By 2020, 90 percent of enterprises will be on the hybrid cloud. Even though a move to the cloud is now inevitable, few organizations have a comprehensive grasp of how to secure it. This is especially challenging when organizations are on multiple cloud environments from multiple service providers, since each has its own set of native security controls.

Five Keys to Securing Hybrid Cloud Workloads

It’s important to consider some basic security principles when deploying hybrid cloud solutions. Here are five areas where you need to ask the right questions to determine the security of your cloud workloads.

Read the white paper: 10 essential elements for a secure and compliant business operation

1. Visibility and Control

Do you have end-to-end visibility across all enterprise assets in a cloud service provider’s (CSP) platforms and on-premises environments? Is this visibility available on a single pane of glass? Do you have visibility into your CSP’s performance and reporting of security controls?

The shared security model on the cloud has clear expectations of the customer and the cloud service provider. A security framework that delineates roles and responsibilities between the customer and the CSP is vital to securing the migrated workload.

2. Policy Enforcement

How will you ensure that the same security and regulatory policy is enforced on-premises as well as across your multiple clouds, even as new workloads are added to the cloud? This is a complex task, especially in highly regulated industries such as financial services and health care.

3. Data Protection and Compliance

What is your process to discover and secure your critical data in the face of changing regulations? This involves the ability to identify critical data — your crown jewels — and then ensure that it is secure and compliant.

One notable example of the changing regulatory landscape is the European Union’s (EU) General Data Protection Regulation (GDPR), which will affect most global companies that have payment card industry (PCI) data in the cloud starting in May 2018. Beyond the GDPR, many other compliance regulations impact data security.

4. Shadow IT

How will you discover and eliminate shadow IT and shadow data in your organization? Given the ease at which employees can stand up cloud workloads, it is imperative to have a program that discovers these shadow workloads and remediates them as they are found.

5. Cloud Speed

Last but not least, is your security program implemented at cloud speed? Any employee with a credit card can set up a cloud workload in a matter of seconds. If these workloads are not protected at the same speed as soon as they are created, your organization can be left vulnerable to breaches and leaks.

Enabling Rapid Innovation

To ensure a secure and compliant cloud program, enterprises need to ask themselves these hard questions and ensure they have a plan to address each. Managed security services providers (MSSPs) can help enterprises find solutions for these questions and other challenges associated with securing the cloud. You can enable your business to continue to innovate rapidly without worrying about security or compliance.

More from Cloud Security

2024 Cloud Threat Landscape Report: How does cloud security fail?

4 min read - Organizations often set up security rules to help reduce cybersecurity vulnerabilities and risks. The 2024 Cost of a Data Breach Report discovered that 40% of all data breaches involved data distributed across multiple environments, meaning that these best-laid plans often fail in the cloud environment.Not surprisingly, many organizations find keeping a robust security posture in the cloud to be exceptionally challenging, especially with the need to enforce security policies consistently across dynamic and expansive cloud infrastructures. The recently released X-Force…

Cloud threat report: Why have SaaS platforms on dark web marketplaces decreased?

3 min read - IBM’s X-Force team recently released the latest edition of the Cloud Threat Landscape Report for 2024, providing a comprehensive outlook on the rise of cloud infrastructure adoption and its associated risks.One of the key takeaways of this year’s report was focused on the gradual decrease in Software-as-a-Service (SaaS) platforms being mentioned across dark web marketplaces. While this trend potentially points to more cloud platforms increasing their defensive posture and limiting the number of exploits or compromised credentials that are surfacing,…

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today