In a Multi-Cloud World, It’s Time to Rethink Who Has Access to What



By: Ali Gomulu

The biggest challenge in today’s multi-cloud world is not storing data or supporting applications but securing that data all along the “digital supply chain.”

Given the economics of the cloud, and the sense it makes to use different kinds of clouds for different applications, arguments to leverage cloud today are rock solid.

With weak security governance in place, however, are the risks greater than the rewards?

It was not many years ago that we were focusing on differentiating between the public and private clouds. Once the technology became more widely understood, businesses began to realize that a combination of the two would prove to be the most beneficial: the public cloud for its extensive and almost infinite ability to scale and grow, with a mix of private cloud to store critical or otherwise sensitive data. This became known as the hybrid cloud.

We are now also beginning to see enterprises becoming more selective over which cloud provider to choose, as selecting multiple vendors for different business operations allows for each area of the business to work independently of each other. With the growth of DevOps and the overall expansion of digital services and applications in nearly every vertical industry, multi-cloud makes sense but can be daunting to the CISOs responsible for protecting the infrastructure and data of enterprises, governments, and other organizations.

Adding to this is complexity associated with tougher privacy regulations spreading across the globe. The security of the data and compliance with regulations has been driven to the forefront of every IT and OT leaders’ minds, and those important issues which must be tackled while planning to go to a multi-cloud paradigm.

General multi-cloud assumptions are made based off what we already understand about public and private cloud architecture including:

  1. Security – Data is at the heart of IT in any business and security must be thought of high in the list of priorities and not as an afterthought. This is particularly true when workloads are distributed amongst employees and business partners.
  2. Reliability – Stability is very important, and any downtime could cause major disruptions. We have gotten to the stage where network reliability is just as important as electricity or running water.
  3. Ubiquity – An omnipresence is required; all applications and services need to be available everywhere. Limiting these to a location means that the full potential of the cloud could go unserved within the business. This is heightened by our dependency on mobile applications.
  4. Fungibility – Resources must be interchangeable, meaning that in order to drive ubiquity efficiently, workloads cannot be tied down to any one resource in a way that restricts availability.

How can all this variety be managed efficiently and with visibility into infrastructure and applications, and control from edge-to-edge? There is no way other than with advanced software, which takes advantage of algorithms and artificial intelligence (AI) to automate the process, and with recording and storage mechanisms which support quality audits, even those which may come as a surprise, in between regularly scheduled audits.

Legacy approaches to managing privileged access no longer scale to meet the changing needs driven by multi-cloud advantages – and are further exacerbated by more and more edge devices, whether servers, gateways, mobile phones, sensors, cameras and more.

This next-generation multi-cloud environment deserves next-generation, software-defined, hyper-intelligent solutions which unlock the value of the cloud, and the edge, by ensuring security through comprehensive, modern approaches and support the highest quality governance across even the largest enterprises.

Does your organization really know who has access to what, and under what circumstances? It’s possible with ironsphere, and we’d enjoy demonstrating how.

Similar Blogs

SecOps Best Friend? Automation.

SecOps Best Friend? Automation.

Security automation is now a top concern for enterprises as the attack surface expands given more remote workers, more devices, and new attack vectors in the cloud.
Automation is rising because IT leaders are realizing it paves the way to reducing risks, gaining greater visibility into their networks, and getting the most from their security investments.

read more
Privileged Task Automation Frees Up Time for Stressed Out IT Teams

Privileged Task Automation Frees Up Time for Stressed Out IT Teams

Automation technologies, from Robotic Process Automation (RPA), to Artificial Intelligence (AI) and Machine Learning (ML), are transforming business processes and operating models. These are relatively new categories, and most enterprises do not yet have the skills to implement automation technologies successfully, including Privileged Task Automation (PTA) associated with a robust Privileged Access Management (PAM) posture.

read more
Zero Trust Plus Zero Touch Equals Exponential Benefits

Zero Trust Plus Zero Touch Equals Exponential Benefits

Apps are increasingly moving to the cloud, especially as more and more people are working remotely and expect to access them from anywhere, any time, on multiple devices. Despite that, the way enterprises secure access to applications has largely remained unchanged, as they are still focused and dependent on the corporate network perimeter.

read more