How Does Cloud Security Work
How Does Cloud Security Work
As such, there’s no single explanation that encompasses how cloud security ‘works’.
Thankfully, there are a widely established set of strategies and tools you can use to achieve
a robust cloud security setup, these include:
Identity and Access Management
All companies should have an Identity and Access Management (IAM) system to control
access to information. Your cloud provider will either integrate directly with your IAM or
offer their own in-built system. An IAM combines multi-factor authentication and user
access policies, helping you control who has access to your applications and data, what
they can access, and what they can do to your data.
Physical Security
Encryption
Using cloud technology, you are sending data to and from the cloud provider’s platform,
often storing it within their infrastructure. Encryption is another layer of cloud security to
protect your data assets, by encoding them when at rest and in transit. This ensures the
data is near impossible to decipher without a decryption key that only you have access to.
Another practice to maintain and improve cloud security is vulnerability and penetration
testing. These practices involve you – or your provider – attacking your own cloud
infrastructure to identify any potential weaknesses or exploits. You can then implement
solutions to patch these vulnerabilities and improve your security stance.
Micro-Segmentation
Micro-segmentation is increasingly common in implementing cloud security. It is the
practice of dividing your cloud deployment into distinct security segments, right down to
the individual workload level.
By isolating individual workloads, you can apply flexible security policies to minimize any
damage an attacker could cause, should they gain access.
Next-Generation Firewalls
Next-Generation firewalls are another piece of the cloud security puzzle. They protect your
workloads using traditional firewall functionality and newer advanced features. Traditional
firewall protection includes packet filtering, stateful inspection, proxying, IP
blocking, domain name blocking, and port blocking.
When you move to the cloud you introduce a new set of risks and change the nature of
others. That doesn’t mean cloud computing is not secure. In fact, many cloud providers
introduce access to highly sophisticated security tools and resources you couldn’t
otherwise access.
It simply means you need to be aware of the change in risks in order to mitigate them. So,
let’s take a look at the unique security risks of cloud computing.
Loss of Visibility
Compliance Violations
Lack of Cloud Security Strategy and Architecture
Insider Threats
Contractual Breaches
Insecure Application User Interface (API)
Misconfiguration of Cloud Services
1. Loss of Visibility
Most companies will access a range of cloud services through multiple devices,
departments, and geographies. This kind of complexity in a cloud computing setup –
without the appropriate tools in place – can cause you to lose visibility of access to your
infrastructure.
Without the correct processes in place, you can lose sight of who is using your cloud
services. Including what data they are accessing, uploading and downloading.
If you can’t see it, you can’t protect it. Increasing the risk of data breach and data loss.
2. Compliance Violations
With the increase in regulatory control, you likely need to adhere to a range of stringent
compliance requirements. When moving to the cloud, you introduce the risk
of compliance violations if you are not careful.
Many of these regulations require your company to know where your data is, who has
access to it, how it is processed, and how it is protected. Other regulations require that
your cloud provider holds certain compliance credentials.
A careless transfer of data to the cloud, or moving to the wrong provider, can put your
organization in a state of non-compliance. Introducing potentially serious legal and
financial repercussions.
This a cloud security risk that you can easily avoid, but many don’t. In their haste
to migrate systems and data to the cloud, many organizations become operational long
before the security systems and strategies are in place to protect their infrastructure.
Make sure you implement a security strategy and infrastructure designed for cloud to go
live inline with your systems and data.
4. Insider Threats
Your trusted employees, contractors, and business partners can be some of your biggest
security risks. These insider threats don’t need to have malicious intent to cause damage
to your business. In fact, the majority of insider incidents stem from a lack of training or
negligence.
While you currently face this issue, moving to the cloud changes the risk. You hand control
of your data to your cloud service provider and introduce a new layer of insider threat
from the provider’s employees.
5. Contractual Breaches
Any contractual partnerships you have will include restrictions on how any shared data is
used, how it is stored, and who is authorized to access it. Your employees unwittingly
moving restricted data into a cloud service without authorization could create a breach of
contract which could lead to legal action.
Make sure you read your cloud providers’ terms and conditions. Even if you have
authorization to move data to the cloud, some service providers include the right to share
any data uploaded into their infrastructure. Through ignorance, you could unintentionally
breach a non-disclosure agreement.
