The Record Issue 13: Summer 2019

62 www. t e c h n o l o g y r e c o r d . c om I n the cloud and in cybersecurity, the sheer speed of development brings many positives – but also some negatives. The defence positives are clear. Threats are now on a zero-day schedule and you need to be prepared in an instant for the next threat. Quick reaction is key. The negatives are less clear. Questions like how to make sure your new defences are deployed correctly, how to ensure they work with your existing defences, and how to train your work- force to report back on the latest threat should it hit your organisation, are harder to answer. The pace of change today means you rarely witness a brand-new technology replacing the previous version. Instead, ‘new’ services usually involve constant improvements to an existing foundation by layering extra features and pro- tection on top of the base solution. This layered approach is also seen in the world of email security. Entry-level protection is common, familiar and similar across vendors. However, as email threats developed in sophis- tication, additional layers of protection were added to this original entry-level stack. There is no need to create a totally new master solution that addresses all threats, as the existing layers serve a purpose and additional ones are simply added to address new and more complex threats as they develop. The same can be seen in cloud security man- agement, where a three-layered approach is developing. The first layer includes the crucial capabilities of security information and event management tools. A lot of this functionality her- alds from the previous universe of on-premises security, so while some of the reporting can be almost real-time, it can also lack inside knowl- edge of the cloud platform and the underlying architecture, requiring professional manual intervention to study the data and apply fixes. Recently, cloud providers have started to intro- duce their own solutions. While this can seem like a good idea, those missing out on a layered product approach will end up simply adding more disparate tools into the business. In this cloud world of zero-unemployment and a lack of security talent across the board, how do you know the fixes have been applied correctly or even if all areas are protected? You simply may not have the resources to do it. But this is essen- tial: you need somebody, or something, to watch the watchers. With the appropriate tools, you can prove the accuracy of deployment and give the admins the peace of mind they need to manage the environment. And that’s the second layer of the stack – a tool that can dig deeper into the planes of the cloud architecture to gather more pertinent data. This A layered approach to cloud security A layered approach to security is essential to defend fast-paced cloud environments from rapidly developing threats CHR I S H I L L : BAR RACUDA NE TWOR K S V I EWPO I NT “The cloud is different. The architecture is different. The underlying planes have been deployed independently, unlike the traditional datacentre method ”

RkJQdWJsaXNoZXIy NzQ1NTk=