Posture Management (CSPM)

Over the course of each day, the cloud may connect and disconnect from hundreds or even thousands of other networks. This dynamic nature makes security more difficult to achieve, as visibility and discoverability can be challenging. Given the dynamic nature of the cloud, it is important to proactively maintain good IT hygiene by automatically discovering the cloud workload footprint.

Cloud security posture management (CSPM) automates the identification and remediation of risks across cloud infrastructures, including infrastructure as a service (IaaS), software as a service (SaaS), and platform as a service (PaaS). CSPM is used for risk visualization and assessment, incident response, compliance monitoring and DevSecOps integration, and can uniformly apply best practices for cloud security to hybrid, multicloud and container environments.

Comprehensive CSPM capabilities allow the organization to:

  • Establish a single source of truth across multicloud environments and accounts, thus improving visibility and discoverability.
  • Automatically discover cloud resources and details — including misconfiguration, metadata, networking, security and change activity — upon deployment.
  • Eliminate security risks by identifying misconfiguration, open IP ports, unauthorized modifications and other issues that leave cloud resources exposed.
  • Proactively detect threats across the application development life cycle by cutting through the noise of multicloud environment security alerts with targeted threat identification and management approach.
  • Continuously monitor the environment for malicious activity, unauthorized activity and unauthorized access to cloud resources using real-time threat detection.

While selecting vendors to secure your organization, opt for end-to-end unified cybersecurity solutions, ideally on the same platform. Multiple security solutions from multiple vendors, or even from the same vendor, can leave security gaps that are often exploited by adversaries to attack.

Group Created with Sketch.
TNS owner Insight Partners is an investor in: Pragma.
THE NEW STACK UPDATE A newsletter digest of the week’s most important stories & analyses.