It is external-facing APIs that can introduce a cloud security risk. Any insecure external API
is a gateway offering unauthorized access by cybercriminals looking to steal data and
manipulate services.
Misconfiguration of cloud services is another potential cloud security risk. With the
increased range and complexity of services, this is a growing issue. Misconfiguration of
cloud services can cause data to be publicly exposed, manipulated, or even deleted.
But it’s not all negative, cloud security can also offer significant benefits. Let’s explore why
cloud security is a critical requirement.
A driving force for secure cloud practices is the ever-increasing threat from cybercriminals
– both in volume and sophistication. To quantify the threat, a Cloud Security Report from
(ISC)2 found that 28% of businesses experienced a cloud security incident 2019. With
the UK Government also reporting 32% of UK businesses experiencing an attack on the
systems in the past 12 months.
A loss or breach of data breaches can have significant legal, financial, and reputational
implications. IBM now estimates the average cost of a data breach at US$3.92 million in
its latest report.
We’ve already mentioned how cloud security carries the risk of compliance violations. To
demonstrate the implications of non-compliance, you need only observe Germany’s
federal privacy watchdog who recently handed 1&1 Telecommunications a €9.55 million
fine for violating the EU’s General Data Protection Regulation (GDPR).
Good cloud security helps maintain your business continuity. Protecting against threats
like a denial-of-service attack (DDoS attack). Unplanned outages and
system downtime interrupt your business continuity and impact your bottom line.
A Gartner research study estimates this downtime cost at an average of US$5600 per
minute.
Beyond threat protection and avoiding the consequences of poor practice, cloud security
offers benefits that make it a requirement for businesses. These include:
1. Centralized Security
In the same way cloud computing centralizes applications and data, cloud security
centralizes protection. Helping you to improve visibility, implement controls, and better
protect against attacks. It also improves your business continuity and disaster recovery
having it all in one place.
Info
Kinsta offers a security guarantee with each plan and, in case something bad happens,
security specialists will fix your site.
2. Reduced Cost
A reputable cloud service provider will offer in-built hardware and software dedicated to
securing your applications and data around the clock. This eliminates the need for
significant financial investment in your own setup.
3. Reduced Administration
Moving to the cloud introduces a shared responsibility model for security. This can provide
a significant reduction in the amount of time and resource invested into administering
security. The cloud service provider will take on responsibility for securing their
infrastructure – and you – across storage, compute, networking, and physical
infrastructure.
4. Increased Reliability
A leading cloud service provider will offer cutting edge cloud security hardware and
software that you can rely on. You will gain access to a continuous service where your
users can securely access data and applications from anywhere, on any device.
To help you with this challenge, we’ve compiled a series of security best practices for cloud-
based deployments.
CLOUD SECURITY IS A SUB-DOMAIN OF COMPUTER SECURITY AND, MORE
BROADLY, INFORMATION SECURITY. CHECK OUT THESE BEST PRACTICES FOR
CLOUD-BASED DEPLOYMENTS! ☁️🔐CLICK TO TWEET
The foundation of cloud security best practice is built on selecting a trusted service
provider. You want to partner with a cloud provider who delivers the best in-built security
protocols and conforms to the highest levels of industry best practice.
A service provider who extends a marketplace of partners and solutions to you in order to
further enhance the security of your deployment.
The mark of a trusted provider is reflected in the range of security compliance and
certifications they hold. Something any good provider will make publicly available. For
example, all leading providers like Amazon Web Services, Alibaba Cloud, Google
Cloud (which powers Kinsta), and Azure offer transparent access where you can confirm
their security compliance and certifications.
Beyond this, there are many factors that go into selecting a trusted provider. We cover this
later in the article with a top 10 checklist for assessing the security of any cloud provider.
When partnering with a cloud service provider, and you move your systems and data to
the cloud, you enter into a partnership of shared responsibility for security
implementation.
A critical part of best practice involves reviewing and understand your shared
responsibility. Discovering which security tasks will remain with you and which tasks will
now be handled by the provider.
This is a sliding scale depending on whether you’re opting for Software as a Service (SaaS),
Platform as a Service (PaaS), Infrastructure as a Service (IaaS), or in an on-premises
datacenter.
