Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • IT Management

    Secure Cloud Migration: Beware Identity Failures and Misconfigurations

    When moving to the cloud, It’s critical to operate within a least privileged identity model and stamp out unnecessary entitlements and misconfigurations.

    Written by

    eWEEK EDITORS
    Published September 21, 2021
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      According to Gartner, the worldwide public cloud services market grew 40.7% in 2020. But despite how commonplace it now is, a cloud migration can involve complicated and often challenging steps, particularly surrounding system and data security.

      Clearly, it’s critical to understand how to approach the task, clearly identify the attack surface, and know what specific steps you can take to lock down data more effectively.

      Yet too many businesses skip crucial steps and fail to use the right strategic framework in the rush to spin up clouds or introduce solutions. As a result, they are unable to:

      • Distinguish where key assets reside
      • See which data sets are vulnerable
      • Understand how everything – from identities to governance – maps from legacy systems to the cloud

      The result is a higher risk profile and a larger attack surface to protect. Let’s look at the details.

      Identity crisis

      A starting point for securely migrating to the cloud is to know your attack surface and what vulnerabilities it introduces.

      Historically, organizations have addressed security by implementing a cloud access security broker (CASB), which resides between on-premises systems and the cloud, and serves as a traffic cop for data flowing across the network. CASB helps to secure end-user access to SaaS applications like Salesforce.com and Microsoft Outlook 365.

      Of course, CASBs aren’t the only game in town. In order to protect private applications running on AWS, Azure and GCP, Cloud Security Posture Management (CSPM) tools have emerged to detect misconfigurations like publicly exposed databases.

      CSPM, however, does not address the attack surface associated with identities and their entitlements. For example, some 80% of cloud permissions are completely unnecessary. This problem frequently extends across business units and geographic locations. Moreover, as the number of cloud stakeholders increases along with siloed clouds and shadow IT, the complexities and risks multiply—sometimes exponentially.

      It’s important to make the distinction between SaaS applications and cloud infrastructure, namely IaaS and PaaS. Generally, SaaS applications are considered more secure, because the cloud service provider is responsible for securing the infrastructure and its configurations. Whereas security for IaaS and PaaS is the end user organization’s responsibility.

      Let’s consider the risks and security challenges associated with protecting cloud infrastructure in AWS, Google Cloud Platform, Microsoft Azure, and other clouds.

      A least privileged identity model

      It’s critical to acknowledge a basic fact: risk isn’t a measure against perfection, it’s a pragmatic gauge of the actual dangers an enterprise faces at any given moment.

      There’s no way to get to a zero-risk environment, short of shutting down the business. It’s also important to appreciate that while cloud service providers take some responsibility for security, most of the responsibility falls on an organization to protect its systems and data.

      What’s the answer? It’s critical to operate within a least privileged identity model and stamp out unnecessary entitlements and misconfigurations. This approach—think of it as best practice security hygiene—must span the entire cloud environment.

      Within this environment it’s possible to view multi-cloud assets and access relationships, prioritize and remediate risky privileges, place stronger governance and compliance standards in place and, in the end, radically reduce an organization’s attack surface—and the risk of lateral movement of attacks.

      When an organization achieves this level of visibility and automation, it can slide the dial from reactive to proactive. Migrations to the cloud cease being solely about a collection of ad hoc security tools that may or may not catch problems. Instead, an organization can automate and improve cloud configuration and  identity governance within the entire infrastructure.

      In the end, this approach knocks out the two main culprits for security breakdowns during a cloud migration: identity failures and misconfigurations. While it’s impossible to eliminate risk, this focus on identities, their entitlements and configurations delivers the maximum level of protection possible.

      About the Author: 

      Arick Goomanovsky, Chief Business Officer of Ermetic 

      eWEEK EDITORS
      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.