The Cloud is burning - brightly!
Hi Everyone,
Today I want to highlight an urgently alarming topic that we can see in the recent State of Cloud and Cyber Security reports. (especially the ones based on data)
In short, the number and severity of findings and incidents are growing like hell, the number of assets is exponentially growing, and the complexity of IT Architecture is exploding in parallel.
One report I want to highlight is the most recent one from JupiterOne "State of Cyber Assets Report 2023". (You can find references to more reports at the bottom of the article.)
In this report, you will find the following chart, showing the asset and findings growth rates:
Check the percent changes. These growth rates are ridiculous!
Also, this report demonstrated that 96.1% of security findings are linked to cloud hosts and images.
But how could we reach this state, and why did we end up here?
What happened?
The first thing that was introduced with CSPs was the complexity growth by itself, followed by some more mistakes we made in parallel.
So, let us run through the reasons in detail:
Who managed the standards and the policies for these? Maybe your DevOps teams who out of a sudden are happy to be part-time security specialists?
Who did take care of these ones? Did you have a guideline or a policy implemented?
Did you have a hardening guide to harden your cloud hosts or images like we have already been doing for centuries? Or did you just hope that the teams will take care of it by themselves?
Did you provide standards or default configurations to the teams they could reuse, or did you hope that all teams would qualitatively equally be able to manage their environments without any guidance?
How did you address Cyber Security and Cyber Resilience in the Cloud? Did you just ignore everything what you have been doing on-premises in the past decades? Did you think about incident processes and responsibilities? Who is accountable and reviewing KPIs?
领英推荐
The current situation is bad.
But it does not need to be.
Managing resources in the Cloud is, in fact, technically much easier and better to handle, with almost no blind spots. There is only one simple requirement to make this statement true: you need to make use of automation and policies.
So, how can we address it?
Final Words
Until here, there should be many of you who directly know (and feel) what I am speaking about. If not, it is very likely that your teams have been silently fighting and suffering these challenges, and you should have a look at the data. (if available)
To properly address this challenge, you will require top-management involvement. The reason is that you may need to modify your org structure, establish the holistic governance and the underlining operating model, grow the right culture, and reuse and share knowledge, standards, and templates. Especially the topic around swarm intelligence will rarely work in a silo-distributed approach.
Doing so will help you address this issue, grow your IT maturity, and move to higher automation and cloud-native / cloud-enabled architectures, finally providing IT Value. You will not only address security concerns and reduce your risk but also be able to operate better. (which will also save you costs)
Recap
Let us create professional environments again and learn from the past.
Let me know your feedback! Do you think differently? Did I miss something, or are there other recommendations you would like to add to help the audience? Add your comments!
References
Best,
David das Neves, CEO, shiftavenue
Senior Cybersecurity Engineer | Global Speaker
1 年Great article, I agree with the take on roles and responsibilities, overall, cloud security is a complex and ongoing challenge, and it's important for organizations to stay vigilant and proactive in their approach to protecting their data and systems in the cloud. And not transfer the same untreated vulnerabilities to a new realm. To address this issue, it's crucial for organizations to prioritize cloud security and implement a comprehensive security strategy that includes strong authentication and access controls, regular vulnerability assessments and penetration testing, encryption of sensitive data, and continuous monitoring and threat detection.
Situational Leadership | Innovations using AI at Scale | Technical Advisor
1 年As AWS SA(Solutions Architect); I begin this conversion with Landing zone, Guardrails (detective & Preventive-conformance packs), COE(Center of Excellence) etc.?Although Cloud Journey for every enterprise is unique it is advised to customer to do a CAF (Cloud Adoption Framework) assessment thereby helping every customer to think the right way; More to read... How to think/plan about succeeding in cloud transformations (prepare)? https://docs.aws.amazon.com/whitepapers/latest/overview-aws-cloud-adoption-framework/your-cloud-transformation-journey.html How to measure the success of cloud transformation (measure)? https://aws.amazon.com/blogs/enterprise-strategy/measuring-the-success-of-your-transformation/
Creating software is more craftsmanship than engineering.
1 年The same as always: Actually, everything is completely obvious. But knocking that into the children's brains of some managers.... In the end, we need to get back to a world in IT where managers are also professional gurus, not learned managers releasing vacation requests and clicking around in Excel all day. Just as it is in many engineering professions. <sarcasm> But IT is not that complex either </sarcasm>.