Google Cloud Platform Shared Responsibility Model
You might not think of reviewing your cloud contracts and SLAs as part of security best
practice, you should. SLA and cloud service contracts are only a guarantee of service and
recourse in the event of an incident.
There is a lot more included in the terms and conditions, annexes, and appendices that can
impact your security. A contract can mean the difference between your cloud service
provider being responsible for your data and owning it.
According to the McAfee 2019 Cloud Adoption and Risk Report, 62.7% of cloud providers
don’t specify that customer data is owned by the customer. This creates a legal grey area
where a provider could claim ownership of all your uploaded data.
Check who owns the data and what happens to it if you terminate your services. Also, seek
clarity on whether the provider is required to offer visibility into any security events and
responses.
If you’re unhappy with elements of the contract, try to negotiate. If any are non-
negotiable, you need to determine if agreeing is an acceptable risk to the business. If not,
you’ll need to seek out alternative options to mitigate the risk through encryption,
monitoring, or even an alternative provider.
Your users are the first line of defense in secure cloud computing. Their knowledge and
application of security practices can be the difference between protecting your system or
opening a door for cyber attacks.
As a best practice, make sure you train all your users – staff and stakeholders – who access
your systems in secure cloud practices. Make them aware of how to spot malware,
identify phishing emails, and the risks of insecure practices.
Implementing tight control of user access through policies is another cloud security best
practice. Helping you to manage the users that are attempting to access your cloud
services.
You should start from a place of zero trust, only affording users access to the systems and
data they require, nothing more. To avoid complexity when implementing policies, create
well-defined groups with assigned roles to only grant access to chosen resources. You can
then add users directly to groups, rather than customizing access for each individual user.
Secure Your User Endpoints
Another element of cloud security best practice is to secure your user endpoints. The
majority of users will access your cloud services through web browsers. It’s therefore
critical you introduce advanced client-side security to keep your users’ browsers up-to-
date and protected from exploits.
You should also consider implementing an endpoint security solution to protect your end-
user devices. Vital with the explosion of mobile devices and remote working, where users
are increasingly accessing cloud services through devices not owned by the company.
Look for a solution that includes firewalls, antivirus, and internet security tools, mobile
device security, and intrusion detection tools.
The use of cloud services can be diverse and fleeting. Many organizations use multiple
cloud services across a range of providers and geographies. With research suggesting
cloud resources have an average lifespan of 2 hours.
This kind of behavior creates blind spots in your cloud environment. If you can’t see it, you
can’t secure it.
Make sure you implement a cloud security solution that offers visibility of your entire
ecosystem. You can then monitor and protect cloud usage across all your disparate
resources, projects and regions through one single portal. This visibility will help you
implement granular security policies and mitigate a wide range of risks.
Implement Encryption
Encryption of your data is a security best practice regardless of location, critical once you
move to the cloud. Using cloud services, you expose your data to increased risk by storing
it on a third-party platform and sending it back and forth between your network and the
cloud service.
Ensure you implement the highest levels of encryption for data both in transit and at rest.
You should also consider using your own encryption solutions before uploading data to
the cloud, using your own encryption keys to maintain full control.
A cloud provider might offer built-in encryption services to protect your data from outside
parties, but it affords them access to your encryption keys.
Kinsta operates a fully encrypted approach to further protect its secure WordPress hosting
solutions. This means we don’t support FTP connections, only encrypted SFTP and SSH
connections (here’s the difference between FTP and SFTP).
A strong password security policy is best practice regardless of the service you are
accessing. Implementing the strongest policy possible is an important element in
preventing unauthorized access.
As a minimum requirement, all passwords should require one upper-case letter, one
lower-case letter, one number, one symbol, and a minimum of 14 characters. Enforce that
users update their password every 90 days and set it so the system remembers the last 24
passwords.
A password policy like this will stop users from creating simple passwords, across multiple
devices, and defend against most brute force attacks.
As an additional layer of security best practice and protection, you should also
implement multi-factor authentication. Requiring the user to add two – or more – pieces
of evidence to authenticate their identity.
The use of a CASB is fast becoming a central tool to implement cloud security best
practice. It’s software sitting between you and your cloud service provider(s) to extend
your security controls into the cloud.
A CASB offers you a sophisticated cloud security toolset to provide visibility of your cloud
ecosystem, enforce data security policies, implement threat identification and protection,
and maintain compliance.
