Welcome!

SDN Journal Authors: Liz McMillan, Yeshim Deniz, Elizabeth White, Pat Romanski, TJ Randall

Related Topics: @CloudExpo, Microservices Expo, Agile Computing, Cloud Security, @DXWorldExpo, SDN Journal

@CloudExpo: Article

Migrating On-Premise Controls to the Cloud

In the hybrid cloud, it's all about speed and flexibility

The scale and automation of cloud computing deliver economies of scale - and price points - that can't be matched by traditional computing platforms. Managers can minimize capital expenses and align operational costs to business demands with scalable, flexible resource deployments. Those same factors enable innovation through rapid prototyping and testing of complex systems that aren't feasible - or affordable - with established approaches. It's little wonder the cloud has emerged as the first choice of infrastructure for many IT managers and practitioners.

Security and compliance play just as critical a role in the hybrid cloud as they do in more conventional environments. So it's unfortunate that as organizations move operations to the cloud they tend to mirror the protection efforts they employ with their physical, on-premise systems. It's a mistake because in many cases existing controls don't migrate well to the cloud. As a result, they fail to provide the requisite protection and diminish - or even eliminate - anticipated cost and operational benefits of cloud computing.

The speed and flexibility afforded by cloud computing impact all aspects of IT. And, as with other disciplines, the very attributes responsible for the attractiveness of the cloud lead directly to the potential for failure. From a security and compliance perspective, trying to migrate existing on-premise controls and technologies directly to the cloud presents two distinct risks.

We'll look at specific examples, but a general concern with existing security controls is their inability to keep pace - and maintain protections - in the face of rapidly changing cloud-based environments. That limitation leads directly to unprotected systems, presenting unacceptable risks of loss, compromise, and compliance/audit failures. The alternative to this is to slow deployments in an effort to enable existing security controls to stay ahead of the environment. Since this additional operational friction risks eliminating most or all of the benefits of the cloud, it's equally unacceptable.

Let's look at some specific examples to see how the effort to move existing controls to the cloud can adversely impact security, and how those controls might change to ensure comprehensive, effective protection in the cloud.

Encryption
Encryption of data, at rest or in transit, is a recognized best practice for ensuring confidentially and integrity of systems, and is mandated by a mix of contractual, audit, and regulatory compliance requirements. Most organizations rely on specialized hardware security modules, or HSMs, to perform these computationally intensive cryptographic functions and to protect the cryptographic keys used in the process. HSMs are appliances providing the specialized processors and algorithms needed to accelerate cryptographic functions like generating keys, encrypting data, and creating message authentication codes.

Identical requirements exist within the cloud - and HSMs remain the optimal solution to get the job done. The sticking point here is the migration of workloads to the cloud introduces unacceptable delays in interactions between processing systems and the HSM. Since HSMs are typically installed in a data center, requests from cloud-based applications must traverse the network, adding friction and delay.

Since the delay in interactions is the primary sticking point, this scenario is one where simply migrating the control to the cloud solves the problem. That's precisely what Amazon Web Services has done with their recently announced AWS CloudHSM offering. Powered by high-performance SafeNet HSM technology, the ready availability of an HSM within the cloud enables security teams to manage cryptographic functions with the required level of performance, and the additional assurance needed for the most sensitive data.

Endpoint Protection
Attempts to migrate traditional, agent-based approaches to endpoint protection haven't generally translated well, as a consequence of the dynamic nature of the cloud. Conventional endpoint protection technologies rely heavily on robust threat signature databases and policy definitions. These - particularly threat signatures - change rapidly, many times a day. Following an initial install and configuration, conventional systems simply maintain the currency of the database with frequent downloads and updates.

But that doesn't work with virtual and cloud-based systems, where standardized system images are spun up as needed. At the time they're started, a given system image may be days or weeks old. Whatever signatures definitions are already installed are out of date, leaving ever-expanding gaps in protection, with systems open to attack and exploit.

Ensuring protections are up-to-date as soon as a system is started has required re-architecting endpoint controls. The new approach keeps a locally installed agent on individual systems for scanning and evaluation purposes, but moves the task of maintaining signatures and policies to a centralized cloud-based server. That server performs the ‘heavy lifting' of keeping threat signatures up-to-date. As systems are instantiated in the cloud, the agent can begin evaluating suspect items with transactional queries to the centralized server. Protections are provided without sacrificing the cloud's speed and flexibility advantages.

