THANK YOU FOR SUBSCRIBING
Many of us have heard the benefits of moving technical infrastructure to the cloud. One that I believe has been overlooked is cyber security. It seems counterintuitive to think that an organization would willingly give up control of its infrastructure and feel more secure. You will be more secure as the services and capabilities continue to improve in an age where cyber security is ever more prevalent.
A sound cyber security strategy should focus on physical, device, identity, and data security. Data, of course, being the holy grail for malicious actors; physical, device, and identity security are all means to the end. Organizations should be able to identify, protect, detect, respond, and recover at each critical security layer. Depending on your provider of choice, cloud offerings provide services that address those layers. For example, if you are using a cloud identity provider, that identity provider is most likely offering multifactor authentication to improve identity protection. Cloud-based storage should provide services that help with compliance, finding documents containing sensitive information related to banking or personal information—then coupled with automation and logging to isolate or tag documents and keep them from being made available to individuals or hackers looking to gain from accessing said document types.
Getting away from client-server setups to deliver services in favor of Software as a Service or Platform as a Service offering and reducing the operating system footprint is improving cyber security. How often have we heard that a system is breached because critical operating system patches weren't applied? Or that a particular protocol or account was attacked, allowing an attacker to move laterally through an organization, wreaking havoc on endpoints and servers alike. When you eliminate or reduce your operating system footprint at that point, what is left to attack (hint: identity is an excellent place to start, see the paragraph above).
“A sound cyber security strategy should focus on physical, device, identity, and data security”
For those organizations that still want to lift and shift their legacy infrastructures but wish to migrate services to a cloud offering, there are still plenty of benefits to be realized in the cyber security space. Cloud service providers deliver incredible tooling to monitor and respond to risks or active threats. Many cloud providers have SEIMs built into their services that take in signals from multiple endpoints across an organization's tenants and help all tenants to respond to threats. Additionally, those same services can surface recommendations on which servers need to address risks in order of importance. For example, they can detect when critical patches are made available and alert system administrators to respond to the risk. All these services and backups are performed at the platform layer, protected from hackers looking to attack backups as part of their strategy to hold an organization hostage. Having recover services well covered is a must! Move your infrastructure to the cloud and reap the numerous benefits made available. I speak from a point of experience as I have successfully thwarted a cyber security attack. Without our previous efforts to migrate our infrastructure, we would not have been successful.