You can discover more about how a CASB works later in the guide, including a list of the
top 5 CASB providers.
To help we’ve compiled a top 10 security checklist when evaluating a cloud service
provider.
When moving to a cloud service, a key element of security is the protection of data in
transit between you (the end-user) and the provider. This is a two-fold responsibility for
both you and the provider. You’ll need network protection to prevent the interception of
data and encryption to prevent an attacker from reading any data should it be intercepted.
Look for a service provider who offers you a set of tools to help you easily encrypt your
data in transit and at rest. This will ensure the same level of protection for any internal
data transit within the cloud service provider, or transit between the cloud service provider
and other services where APIs may be exposed.
2. Asset Protection
When selecting a cloud service provider, you need to understand the physical location of
where your data is stored, processed and managed. This is especially important following
the implementation of government and industry regulations like GDPR.
To ensure your assets are protected a good provider will have advanced physical
protection in their data center to defend your data from unauthorized access. They will
also ensure your data assets are erased before any resources are re-provisioned or
disposed of to prevent it from falling into the wrong hands.
3. Visibility and Control
A key factor in security is the ability to see and control your own data. A good service
provider will offer you a solution that provides full visibility of your data and who is
accessing it, regardless of where it is and where you are.
Securing your cloud deployment will take more than one solution or partner. A good
cloud service provider will make it easy for you to find and connect with different partners
and solutions through a marketplace.
Look for a provider with a marketplace offering a curated network of trusted partners with
a proven security track record. The marketplace should also offer security solutions that
provide one-click deployment and are complementary in securing your data whether
operating in a public, private, or hybrid cloud deployment.
A good cloud service provider will offer tools that enable secure management of users.
This will help prevent unauthorized access to management interfaces and procedures to
ensure applications, data and resources are not compromised.
The cloud provider should also offer functionality to implement security protocols that
separate users and prevent any malicious (or compromised) user affecting the services and
data of another.
When considering a cloud service provider, security and compliance go hand in hand.
They should meet global compliance requirements that are validated by a third-party
organization. You want a cloud service provider who follows industry best practice for
cloud security and ideally holds a recognized certification.
The Cloud Security Alliance’s Security, Trust, and Assurance Registry (STAR) program is a
good indicator. Also, if you’re operating in a highly regulated industry – where HIPPA, PCI-
DSS, and GDPR might apply – you’ll also need to identify a provider with industry-specific
certification.
To ensure your compliance efforts are both cost-effective and efficient, the cloud service
provider should offer you the ability to inherit their security controls into your own
compliance and certification programs.
Your cloud provider should ensure access to any service interface is limited to authorized
and authenticated individuals only.
When looking at providers, you want a service offering identity and authentication
features including username and password, two-factor authentication, TLS client
certificates and identity federation with your existing identity provider.
You also want the ability to restrict access to a dedicated line, enterprise, or community
network. A good provider only delivers authentication through secure channels – like
HTTPS – to avoid interception.
Make sure to avoid services with weak authentication practices. This will expose your
systems to unauthorized access leading to data theft, changes to your service, or a denial
of service. Also avoid authentication over email, HTTP, or telephone.
These are extremely vulnerable to social engineering and interception of identity and
authentication credentials.
8. Operational Security
When selecting a cloud service, look for a provider who implements strong operational
security to detect and prevent attacks. This should cover four core elements:
Subscribe Now
You want a provider who offers transparency in the assets that make up the service,
including any configurations or dependencies. They should inform you of any changes to
the service which might affect security to ensure vulnerabilities don’t occur.
Vulnerability Management
Your provider should have a vulnerability management process to detect and mitigate any
new threats to their service. You should be kept informed of these threats, their severity
and the planned threat mitigation timeline which includes resolution.
Protective Monitoring
Any provider worth their salt will have advanced monitoring tools to identify any attack,
misuse or malfunction of the service. They will take quick and decisive action to address
any incidents – keeping you informed of the outcome.
Incident Management
Your ideal provider will have a pre-planned incident management process in place for
common types of attacks. They will be ready to deploy this process in response to any
attack.
There will be a clear contact route to you to report any incidents, with an acceptable
timescale and format in place.
9. Personnel Security
You need a cloud service provider whose personnel you can trust, as they will have access
to your systems and data. Your chosen cloud service provider will have a rigorous and
transparent security screening process in place.
