cloud security (original) (raw)

By

What is cloud security?

Cloud security, also known as cloud computing security, is a set of policies, practices and controls deployed to protect cloud-based data, applications and infrastructure from cyberattacks and cyberthreats.

Cybersecurity, of which cloud security is a subset, has the same goals. Where cloud security differs from traditional cybersecurity is in the fact that administrators must secure assets that reside within a third-party service provider's infrastructure.

Why cloud security is important

As enterprise cloud adoption grows, business-critical applications and data migrate to trusted third-party cloud service providers (CSPs). Because no organization or CSP can eliminate all security threats and vulnerabilities, business leaders must balance the benefits of adopting cloud services with the level of data security risk their organizations are willing to take.

The following reasons highlight the importance of cloud security:

How cloud security works

Cloud computing operates in three main environments:

  1. Public cloud services. Public clouds are owned and hosted by third-party CSPs. These include software as a service, platform as a service (PaaS) and infrastructure as a service (IaaS). Public cloud services including cloud security services are available to anyone who wants to use or purchase them. Typically, cloud security in the public cloud focuses on protecting data from distributed denial-of-service attacks (DDoS), malware, hackers and unauthorized accesses.
  2. Private clouds. Private clouds are hosted by or for a single organization and are not shared with others. Cloud security in private clouds enables organizations to have more control over their data and resources while still being able to tap into the scalability and other benefits of the cloud.
  3. Hybrid clouds include a mix of public and private clouds. Cloud security in hybrid clouds involves securing data and apps running in the cloud as well as on-premises and other cloud environments. It also requires uniform security options, policies and practices for protection across various cloud providers.

As a result, cloud security mechanisms take two forms: those supplied by CSPs and those enforced by customers. It is important to note that the handling of security is rarely the complete responsibility of the CSP or the customer. It is usually a joint effort using a shared responsibility model.

The shared responsibility model

Although not standardized, the shared responsibility model is a framework that outlines which security tasks are the obligation of the CSP and which are the duty of the customer. Enterprises using cloud services must be clear about which security responsibilities they hand off to their provider(s) and which they need to handle in-house to ensure they have no gaps in coverage.

shared responsibility model in cloud security

The shared responsibility model outlines the security responsibilities of the CSP and the customer.

The workload responsibilities vary depending on whether the workload is hosted on a software-as-a-service, PaaS, IaaS, or in an on-premises data center. In an on-premises data center, the customer owns the whole stack and is responsible for the entire security infrastructure. Customer responsibility commonly increases from software as a service to PaaS to IaaS. However, customers should always check with their CSPs to understand what the provider covers and what they need to do to protect the organization.

SaaS, IaaS, and PaaS cloud service models comparison table

A basic comparison of SaaS, IaaS, and PaaS cloud service models.

CSP security responsibilities

Security controls supplied by CSPs vary by service model, be it software as a service, PaaS, or IaaS.

Here are some important points to consider when it comes to the security responsibilities of CSPs in the different service models:

Customer security responsibilities

Here are some important points to consider in terms of customer responsibilities for cloud security:

Cloud security tools

Many of the same tools used in on-premises environments should be used in the cloud, although cloud-specific versions of them may exist. These tools and mechanisms include encryption, IAM and single sign-on (SSO), DLP, intrusion prevention systems and intrusion detection systems, and public key infrastructure (PKI).

Some cloud-specific tools include the following:

Types of cloud security

Cloud security encompasses various measures taken to protect data, infrastructure, applications and the integrity of cloud environments.

Security as a service is a subset of software as a service. The Cloud Security Alliance (CSA) defined the following security-as-a-service categories:

  1. IAM.
  2. DLP.
  3. Web security.
  4. Email security.
  5. Security assessments.
  6. Intrusion management.
  7. Security information and event management (SIEM).
  8. Encryption.
  9. BC/disaster recovery (BCDR).
  10. Network security.
  11. Continuous monitoring.
  12. Penetration testing.
  13. Vulnerability scanning.

These include services such as firewall as a service, cloud-based virtual private networks (VPNs) and key management as a service (KMaaS). Secure Access Service Edge (SASE) and zero-trust network access (ZTNA) are also emerging as two popular cloud security models.

How to secure data in the cloud

The steps required to secure data in the cloud vary. Factors, including the type and sensitivity of the data to be protected, cloud architecture, accessibility of built-in and third-party tools and number and types of users authorized to access the data must be considered.

