top of page
  • Writer's pictureChris

Cloud Security in the Field - Culture, Talent, and Key Security Services

Updated: Jul 12, 2023

There's a bright spot in every dark cloud. -Bruce Beresford

Working in the field, I’m frequently asked by clients and customers for guidance on the latest developments and challenges in cloud security. As the cloud landscape quickly transforms, the issues and concerns related to cloud security are also evolving quickly. Some of the most pressing cloud security topics from the field today include: transforming company culture, hiring and training the right people, and the importance of service/data perimeters and identity and access management (IAM).


Transforming Company Culture

Almost every organization these days is striving to become more agile and adaptable. At speed, businesses must ensure that every employee is aware of their responsibility with security. This includes the implementation of various security best practices, such as two-factor authentication, anti-phishing measures, and continuous security training and awareness programs (Rouse, 2020).


A culture of "see something, say something" should be actively promoted across the enterprise, encouraging employees to report any suspected security issues or incidents (e.g., opening a ticket, contacting the security team through defined processes and mechanisms, etc.). Although this may lead to an increased workload for the security team due to a higher volume of signals (and noise), the workforce's input is invaluable for providing the best source of intelligence and information “on the ground” (Schneier, 2016).


To help transform company culture, security awareness should be integrated into the company's core values and performance metrics. Regularly hosting security workshops and engaging employees in simulated security scenarios can significantly enhance security mindfulness across the organization.


Hiring and Training

According to Marc Andreessen, software is eating the world (Andreessen, 2011). Thorough knowledge of software engineering is critical to success in security. Security professionals must have a deep understanding of code pipelines, artifacts, and repositories to effectively identify vulnerabilities in packages and libraries (McGraw, 2018). In the field, it can be more efficient and effective to train a skilled software developer/engineer in controls, laws, regulations, and secure coding practices than it is to educate a security "professional" on the intricacies of software engineering (Dhanjani, 2014).


This emphasizes the significance of investing in the right talent and providing them with the necessary training to excel in the increasingly complex world of cloud security. Companies should prioritize hiring individuals who possess a strong foundation in software engineering, as well as a keen interest in security. This approach allows organizations to build a team of professionals who can seamlessly adapt to the evolving cloud security landscape.


In addition to hiring the right talent, continuous training and development opportunities are essential. Software engineers and security professionals should be encouraged to pursue industry-recognized certifications. Providing these opportunities not only helps professionals stay current with the latest developments but also fosters a culture of continuous learning and improvement within the organization. Consider using gamification in promoting training and certifications. Build an internally-public dashboard for everyone to see their progress and compete against others. Also consider setting up weekly training hours, or give your teams one day a month, to continue sharpening the saw. Send out a meeting invite to your entire so everyone gets the reminder and feels encouraged to take the time.


Service or Data Perimeters

A service or data perimeter is a set of preventive guardrails you should implement in your cloud environment. Their primary function is to ensure that only trusted identities have access to trusted resources from expected networks. Designed to serve as always-on boundaries, perimeter guardrails aid in protecting access and data across a variety of cloud accounts and resources.


These organization-wide guardrails are not meant to replace existing fine-grained access controls. Instead, they serve to complement these controls by ensuring that all cloud Identity and Access Management (IAM) users, roles, and resources adhere to a defined set of security standards. This defense in depth/layers approach to security helps create a more robust and comprehensive cloud security implementation.


Organizations should also consider adopting Zero Trust model, operating under the assumption that no user or device can be trusted by default, regardless of whether they are located within or outside of the organization's network. By enforcing strict access controls, continuous monitoring, and real-time threat detection, a Zero Trust model can significantly enhance the security of cloud environments (Cloud Security Alliance).


Identity and Access Management (IAM)

IAM plays a pivotal role in cloud security, as it encompasses the policies, processes, and technologies that enable organizations to manage and control access to resources and data in the cloud (Gartner, 2020). A robust IAM strategy must include authentication, authorization, and accounting mechanisms. These mechanisms ensure that only authorized users have access to sensitive information and that their activities are monitored and logged for audit purposes (Okta, 2021). Effective IAM strategies should also incorporate the use of multi-factor authentication (MFA) and single sign-on (SSO) solutions.


The principle of least privilege (POLP) should be integrated into IAM strategies, ensuring that users are granted only the minimum level of access necessary to perform their job functions. This approach helps minimize the risk of unauthorized access and data breaches, as it limits the potential impact of compromised credentials.


Conclusions

This exploration is not exhaustive, and it is crucial to conduct your own research to stay up-to-date with the latest advancements in cloud security. As cloud adoption continues to grow, so too will the importance of effective cloud security strategies. By transforming company culture, investing in the right talent, and implementing service/data perimeters and a robust IAM approach, organizations can dramatically improve their security posture in the cloud. As new challenges and hot topics emerge, revisiting and updating these strategies will be crucial to maintaining a secure and resilient cloud implementation.


To remain ahead of emerging threats, organizations must regularly assess and fine-tune their security strategies. This includes staying informed about the latest industry trends and advancements, collaborating with your cloud providers, other organizations, security experts, and participating in threat intelligence sharing initiatives. By taking a proactive approach to cloud security, organizations can ensure that their data and resources remain safeguarded in this ever-evolving landscape.


Keep Your Head in the Clouds...

Resources

Sources


Please read this disclaimer.



Recent Posts

See All
bottom of page