They should be able to verify their personnel’s identity, right to work, and check for any
unspent criminal convictions. Ideally, you want them to conform to your countries locally
established screening standard, such as BS 7858:2019 for the UK or completion of form I-9
in the US.
In addition to screening, you want a service provider who ensures their personnel
understand their inherent security responsibilities and undergo regular training. They
should also have a policy to minimize the number of people who have access to and can
affect your services.
10. Secure Use of the Service
You can choose a cloud provider with cutting edge security and still experience a breach
through poor use of the service. It’s important to understand where security
responsibilities lie when using the service.
Your level of responsibility will be influenced by your cloud deployment model, how you
use any services and the built-in features of any individual service.
For example, you have significant security responsibilities with IaaS. Deploying a compute
instance, responsibility would fall to you to install a modern operating system, configure
security, and ensure ongoing patches and maintenance. The same is true of any
application you deploy on that instance.
So, make sure you understand the security requirements of your chosen service and any
security configuration options available to you. Ensure you also educate your staff in
secure use of your chosen services.
Thankfully, in the place of governing bodies, there are a number of organizations that
dedicate themselves to supporting the industry. The Cloud Security Alliance is one such
organization.
To give you a better understanding of the Cloud Security Alliance, let’s take a closer look
at how they support the industry.
Membership
The CSA is built on the foundation of its members. Joining the CSA as a member opens a
range of different benefits depending on whether you’re an individual, enterprise, or
solution provider.
Primarily these fall into similar categories including access to their expert network of other
members, a seat on the International Standardization Council, discounts on training, and
access to exclusive events and webinars
Assurance
The CSA has developed one of the most renowned cloud security certification programs:
the Security, Trust & Assurance Registry (STAR).
Education
To support continual improvement of cloud security in the industry, the CSA offers a range
of education services. You can pursue a range of cloud security certifications developed by
the CSA, access their knowledge center, and take part in their regularly scheduled
educational webinars and events.
Research
The CSA continues to support the industry developing and innovating cloud-security best
practice through its ongoing research. This is driven by their working groups which now
span 30 domains of cloud security.
Most recent and cutting edge include the emergence of working groups for DevSecOps,
the Internet of Things, Artificial Intelligence, and Blockchain. The CSA continually publishes
its research – free of charge – ensuring the industry can keep up-to-date and informed of
the ever-changing nature of cloud security.
Community
The CSA also supports the industry by continuing to maintain and develop the cloud
security community. They have created and maintain a wide range of communities which
allow minds from across the cloud security industry to connect, share knowledge and
innovate.
These growing communities come in many forms. There CSA chapters you can join to
connect with local professionals and CSA summits where the best minds share their
expertise with the masses. There is even the CSA blog that hosts a community of followers
wanting to keep pace with the CSAs practices.
What is Kaspersky Security Cloud?
When talking about cloud security, it’s easy to focus on enterprises and forget about the
need for individual consumers.
If you’re accessing cloud services for your own personal use – photos, files, life admin –
you need to think about the security of your data: Kaspersky Security Cloud, the new
adaptive cloud-based security solution from Kaspersky.
Combining the very best features and applications from Kaspersky Lab’s anti-virus
software, it creates responsive protection for users’ devices against digital threats.
Kaspersky Security Cloud protects your devices against malware and viruses, adding
functionality to adapt how you use each device to provide maximum protection at all
times. It offers features including antivirus, anti-ransomware, mobile security, password
management, VPN, parental controls, and a range of privacy tools.
The platform is available on Windows, macOS, Android, and iOS. The Kaspersky Security
Cloud Family plan offers protection for up to 20 devices.
To help you better understand the Kaspersky Security Cloud offering, we’ve taken a closer
look at the core functionality within the platform which is split into four sections:
Scan
The critical functionality you want from any security solution, Kaspersky Security Cloud can
scan your devices and remove any malware or viruses found. You can choose from a
number of scanning options including individual files, quick scan, whole system, and
scheduled.
Struggling with downtime and WordPress issues? Kinsta is the hosting solution
designed with performance and security in mind! Check out our plans
Privacy
You can protect your privacy using built-in functionality to check your online accounts to
ensure they are not compromised, block your webcam from being accessed, and block
website traffic to prevent your browsing activities being monitored.