Privileged Identity Management
Privileged users - trusted individuals such as administrators, consultants, and third parties with a need to access and maintain IT infrastructure - are responsible for a substantial number of system breaches. Those attacks can occur directly both as a consequence of a rogue user, or more often by an external attacker who's managed to compromise sensitive administrative credentials.

In our experience with organizations seeking to get control over privileged users, existing controls arguably don't work that well in existing datacenters. Too often, organizations rely on inherently insecure techniques like storing sensitive credentials in easily accessible spreadsheets, duplicating credentials across myriad devices and systems, and relying on shared administrative accounts, like root, that make it impossible to track individual user activity.

Moving those controls to the cloud simply expands the scope and scale of an already bad situation by orders of magnitude.

But even establishing a baseline set of privileged identity management controls won't completely address the requirements of cloud computing security mandates. Once again, the principal issue is speed. Traditional privileged identity management tools rely on static definitions of resources to be protected, along with associated user identifications and policy prescriptions. Those approaches can't keep pace when new systems are being spun up by the hundreds.

The solution here is automation - by integrating tightly with underlying hypervisor and cloud technologies, the PIM solution can automatically identify new resources as they are created. Once identified, controls can be established - passwords captured and placed under management, access controls established and enforced, monitoring implemented - all at cloud speeds and scale.

Broader Cloud Control Concerns
Migration to the cloud introduces a number of security concerns that apply regardless of the specific security discipline being implemented.

One area many groups overlook is the fact that in the cloud s particularly with metered services like Amazon Web Services - management consoles become de facto procurement systems. Spinning up systems and resources brings a cost, and while the individual expense might be small, uncontrolled spending adds up. Particularly in organizations where expenditures are tightly controlled as a matter of policy (or, in the case of governmental entities, law) this is an area requiring policies and controls.

Similarly, although more apparent, are the risks posed by new cloud technologies themselves. Existing controls don't factor into account the existence of resources like hypervisors and management consoles. These are completely new risks existing controls don't address, which must be addressed from scratch.

Many organizations also find that establishing centralized security controls brings benefits. We've focused primarily on speed and performance, but flexibility is another attractive attribute of the hybrid cloud. IT managers are able to evaluate multiple different platforms as part of their hybrid cloud portfolio, selecting the optimal environment for a system based on cost, scalability, privacy, and other factors. In some circumstances, workloads may even move from one platform to another. Providing consistent security management and controls regardless of the underlying technology, delivers benefits in terms of reduced administrative overhead and less risk of inadvertent gaps in protection.

Bottom Line
The hybrid cloud is an enduring architectural approach to enterprise computing, and with various shared security models and compliance mandates, it's clear IT and security executives will maintain a significant level of responsibility for the integrity of these environments. As we've seen, simply moving existing controls en masse to the cloud will frequently result in inadequate protection from attacks and compromises. It's essential security teams leverage next-generation security and compliance tools to ensure their controls are able to keep pace with the speed and flexibility inherent in the hybrid cloud.

More Stories By Dale R. Gardner

Dale R. Gardner is Director of Product Marketing at Xceedium. He's developed and launched multiple network, systems, and security management products for the enterprise market. A former META Group analyst, he started his career as a programmer and networking specialist.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Organize your corporate travel faster, at lower cost. Hotailors is a next-gen AI-powered travel platform. What is Hotailors? Hotailors is a platform for organising business travels that grants access to the best real-time offers from 2.000.000+ hotels and 700+ airlines in the whole world. Thanks to our solution you can plan, book & expense business trips in less than 5 minutes. Accordingly to your travel policy, budget limits and cashless for your employees. With our reporting, integrations and real-time analytics, you can easily control your travel policy, reduce spendings and increase the efficiency of your company. Hotailors ia an artificial intelligence powered marketplace for business travels. Friendly to use technology based on artificial intelligence to plan, book and expense business travel in 5 minutes. Within one login on one dashboard, user has access to almos...
Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes. We are offering early bird savings on all ticket types where you can save significant amount of money by purchasing your conference tickets today.
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
DXWorldEXPO LLC announced today that the upcoming DXWorldEXPO | DevOpsSUMMIT | CloudEXPO New York will feature 10 companies from Poland to participate at the "Poland Digital Transformation Pavilion" on November 12-13, 2018. Polish Digital Transformation companies which will exhibit at CloudEXPO | DevOpsSUMMIT | DXWorldEXPO include All in Mobile, dhosting, Cryptomage, Perfect Gym, Polcom, Apius Technologies, Aplisens, ELZAB SA, TELDAT, and Rebug.io.