{"id":39066,"date":"2019-06-04T13:55:30","date_gmt":"2019-06-04T13:55:30","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/news\/2019\/jun\/04\/tipping-scales-cloud-security-risk-securitys-friend\/"},"modified":"2019-06-04T13:55:30","modified_gmt":"2019-06-04T13:55:30","slug":"tipping-the-scales-in-the-cloud-from-security-risk-to-securitys-friend","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/tipping-the-scales-in-the-cloud-from-security-risk-to-securitys-friend\/","title":{"rendered":"Tipping the scales in the cloud: From security risk to security\u2019s friend"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.cloudcomputing-news.net\/media\/img\/news\/customer-satisfaction-survey-feedback-scale-picture-id1137750238.jpg\"><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\">Cloud first, that&rsquo;s the mantra for many organisations today. So, how curious that there was once a time when adoption was not so straightforward.<\/span><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\">Many saw the cloud as an experimental technology suitable for nothing more important than storing holiday photos, while others cited security and compliance concerns as obstacles to adoption.<\/span><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\">Perceptions have changed. No longer is the mention of cloud met with an instant intake of breath and question about security. In fact, there is an understanding that cloud can make your IT environment even more secure and compliant than the use of on-premise infrastructure alone.<\/span><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\">One of the main reasons for this changing perception is experience. Organisations have become less concerned about security as they gain more exposure to&nbsp;<a href=\"https:\/\/www.uk.insight.com\/learn\/articles\/cloud-hub\/2018-09-17-journey-to-a-successful-aws-deployment\" style=\"color:#0563c1; text-decoration:underline\">cloud services<\/a>. Equally they have understood that there is nothing to fear from the cloud if they adopt solid security practices; while trying to block cloud adoption will only lead to users bypassing IT, creating bigger security risks. <\/span><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\">However, maybe the biggest part of the equation is that the cloud is inherently more secure. There&rsquo;s no reason to suggest that operating private infrastructure &ndash; where you would be responsible for monitoring and patching &ndash; would be any more secure than the public cloud and the resources at providers&rsquo; disposal.<\/span><\/p>\n<h3 style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\"><strong>Looking at the evidence<\/strong><\/span><\/h3>\n<p style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\">According to Alert Logic&rsquo;s 2017&nbsp;<a href=\"https:\/\/www.alertlogic.com\/assets\/industry-reports\/alertlogic-cloud-security-report-2017.pdf\" style=\"color:#0563c1; text-decoration:underline\" >Cloud Security Report<\/a>, public cloud installations had the fewest cybersecurity incidents of any cloud type. <\/span><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\">This is because public cloud vendors invest hundreds of millions of pounds in&nbsp;<a href=\"https:\/\/www.uk.insight.com\/learn\/articles\/cloud-hub\/2018-09-19-journey-to-a-successful-aws-deployment-part-2\" style=\"color:#0563c1; text-decoration:underline\">securing their infrastructure<\/a>, the benefits of which are passed onto customers. The mega providers have built a data centre and network architecture designed to meet the requirements of even the most security-sensitive organisations.<\/span><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\">This allows customers to scale and innovate without the need to pay for the cost of development. In many ways, this enhanced security can be viewed as another type of cloud service. The enhanced security could even be viewed as a type of cloud service in that organisations don&rsquo;t have to pay the up-front costs of development and have a lower total cost of ownership.<\/span><\/p>\n<h3 style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\"><strong>Considering compliance<\/strong><\/span><\/h3>\n<p style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\">The same could be said of compliance. The advent of<a href=\"https:\/\/www.uk.insight.com\/learn\/articles\/2017-08-18-preparing-for-gdpr-data-security\" style=\"color:#0563c1; text-decoration:underline\">&nbsp;GDPR<\/a>&nbsp;has caused organisations of all sizes to re-assess their cybersecurity measures and how they handle sensitive data, while those in regulated industries are subject to stringent requirements.<\/span><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\">Because the big cloud providers manage dozens of compliance programs for their infrastructure, any data stored on the cloud is automatically compliant. In most cases the cloud is not a threat to compliance but makes the process easier.<\/span><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\">Most of the providers can also help with data residency. Some jurisdictions, such as the European Union, forbid the transfer of data to territories with inferior data protection roles. While mechanisms such as EU-US Privacy Shield can overcome this, the answer for many organisations is to store information in local data centres.<\/span><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\">The cloud providers now have Availability Zones that provide the answer to the vast majority of data residency needs, allowing businesses to firstly choose where their data is located, while also being safe in the knowledge that data is replicated across multiple data centres to protect against natural or technical disasters.<\/span><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><span style=\"background-color:white\">Of course, public cloud doesn&rsquo;t have all the answers and for certain types of data a <a href=\"https:\/\/www.uk.insight.com\/shop\/microsoft\/solutions\/microsoft-hybrid-cloud\" style=\"color:#0563c1; text-decoration:underline\">hybrid cloud<\/a>&nbsp;model will be more appropriate. What&rsquo;s clear though is the scales have tipped; security isn&rsquo;t the blocker anymore and any many case organisations are turning to the cloud because it provides the security they need in an instant. <\/span><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" style=\"color:#0563c1; text-decoration:underline\"><span style=\"color:blue\"><img decoding=\"async\" alt=\"https:\/\/www.cybersecuritycloudexpo.com\/wp-content\/uploads\/2018\/09\/cyber-security-world-series-1.png\" src=\"https:\/\/www.cybersecuritycloudexpo.com\/wp-content\/uploads\/2018\/09\/cyber-security-world-series-1.png\" style=\"height:59px; width:272px\" \/><\/span><\/a><strong>Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases<\/strong>? Attend the <a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" style=\"color:#0563c1; text-decoration:underline\">Cyber Security &amp; Cloud Expo World Series<\/a> with upcoming events in Silicon Valley, London and Amsterdam to learn more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud first, that&rsquo;s the mantra for many organisations today. So, how curious that there was once a time when adoption was not so straightforward.<br \/>\nMany saw the cloud as an experimental technology suitable for nothing more important than storing ho&#8230;<\/p>\n","protected":false},"author":567,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-39066","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/39066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/567"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=39066"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/39066\/revisions"}],"predecessor-version":[{"id":39067,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/39066\/revisions\/39067"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=39066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=39066"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=39066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}