You can extend your privacy with additional downloads of Kaspersky Secure Connection
and Kaspersky Password Manager. Secure Connection encrypts all data you send and
receive while also hiding your location, while Password Manager stores and secures your
passwords.
Home Network
Home Network gives you the visibility of all devices that are connected to your home
network. Identifying those that are protected by Kaspersky Security Cloud. The
functionality allows you to be notified when a new device connects and also block any
unknown devices.
HD Health
Useful, yet simple, the HD Health functionality gives you a rating of you Hard Drives disk
condition and disk temperature. Giving information on error rates, power cycles, power-on
hours, total data read, and total data write.
Kaspersky Security Cloud is a great example of how the adoption of cloud services has
created the need for new security solutions.
In the next section, we look at a similar example in the enterprise world with the arrival of
Cloud Access Security Brokers.
A CASB will help you defend against high-level cloud security risks and support ongoing
monitoring and mitigation of high-risk events. It does this by securing the data moving
between your on-premise and cloud environment using your organization’s security
policies.
A CASB will protect you from cyberattacks with malware prevention and secure your data
using end-to-end encryption preventing outside users from deciphering the content.
A CASB can be deployed in three separate ways: as a reverse proxy, forward proxy, or in an
‘API mode’. Each has its own unique advantages and disadvantages, with many industry
experts recommending a multimode deployment.
Reverse Proxy
A reverse proxy sits in front of the cloud service, providing inline security capabilities by
sitting in the path of the network traffic. The connection of the reverse proxy broker runs
from the internet to your application server, hiding information behind it that is coming
from the original source.
Forward Proxy
A forward proxy sits in front of the user, with the CASB proxying traffic to multiple cloud
platforms. The connection of the forward proxy runs from you, sat behind your firewall, to
the internet. Like the reverse proxy, it also provides inline security capabilities.
API Mode
Unlike the proxy deployments, using the Application Program Interface (API) allows for
direct integration of the CASB and a cloud service. This allows you to secure both
managed and unmanaged traffic.
Depending on the cloud service providers’ API functionality, you can view activity, content,
and take enforcement action.
A CASB delivers functionality which falls under four ‘pillars’, these include:
1. Visibility
When a cloud application sits outside the view of your IT department, you create
information that is uncontrolled by your business’ governance, risk, and compliance
processes.
A CASB gives you visibility of all cloud applications and their usage. Including vital
information on who is using the platform, their department, location, and the devices
used.
2. Data Security
Using a cloud platform creates an increased risk of inadvertently sharing data with the
wrong people. If you’re using cloud storage, a typical data loss prevention (DLP) tool won’t
be able to track or control who is accessing your data.
A CASB helps you to enforce data-centric security within a cloud platform combining
encryption, tokenization, access control, and information rights management.
3. Threat Protection
One of the most difficult security threats to protect against is your own staff. Even former
employees who’ve been disabled from your organization’s core systems may still be able
to access cloud apps containing business-critical information.
CASBs allow you to detect and respond to malicious or negligent insider threats,
privileged users, and compromised accounts within your cloud infrastructure.
4. Compliance
When your data moves to the cloud, you’ll need to ensure you maintain data security and
privacy to comply with industry and governmental regulations. A CASB will do this for you,
identifying and enforcing DLP policies on sensitive data in your cloud deployment. Helping
you to maintain compliance with regulations including SOX and HIPAA.
A CASB will also help benchmark your cloud security configuration against core regulatory
requirements like PCI DSS, NIST, CJIS, MAS and ISO 27001.
The mass migration of services to the cloud paired with the need to implement cloud
security due to the significant risks of data breach and loss has created an explosion in the
CASB market.
As a next-generation technology, CASBs have become an essential element of cloud
security strategy. With one in five large enterprises uses a CASB to secure or manage their
cloud services, according to Gartner’s “Magic Quadrant for Cloud Access Brokers” report:
Gartner has identified five the leaders in the CASB market using their ‘Magic Quadrant’,
these include:
McAfee
McAfee entered the CASB market in January 2018, with its high profile its acquisition of
Skyhigh Networks. Now known as MVISION Cloud, the platform provides coverage across
all four CASB pillars for a broad range of cloud services.
