sb-nz logo
Story image

Cloud workloads at risk from security, management and compliance failings – research

10 Jan 2018

Security, management and compliance challenges are impacting the benefits businesses are receiving from using the cloud as their infrastructures become more complex, new research from WinMagic has found.

39% reported their infrastructure was more complex since using the cloud, and 53% spend more time on management tasks than they have done previously.

Falling short on securing the cloud

98% of the 1,029 IT decision-maker respondents reported using the cloud, with an average 50% of their infrastructure up in the sky.

Over one-third (33%) of respondents reported that data is only partially encrypted in the cloud, and 39% admitted to not having unbroken security audit trails across virtual machines in the cloud, leaving them exposed. 

Asked about their top three concerns on future workloads in the cloud, 58% reported security as their top concern, followed by protecting sensitive data from unauthorised access (55%) and the increased complexity of infrastructure (44%).

On average companies had to use three encryption solutions to protect data across the cloud and on-premises infrastructure, illustrating one of the main ways this complexity emerges.

Compliance confusion

Responsibility for the regulatory compliance of data is a significant area of confusion, with only 39% considering themselves ultimately responsible for the compliance of data stored on cloud services.

Worryingly, 20% believe it is solely the responsibility of the cloud service provider, whilst a further 20% believed they were covered by their cloud service provider’s SLA.

Further, only a quarter (25%) of respondents have automated tools to ensure compliance rules are not broken.

New legislation, such as the EU General Data Protection Regulation which comes into enforcement in May 2018, will see companies required to carefully manage the encryption, storage, use and sharing of personally identifiable information.

As some people know by now, failure to comply can result in fines equivalent to 4% of annual turnover or €20m, whichever is the greater.

Companies should already have an appointed Data Protection Officer, to ensure compliance and mitigate risks. 

“The stakes for companies were already high, with data breaches increasing in frequency and scale,” says WinMagic chief operating officer Mark Hickman.

“EU GDPR reinforces the care that must be taken with data. The simple fact is that businesses must get the controls in place to manage their data, including taking the strategic decision that anything they would not want to see in the public domain, must be encrypted.”

Management tasks are frustrating IT teams

Expanding infrastructure into the cloud has come at a cost for the majority of companies, with a greater burden on IT teams.

Over half (55%) reported needing to use more management tools since migrating workloads to the cloud, sometimes needing multiple tools for the same task.

Over half (53%) reported spending more time on management tasks than ever before. Asked what they would use the time saved on management tasks for they said:

  • IT projects needed to support the business (50%)
  • Accelerate projects that are currently stalling (42%)
  • Improving security (36%)

Hickman adds, “At its heart, using heterogeneous cloud environments is making it harder for businesses to manage security and compliance, leaving staff firefighting rather than focusing on new projects that will benefit their businesses.

“Companies need to think about choosing management tools that are cloud agnostic, and remove complexity.”

Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Interview: How cyber hygiene supports security culture - ThreatQuotient
We spoke with ThreatQuotient’s APJC regional director Anthony Stitt to dig deeper into cyber hygiene, security culture, threat intelligence, and the tools that support them.More
Story image
How cyber-attackers use Microsoft 365 tools to steal data
Vectra security research has recently identified how cyber-attackers use Microsoft Office 365 tools against organisations to steal data and take over accounts.More
Story image
Microsoft takes legal action to disrupt botnet and combat ransomware
Microsoft has announced it took action to disrupt a botnet, Trickbot, one of the world's most infamous botnets and prolific distributors of malware and ransomware.More
Story image
Why best-practice threat data management provides confident automation
Understanding an organisation’s threat landscape requires having both the right threat data sources and the proper prioritisation to derive actionable threat intelligence for your organisation. More
Download image
Enterprise leaders discuss what makes up networking infrastructure
NFV is fast becoming the go-to method of simplifying corporate networks from planning, through deployment and management.More