Talk to an expert

Report an Incident

How to Select a Secure Cloud Model, One Size Does Not Fit All

02 May, 2023

Many organizations are rapidly adopting, migrating, or expanding their use of the cloud. In some cases, teams need the ease of data access, others want the convenience of cloud-enabled SaaS applications, in addition to a multitude of other reasons. The value, availability, and scalability of the cloud are too significant to ignore, but the risks, complexities, and variables are as well.

When selecting a cloud model for your organization, it is important to keep in mind that one size does not fit all. A recent survey (1), found that 49% of IT decision-makers globally see cybersecurity risks around cloud adoption as being considerably threatening to their business – and in the UAE, this number stands at 58%. The reasons behind these concerns are broad, spanning numerous areas, and many are vital reasons for cloud migrations failing, such as lack of planning, selecting the wrong migration approach, going too big too soon, not testing thoroughly, and overlooking the human element.

In fact, 74% of IT decision-makers surveyed (2) moved an application back from the cloud to their internal on-premises infrastructure due to performance or security issues. This can have a significant impact resulting in disruption of critical and essential services, considerable cost variance and project delays, and most importantly, lessen stakeholder confidence and support.

Moving on the cloud migration journey, ensure critical decisions have been reviewed and agreed upon at an organizational level—considerations around cloud strategy, cloud policy, data classification, handling policy and guidelines, and more. The adoption of a cloud application must be evaluated and justified for the business, IT, and operations.

Conducting an Evaluation

It is mandatory that a security assessment is conducted throughout each project phase, from initiation, design, implementation, post-production, through support and maintenance. The assessment criteria differ depending on the stage of the project. Moreover, the assessment is a shared activity and is conducted with the help of responses received from business leaders, operations, IT, and the cloud service provider.

Phase 1. Business Security Information Gathering

At the initiation phase, an evaluation is conducted to look within the organization and understand if there is indeed a need for cloud. The enterprise information assets to be processed and stored by the cloud must be identified and evaluated to determine asset classification and criticality. Business processes must also be assessed to understand their criticality and availability requirements.

Several aspects are considered at this stage, such as:

  • What customer, partner, or internal data does your application collect?
  • Data must be classified as per the highest classification of data resident in the application.
  • What proprietary data do you create or what transactional data do you deal with?
  • What is the classification and handling policy of the data?
  • What are the local/international/industry regulations, especially with respect to data privacy and sovereignty?
  • A consideration of the penalties associated with a loss or breach.

Phase 2. Cloud Security Decision Framework

This is where a key decision is evaluated and it is determined whether a specific business process can be migrated to cloud versus left and maintained on internal infrastructure. When a process is migrated, a decision on the level of control must be made, specifying the aspects to be left in-house.

The following provide a basic level of control guidance:

  • Public cloud with cloud service provider controls
  • Public cloud with in-house controls such as data sovereignty, encryption requirement etc.
  • Community or private cloud

The evaluation is based on responses received for components within a business context, application layers and security/privacy context (as shown below).

Phase 3. Cloud Compliance Security Requirements

In this phase, the cloud service provider and the proposed cloud application are evaluated against the essential security compliance requirements of the organization. Criteria like the objective of the assessment, the decision framework, and UAE and industry best cybersecurity requirements will be analyzed.

Phase 4. Risk & Recommendations

A useful analysis technique in this phase is the development of organization-specific impact criteria. Impact criteria should, at a minimum, include financial (fines and legal penalties), productivity, business availability, tangible losses, physical security, and reputational loss.

Risk mitigation – reduction, acceptance, or transfer – will also be dependent on the organizational risk tolerance threshold.

This step in the risk management process often requires further analysis of the risk factors to establish a practical course of action or cost-justification for a plan of remediation. Upon completion, the residual risk must be presented to management, including risk owners, so a decision for cloud adoption can be made.

Critical Success Factors

Security is a shared responsibility among all facets of an organization. A critical success factor for the assessment process is ensuring all stakeholders, including business, IT, security, and cloud service provider are part of the assessment and the eventual findings and remediation.

Security must be addressed from the beginning of the project and continue to be evaluated throughout, even after its completion. This will ensure the organization proactively manages its network and cloud environments, rather than putting out fires as they arise after deploying new technologies.

References

1. Equinix 2022 Global Tech Trends Survey

2. Fortinet and IHS Markit, The Bi-Directional Cloud Highway

Author:Shivani Jariwala

Caption - Many organizations are rapidly adopting, migrating, or expanding their use of the hashtag#cloud.When selecting a cloud model, it is important to keep in mind that one size does not fit all. In this article, we explain how your organization can proactively manage its hashtag#network and cloud environments.

Continue Reading

write

20 November, 2024

The Modern CISO Playbook: Top priorities for CISOs in 2025

Read now

30 August, 2024

Ask the Right Questions to Get Data Privacy Compliance Right

Read now

29 December, 2023

Navigating Cyberspace in 2024: A Sneak Peek into the Top Security...

Read now

14 December, 2023

Top systems integration challenges every organization must prepar...

Read now

29 August, 2023

Help ! My Facebook has been hacked

Read now

20 July, 2023

Security Product Research in the Lab: A fair chance to prove your...

Read now

20 July, 2023

The Cyber Security Conundrum: Balancing Ego and Expertise

Read now

20 July, 2023

The Internet Never Forgets

Read now

20 July, 2023

Top Cloud Security Risks and How to Address Them

Read now

20 July, 2023

Why Continuous Education, Training and Awareness are Essential fo...

Read now

02 May, 2023

A 5-Star Partner: Priming Your IT and Security Services for Success.

Read now

02 May, 2023

AI and Cybersecurity: A Tale of Innovation and Protection

Read now

02 May, 2023

Making Sense of Public Ratings in Product Selection Process

Read now

02 May, 2023

Privacy Compliance: A Four-Step Approach

Read now

02 May, 2023

Securing Your Website – Gaining Online Customers’ Trust

Read now