SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers
Story image

Ensuring cloud security a critical priority for businesses

Mon, 29th Jul 2024

As more organisations migrate their operations to the cloud, ensuring the security of cloud workloads has become a critical priority.

Although cloud computing offers numerous benefits, it also introduces unique challenges that can expose businesses to significant risks. Research conducted jointly by Kaspersky and ISG indicates that 96% of surveyed organisations either currently use or plan to use cloud-native technologies, such as Kubernetes and Dockers, over the next two years. For 48% of these organisations, data security and compliance are among their foremost concerns when operating in hybrid cloud environments.

Anton Rusakov-Rudenko, Product Marketing Manager, Cloud & Network Security Product Line at Kaspersky, shed light on key challenges in cloud workload security and offered practical solutions to mitigate these risks. "Understanding the current and emerging risks posed to cloud infrastructures, we launched our Kaspersky Cloud Workload Security ecosystem that offers advanced protection for cloud workloads and containerised environments, ensuring that businesses can operate securely and efficiently," said Rusakov-Rudenko. He added, "In the future, we also plan to develop the CSPM functionality within this ecosystem. By leveraging Kaspersky's expertise, organisations can address the key challenges in operating within cloud workloads and maintain a strong security posture."

Data breaches and data leakage remain a significant concern. To address these issues, implementing robust encryption practices both at rest and in transit is crucial. Utilising strong encryption protocols ensures that, even if intercepted or retrieved without authorisation, the data remains unreadable and secure. Employing strict access controls and monitoring user activities can further detect and prevent data breaches.

Misconfiguration and poorly managed access controls also pose a substantial threat. Rusakov-Rudenko recommends using Cloud Security Posture Management (CSPM) tools to automate the detection and correction of misconfigurations in cloud environments. Conducting regular security audits and enforcing the principle of least privilege can ensure that only authorised personnel have access to specific resources, thereby reducing the risk of vulnerabilities related to misconfiguration.

Insider threats, another critical challenge, can be mitigated through robust monitoring and logging systems that track user activities and detect unusual behaviour patterns. Comprehensive user training programmes can raise awareness about security best practices and the potential impact of insider threats. Regularly updating and enforcing security policies also helps minimise the risks posed by malicious or negligent insiders.

Insecure Application Programming Interfaces (APIs) and interfaces are another significant concern. Ensuring the security of APIs and interfaces can be achieved by adopting secure coding practices, regularly testing APIs for vulnerabilities, and employing API gateways to monitor and control API traffic. Implementing strong authentication and authorisation mechanisms can prevent unauthorised access to APIs and interfaces.

Compliance and regulatory requirements also remain a top concern for many organisations. Staying compliant with industry regulations and standards requires continuous monitoring and assessment. Using cloud compliance management tools can simplify the process of tracking compliance across various regulatory frameworks. Regularly updating policies and procedures to align with current regulations and maintaining thorough documentation can help organisations demonstrate compliance and avoid potential penalties.

Defending against Advanced Persistent Threats (APTs) necessitates a multi-layered security approach. Organisations should deploy advanced threat detection and response solutions that leverage machine learning and artificial intelligence to identify and mitigate sophisticated attacks. Regularly updating and patching systems, along with conducting threat hunting exercises, can further strengthen defences against APTs.

A critical aspect of cloud security is understanding the shared responsibility model, which delineates security responsibilities between organisations and their cloud service providers. Regular communication and collaboration with cloud providers can ensure comprehensive security measures and prevent any gaps in protection.

Keeping pace with the rapidly evolving threat landscape requires continuous vigilance and adaptability. Organisations should invest in threat intelligence services that provide real-time updates on the latest threats and vulnerabilities. Cultivating a culture of security awareness and encouraging ongoing education and training for security teams can help organisations stay prepared for new challenges.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X