A Clear Understanding of Security in the Cloud

A Clear Understanding of Security in the Cloud

A Clear Understanding of Security in the CloudOne of the most significant benefits of cloud computing is the ability to respond to rapidly changing workloads. While this provides real value, it can also present security challenges. In fact, numerous studies cite security as the number one inhibitor to cloud adoption.

In a traditional data center environment, the IT infrastructure is protected by a demilitarized zone, a DMZ made up of firewalls and intrusion detection and prevention systems. When applications and data are shifted to the cloud, the concept of a single perimeter no longer holds up. How is the security team to see and understand what it going on in the cloud when it’s, well…cloudy? Organizations can adopt an improved cloud security and risk posture with advanced analytics and security intelligence capabilities.

Build in the ability to see through the cloud. Security devices, such as those validating user IDs and passwords, or monitoring network traffic, capture enormous amounts of data needed for regulatory compliance and forensic investigation. The challenge is to find meaningful signals about a potential attack or security risk in the sea of data points. An advanced Security Information and Event Management (SIEM) system extends the traditional SIEM methodology with real-time analytics and correlation – Security Intelligence – providing visibility into both the data center and the cloud infrastructure.

To really understand what is happening in private, hybrid, and public clouds, security teams need to look into communications at a much deeper level. They need to see beyond simply who is participating in an exchange and discover when the content of these interactions include recognizable data patterns, such as social security numbers, credit card numbers, text—including terms like “ID” or “password”—or other protected information.

Because virtualized server traffic cannot be collected using traditional monitoring technologies, organizations need solutions to monitor virtual environments in support of cloud computing. Virtual flow collectors provide application-layer visibility into all virtual network traffic for advanced security intelligence in the cloud.

Application-aware, flow data is obtained from a deep examination and inspection of every packet, which also allows for advanced threat detection through analysis of packet payload content. Correlating this flow information with network and security events, vulnerabilities, identity information and threat intelligence is the optimal way to obtain a complete and accurate view of an organization’s cloud security posture.

A Clear Understanding of Security in the CloudVirtual flow collectors can also analyze port-mirrored traffic for a physical network switch, which helps bridge the gap between physical and virtual devices in the cloud. Collectors that run on a virtual server and do not require additional hardware are a highly cost-effective solution.

Next-generation SIEMs provide advanced incident analysis via correlation of flow data with log data, providing accurate prioritization of incident data and reduction of false positives by correlating security events and network traffic within and between both cloud and traditional environments.

An advanced SIEM should include a dashboard that:

  • Alerts the security team to suspicious port changes;
  • Tracks who is logging into a virtual machine;
  • Identifies when an IP address has been spun up in a new location; and
  • Identifies other potential incidents that need to be investigated.

With advanced security intelligence accessible in real-time, through the single pane of an integrated dashboard, it is possible to see in the cloud.

About the Author

Gretchen Marx is a manager for cloud security strategy at IBM.

Featured

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX
  • Nothing Artificial About this Intelligence

    I have been looking forward to this year’s GSX show in New Orleans, the Cresent City, or if you prefer The Big Easy. It seems like quite a while since we’ve been here. Twenty years ago, ASIS, as it was known then was literally washed out of the city by someone known as Katrina. It is a good thing to come back to NOLA. Read Now

  • From Monitors to Mission Control

    Security Operations Centers (SOC) were once defined by rows of static monitors, each displaying a single feed with operators quietly watching for issues. That model has become obsolete. Incidents evolve too quickly, data comes from multiple locations, and decisions must be made in seconds—not minutes. Read Now

  • New Gas Monkey Garage Venue Uses AI-Enhanced Video Technology

    Gas Monkey Garage, the automotive custom shop and entertainment brand founded by Richard Rawlings of Fast N’ Loud TV fame, has opened a vibrant new restaurant and bar in South Dakota, equipped with advanced, AI-enhanced video tech from IDIS Americas. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.