Some general best practices to secure business data in the cloud include the following:

Top cloud security challenges

Many of the traditional cybersecurity challenges also exist in the cloud. These can include the following:

As for cloud security challenges specifically, administrators have to deal with issues that include the following:

cloud security challenges diagram

Top cloud security challenges faced by organizations.

Security administrators must have plans and processes in place to identify and curb emerging cloud security threats. These threats typically revolve around newly discovered exploits found in applications, OSes, VM environments and other network infrastructure components. To handle these security challenges and eliminate emerging threats, organizations must quickly and properly update and patch the software that they control.

It's also important to establish communication channels between in-house IT and CSP staff. In-house staff should subscribe to, monitor and digest the CSP's security bulletin stream. If coordination between the customer and CSP is required to handle a security incident, well-documented communication channels must be established and continuously updated so time isn't wasted when working through a security breach.

Cloud security best practices

There are separate security-as-a-service best practices, PaaS best practices and IaaS best practices. Organizations should also adhere to a number of general cloud security best practices, including the following:

  1. Understand the shared responsibility model. Organizations should understand the shared responsibility model, including the responsibilities of their CSPs and their security team. Organizations need to focus on how they connect to the cloud and control data and access.
  2. Choose the CSPs wisely. Businesses should know what security controls the cloud vendors offer and review contracts and service-level agreements diligently.
  3. Adopt an IAM policy. It's important to adopt a strong, granular IAM policy to control who has access to what. The principle of least privilege, also referred to as POLP; strong passwords; 2FA or MFA should also be enforced.
  4. Enforce encryption. Data should always be encrypted, whether it's at rest, in use or in motion.
  5. Conduct continuous monitoring. Companies should maintain cloud visibility through continuous monitoring. Regular monitoring helps with staying on top of security-related feature updates from their cloud providers and also helps with establishing incident response practices.
  6. Establish and enforce cloud security policies . A cloud security policy outlines the guidelines, procedures and controls that govern the security of data, applications and infrastructure in cloud environments. It helps ensure that security measures are consistently applied across the organization's cloud deployments and align with regulatory requirements and industry best practices.
  7. Provide security training. Companies should conduct security awareness training for employees, third-party partners and anyone accessing organizational cloud resources.
  8. Perform cloud segmenting. Cloud segmentation involves dividing cloud environments into unique segments or zones based on factors such as access requirements, data sensitivity and security controls. Segmenting cloud resources enables organizations to set up granular access controls, ensuring that users and apps only have access to the resources they require.
  9. Consult the Cybersecurity Security Information Sheets. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have released joint Cybersecurity Information Sheets (CSIs) to provide organizations with recommended best practices and mitigations to improve the security of their cloud environment. Organizations should look into these to execute best practices for cloud security.

Difference between cloud security vs. cyber security

Cloud security and cybersecurity are related concepts but have different scopes and focuses:

Cloud security specifically deals with protecting data, applications, programs and infrastructure hosted in cloud environments. It encompasses measures and controls deployed to secure cloud-based resources, including data centers, servers, networks and VMs. Cloud security addresses unique challenges such as shared responsibility models, multi-tenancy, data privacy and compliance requirements in cloud computing environments. The primary concern of cloud security is data privacy and protection during data transfer.

Cybersecurity, on the other hand, is a broader discipline that encompasses the protection of computer systems, networks, devices and data from cyber attacks. It includes securing both cloud-based and on-premises IT environments against a wide range of cyber threats, including malware, ransomware, phishing attacks, data breaches and insider threats. Cybersecurity focuses on safeguarding digital assets and information from unauthorized access, manipulation, or theft, regardless of where they are stored or accessed. Cybersecurity primarily deals with keeping information secure at rest.

Future of cloud security

Cloud security is a rapidly evolving field with several emerging trends and technologies shaping its future. Per IBM's Cost of Data Breach 2023 report, 45% of breaches occur within cloud-based systems, with 82% of breaches involving data stored in the cloud. Given the notable surge in cloud-based attacks, it is imperative for companies embracing cloud technology to prioritize robust security measures.

The following are some emerging trends shaping the future of cloud security:

Many organizations face a shortage of in-house cloud security expertise and resources required to adequately protect cloud assets during their transition to hybrid and multi-cloud infrastructures. Learn the benefits of outsourcing cloud security and explore the pros and cons of managed cloud security services.

This was last updated in June 2024

Continue Reading About cloud security

Dig Deeper on Cloud security