Not a single week goes by without seeing an equal amount of articles decrying the gaps inย cloud securityย and articles praising the benefits of the cloud includingย how much more secure it can be than an organizationโ€™s own data centre. So which is it? And for companies who are trying to define their next IT and security infrastructure, what is the right direction?

The cloud security dilemma

The answer may just not be the same for every company. There are obvious benefits to either side of the equation, and those benefits vary in importance depending on what kind of business youโ€™re considering and which industries that business serves. Ultimately, an organisation will have to consider its risk profile, its security core competencies from an infrastructure perspective as well as from a staffing and resource perspective, its regulatory environment and its potential for a large data breach exposure.ย  Some enterprises naturally have a higher tolerance for balancing risk versus reward whereas others do not. But it will also have to consider its digital transformation journey, its ability to manage its own IT systems and business applications, its growth plan, its user base and, more importantly, its business model.

Let me give you two examples: A financial service company that has a very large data centre with legacy systems and applications, including some that live on the mainframe, will have a large IT security staff and an ample security budget to protect itself from breaches.ย  Its risk profile will be high based on the sensitive and PII (personal identification information) data it deals with, but it will have plenty of security resources to comply to the regulations it operates within. In contrast, a mid-size company with strong growth and high customer acquisition would rely on SaaS applications to support its fast pace and would more than likely favour cloud vs on-premises implementations.ย  This mid-size company will lean towards selecting well-known cloud infrastructure providers to host their business because they would consider theirย security superiorย to what the company could deploy itself in a data centre with the resources at hand.

The shift to โ€˜identity-first.โ€™

But the reality of this million-pound question is that the premise of how we define security is incorrect, or to be exact, it needs to evolve.ย  Let me explain.ย  If you are looking at security as perimeter-based protection, then there is an argument to be made that anything in a data centre, which is surrounded by next-gen firewalls and other threat prevention solutions, will surely be protected.ย  But consider this: once an important piece of data that lives on-premises behind a firewall (think a financial application) is extracted from that system, exported to an Excel spreadsheet, and then emailed around, that data is immediately exposed. In a world where not only employees but contractors, partners and even customers have access to an enterpriseโ€™s applications and data, how can perimeter security be enough? How can it make any data centre more secure than the cloud? The short answer: It canโ€™t.

[easy-tweet tweet=”We need to embrace the digitalisation of all corporate data and think identity-first” hashtags=”Data, Digital”]

Today, it is not enough to simply protect data centres, on-premises systems, and cloud apps, we need to embrace the digitalisation of all corporate data and think identity-first. Consider how people work today โ€“ everyone has access to data and applications in the cloud or on-premises – the access that needs to be secured is between the user and the data or application. Consider as well that users vary between employees and non-employees like contractors, partners and temporary workers โ€“ which makes it even harder to control who has access to what, in the cloud or on-premises for that matter. Then it becomes evident that enterprises need to shift their focus towards safeguarding their usersโ€™ access to applications and data — in other words: to safeguard their usersโ€™ digital identities.

Here are five things to consider when extending perimeter security to securing digital identities:

  1. Establish a system of records for digital identities. This should include employees, contractors, suppliers, partners, customers and potentially even RPA (robotic process automation) bots.
  2. Govern access by all these digital identities to understand whoย has accessย nowย and whoย shouldย have access. This can be done using an identity governance solution to manage and provision access.
  3. Consider a vendor who can handle both on-premise and cloud applications to manage any complex, hybrid IT environment.
  4. Take into account all of your data โ€“ both structured data, residing in systems and applications, and the ever-growing amount ofย unstructured data, from emails, documents and files that enterprises manage today. This is particularly important given how many recent breaches targeted data stored in unstructured systems (such as a cloud-based document file system). Unstructured data is typically much harder for companies to discover and classify, as it is not clear who owns it and who has access to it.
  5. Balance people, process and technology โ€“ understand what your core competencies are and if your company does not have the IT staff to support an identity governance program, a cloud-based solution may be the right choice for you.

Rather than spinning cycles debating cloud vs on-premises security approaches and which is better, itโ€™s high time to take a step back. Today, the most successful attack vectors are the users and their credentials.ย  Protecting digital identities of all users accessing any data has or will very quickly become the priority for most organisations.ย  The more regulated ones will take this direction first, as privacy regulations and data breaches are consuming their boardroom. Being able to manage the user relationship to data, controlling who has access to what, who reads what sees what โ€“ well that has become the number one security control.

 

 

+ posts

Juliette Rizkallah, Chief Marketing Officer, SailPoint

A marketing veteran with more than 20 years of experience, Juliette Rizkallah brings a wealth of expertise and pragmatism to SailPoint in her role. No stranger to the world of enterprise security, Juliette leads the companyโ€™s worldwide marketing efforts, and is responsible for articulating the company vision, product solutions, technology innovations and business purpose to customers, partners and media around the globe.

Juliette has held executive positions and was an agent of growth at some of the world's largest technology companies, including Oracle, CA, Business Objects-SAP and Check Point Software. She started her career as a strategy consultant at Bain & Company and Arthur Andersen France where she acquired her business impact focus.
Juliette holds a MBA from Harvard Business School and a BA from Ecole Superieure de Commerce de Paris (E.S.C.P.) in Paris, France.

Unlocking Cloud Secrets and How to Stay Ahead in Tech with James Moore

Newsletter

Related articles

A Business Continuity Cheat Sheet

Right, let's be honest. When you hear "business continuity,"...

Challenges of Cloud & Ultima’s Solution to Transform Business

With the way that AWS and Microsoft dominate technology...

Data privacy concerns linger around LLMs training

We have all witnessed the accelerated capabilities of Large...

Securing Benefits Administration to Protect Your Business Data

Managing sensitive company information is a growing challenge. Multiple...

Which Cloud Type Suits You โ€“ Public, Private, Hybrid?

Valuable lessons have been learnt about cloud deployments over...