The platform provides a comprehensive DLP engine and offers advanced controls
including encryption, and tokenization of structured and unstructured data. The CASB can
be deployed for API inspection with reverse-proxy-mode capabilities, and forward proxy.
McAfee has also made an on-premises virtual app available for those that require it.
Microsoft
Microsoft’s CASB offering is called Microsoft Cloud Application Security. The platform
supports multiple deployment modes including reverse proxy and API connectors.
Microsoft continues to develop the CASB solution with enhanced visibility, analytics, data
control, and innovative automation functionality.
Microsoft Cloud Application Security also natively integrates with Microsoft’s growing
portfolio of security and identity solutions including Azure Active Directory and Microsoft
Defender Advanced Threat Protection.
This allows Microsoft to offer customers a fully integrated solution across their Microsoft
platforms with single-click deployments.
Netskope
Unlike many players in the space who are simply acquiring CASB solution providers,
Netskope remains an independent company. The provider is renowned for excellence in
application discovery and SaaS security assessments.
Netskope supports thousands of cloud services through published APIs and inline
decoding of unpublished APIs. The CASB offers DLP and identifies threats in real-time
using combined threat intelligence, static and dynamic analysis and machine learning-
based anomaly detection.
Symantec
Symantec’s CASB offering is called CloudSOC, enhanced in 2016 with the acquisition and
integration of Blue Coat Systems’ Perspecsys and Elastica products.
CloudSOC offers DLP using automated data classification and multimode oversight using
native cloud APIs, real-time traffic processing, and input from multiple data feeds. You can
automatically identify and nullify threats from inside and outside your organization with
advanced user behavior analytics (UBA).
Bitglass
The platform runs natively from the cloud and is renowned as the only provider securing
corporate data on mobile devices without using agents or profiles. Bitglass rose to
prominence by introducing a zero-day approach focussed on trust ratings, trust levels and
at rest encryption.
Thankfully, the cloud training and certification market continues to evolve and offer up a
number of solutions. You can now choose from a wide range of platform-specific and
vendor-neutral certifications to help you develop and prove the skills you need. Whether
you’re looking to develop foundation knowledge or tailor your skillset to a specific job
role, there is a certification for you.
To help in your search, we’ve compiled a list of the top 10 cloud security certifications to
achieve in 2021.
Earning just one of these certifications will not only help you better secure your cloud
deployment, but it’ll also make you more employable, and advance your salary.
Earning the CCSP demonstrates you have the advanced technical skills and knowledge to
design, manage and secure data, applications, and infrastructure in the cloud. You will do
this using the best practices, procedures, and policies developed by cybersecurity experts
at (ISC)2. The CCSP is ideal if you’re an Enterprise Architect, Systems Engineer, Security
Administrator, Architect, Engineer, or Manager.
Before training and attempting the CCSP exam, you’ll need to meet some strict experience
requirements. You’ll need five years full-time experience working in IT, including three
years in cybersecurity and one year in one or more of the six domains of the CCSP CBK.
You can substitute the experience requirements you hold the equally advanced (ISC)²
CISSP credential – titled ‘The World’s Premier Cyber Security Certification.
Earning the CCSK certification will prove you have the foundation skills and knowledge
required to secure data in the cloud. You’ll learn how to build a baseline of security best
practices mapped to a range of responsibilities from configuring technical security controls
to cloud governance.
By becoming CCSK certified, you will also meet some prerequisite experience required if
you intend to pursue the more advanced CCSP certification from (ISC)².
By achieving the AWS Certified Security, you’ll validate your skills across data
classifications, encryption methods, secure Internet protocols, and the AWS mechanisms
required to implement them.
Working towards the certification, you can choose from a diverse learning pathway to
shape your knowledge and skills across security fundamentals, architecting and security
engineering on AWS. By the end of the pathway, you’ll have developed the control and
confidence to securely run applications in the AWS Cloud.
To start working towards the credential, you should be in a security role and have at least
two years of hands-on experience securing AWS workloads.
So, earning the Azure Security Engineer Associate certification shows you have the skills to
be a Security Engineer on the Azure Cloud Platform. This includes the ability to protect
data, applications, and networks in a cloud environment. Implementing security controls
and threat protection as well as managing identity and access.
There are no prerequisite skills requirements before you attempt the AZ-500: Microsoft
Azure Security Technologies exam.
By pursuing the Professional Cloud Security Engineer certification, you’ll need to learn how
to configure access, network security and ensure data protection within the Google Cloud
Platform. You’ll also need to develop knowledge to ensure compliance and managed
operations.
Like the Azure and AWS certifications, this credential is ideal if you’re looking to develop
cloud security skills specific to the Google Cloud Platform. Advancing your career with this
leading cloud provider.
This ACA Cloud Security certification is the first in a certification pathway from Alibaba.
Gaining this certification will prove you have the foundation knowledge to apply cloud
security principles in an Alibaba cloud deployment.
You’ll develop fundamental skills with Linux and networking operations. While also
learning about hosting, application, network and data security solutions all within the
Alibaba Cloud Platform. You’ll cover several key security products from Alibaba including
Server Guard, WAF, Anit-DDoS basic, and Pro.
After achieving the associate level certification, you can then pursue the Alibaba ACP
Cloud Security certification.
Alibaba ACP Cloud Security Certification
The ACP Cloud Security certification is the second certification in the Alibaba cloud
security pathway. It is a more advanced certification aimed at architects, developers and
O&M professionals working with Alibaba Cloud security products.
Building on the foundation skills and knowledge achieved in the ACA Cloud Security
certification, you’ll learn about Alibaba Cloud’s core products in security, monitoring, and
management.
Once you have achieved the Professional level certification, you can then pursue the
Alibaba ACE Cloud Security certification. Though the expert level certification is still in
development and is expected to launch soon.
Working towards the certification you will learn the skills and knowledge to apply best
practices in a cloud environment for security and governance. Covering key topics like
cloud service management, governance, and strategy. You’ll also learn how to design,
deploy, and migrate a cloud service in a secure environment.
Due to the advanced nature of the certification, it is recommended you already hold
the CCC Cloud Technology Associate and CCC Cloud Virtualization Essentials delivered by
EXIN.
Oracle Cloud Platform Identity and Security Management 2019 Certified Associate
The title of Oracle’s cloud security certification is self-explanatory, you will learn about
identity and security management on the Oracle Cloud Platform. Ideal if you’re a security
professional looking to demonstrate their expertise in implementing cloud solutions.
Preparing for the certification, you’ll cover core security functionality in the Oracle cloud
platform. Building knowledge and skills to implement Oracle Identity Cloud Service, Oracle
CASB Cloud Service, services Architecture and Deployment, and Identity Security
Operations Center Framework
Passing the 1Z0-1070 exam will certify you as an Oracle Certified Associate (OCA), a
globally recognized credential. You will validate your capabilities with the Oracle Cloud
Security portfolio, including configuration of the services. Before getting started, you’ll
need up-to-date and hands-on experience with Cloud Security implementations in an
administrator role.
The SEC524: Cloud Security and Risk Fundamentals is a course, not a certification. I’ve
included it regardless as it teaches vital skills and knowledge not covered by the other
certifications listed.
Most importantly, you’ll learn how to evaluate the security of different cloud providers.
Covering the cloud computing delivery models – SaaS, PaaS, and IaaS – and their unique
security requirements. As well as additional security considerations when operating in a
public, private, or hybrid cloud scenario.
Finishing the course you’ll come away with a range of key abilities. How to assess cloud
contracts, adapt security architecture, tools, and processes for use in cloud environments
and perform vulnerability assessments of your cloud setup.
Summary
Moving to the cloud, you need to be ready to implement a comprehensive cloud security
strategy from day one. This starts with identifying the right cloud service provider(s) and
then implementing a strategy combining the right tools, processes, policies and best
practices.
In cloud security, your staff — or your cloud provider’s — are among the most critical and
often overlooked aspects of defense against cybercriminals.
It’s important to remember that cloud computing is no less secure than deploying your
services on-premises. In fact, many cloud providers offer advanced security hardware and
software you would otherwise not have access to.
Choosing the right provider will improve your security stance and reduce your risks,
regardless of those introduced by cloud computing.
If you enjoyed this article, then you’ll love Kinsta’s WordPress hosting platform.
Turbocharge your website and get 24/7 support from our veteran WordPress team. Our
Google Cloud powered infrastructure focuses on auto-scaling, performance, and security.
Let us show you the Kinsta difference! Check out our plans