SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
The practical guide to
secure cloud adoption
Keeping applications and data safe when migrating them
to the cloud can be challenging, but it’s not impossible. You
need to know your exact requirements, why you’re
migrating, and a clear idea of how the solution should be
designed and delivered to reduce risk and maximise ROI.
Plenty of organisations now benefit from applications delivered via the cloud. Yet the majority
of these are relatively simple software as a service (SaaS) applications where the Cloud Ser-
vice Provider (CSP) manages the infrastructure and application stack.
When it comes to migrating core applications and data to the cloud, the consumer assumes
much more responsibility for configuring and securing those applications and data – unless
of course, they are taking it as a managed service. Even under the latter, the consumer is still
responsible for defining the requirement and ensuring their suppliers design and deliver the
platform properly.
The benefits of migrating to the cloud are well documented. Moving bigger, more expensive
application environments can mean massive savings in terms of air con, power, cabling, rack
and data centre space. Unfortunately, there’s also been a lot of focus on the associated com-
plexity, cost and risk, which has meant organisations have remained reticent.
Nevertheless, there are technology products, services and processes available in the market
today to address the vast majority of cloud concerns. Migrating core applications is not that
risky if you know what you are doing, engage the right people to support you and specify the
right solution set.
Getting started
The first step for any organisation looking to benefit from cloud computing is to gain a true un-
derstanding of its requirement. Rather than just earmarking an application or system, you need to
know exactly what that application environment is comprised of at an estate level, the business
functions it serves and anticipated benefits in migrating it (or part of it) to the cloud. You also need
to know the level of information security required. This includes how many servers and devices
there are, and the LAN-based security applications and appliances needed – such as anti virus
(AV) and anti malware, firewalls, intrusion prevention systems (IPS), load balancers, patching,
protocols, and security information and event management (SIEM).
The practical guide to secure cloud adoption www.iacs-llp.com
The practical guide to secure cloud adoption www.iacs-llp.com
Information Assurance
The practical guide to
secure cloud adoption
Approaching suppliers with a generic list of requirements and saying ‘I don’t know what I need,
help me…’ will almost certainly result in a large quotation with a complex technology solution,
lengthy project timeline and a huge bill for consultancy. To avoid this, it’s vital to be clear on the
project scope by defining no more than five objectives or reasons why.
For example, the application or system identified is not mission-critical, so issues encountered
during a migration could be tolerated. Or perhaps the current operating system (OS) running the
application or system is coming out of support, providing a good opportunity to install a newer
version and virtualise it.
Once you’ve identified your key objectives or reasons why the planned migration makes sense,
list no more than five key security concerns or reasons as to why not. Taking the time to under-
stand the arguments for and against enables you to address issues and overcome stakeholder
concerns.
It is also vital to review your reasons objectively and be absolutely certain that they are directly
related to the project scope, as practical experience shows that 80% of risk is actually related to
generic information security and IT, with only 20% related directly to cloud issues or industry-spe-
cific threats.
Keeping it simple
To understand your risk, you need to assess the criticality of the data held on your assets and un-
dertake a threat modelling exercise. Both of these processes can entail a great deal of complexity
in terms of threat modelling, information security frameworks, and cost versus risk formulas that
lead to a solution design of such technical granularity that cloud migration projects slow to a
crawl.
Fortunately, these processes don’t have to be complex if you keep it simple. For threat modelling,
there are a number of systems and sources available that allow you to understand the specific
threats to your industry. The Cloud Security Alliance (CSA) for example, publishes ‘The Notorious
Nine’ report on cloud computing top threats, while PwC’s annual Global State of Information
Security Survey splits findings by threat type, source of incident and reported losses.
Harnessing these freely available sources of information enables you to not only assess the
threats that your organisation is exposed to and better understand where your risks come from,
but also to understand the threat posed to the application environment you are looking to migrate.
There are also several information security frameworks that you may need to follow. ISO 21007
is the high-level framework addressing information security managements systems. There’s also
much more detailed frameworks for ensuring compliance with regulation such as the Payment
Card Industry Data Security Standard (PCI DSS). PCI DSS isn’t directly related to cloud, but it
is relevant if the applications you are migrating will be processing cardholder details or financial
transactions. Likewise, the CSA’s Cloud Controls Matrix (CCM) provides a controls framework
that gives a detailed understanding of security concepts and principles aligned to guidance in 13
domains.
CCM is a comprehensive and robust framework with 400 or so controls. But as with the others,
it’s quite complex and all of them will take you a long time to follow when in actual fact, informa-
tion security in the cloud doesn’t have to be this complicated – there is a much simpler way.
The practical guide to secure cloud adoption www.iacs-llp.com
Information Assurance
The practical guide to
secure cloud adoption
Applying the 80 / 20 principle
In the context of cloud security, the 80 / 20 principle means grouping similar assets and applying
the same level of security instead of spending time and money on varying levels of security hard-
ening guidelines, software, policies and processes that invariably ends up increasing complexity
(and thus cost and risk).
The importance of applying the 80 / 20 principle becomes apparent when performing threat mod-
elling because, as stated previously, you will find that 80% of the risk you are exposed to within
a cloud environment is the same as that in conventional physical IT environments. The remaining
20% of the risk will be specific to your application and can be drawn out by using threat model-
ling and the aforementioned sources to look at what has happened previously in your industry.
Approaching information security in the cloud using the 80 / 20 principle allows you to make
decisions that avoid complexity, such as how you assess your levels of criticality. One of the key
challenges with this process is that traditional security models have proved too complex to be
practical.
Data classification is a prime example. The concept is that you classify the various data on a
server as low, medium or high and then apply the appropriate level of controls – such as how that
data can be run, how it is secured when at rest and how it is transmitted securely.
The trouble with data classification is that it’s far too complex, so nobody does it. Typically, there
will be multiple levels of classification on one server, thus the corresponding multiple levels of con-
trols results in increased complexity, increased cost, greater management overhead and a much
higher probability that someone at some point will make a mistake.
Taking a uniform approach
Although it can be important to classify data, it should be implemented at asset level at an abso-
lute minimum. To make information security even simpler, why not take data classification up a
level again, to the application estate? Because at the asset level, you might have 15 applications
you migrate to the cloud with different levels of criticality and controls and still end up with differ-
ent levels of controls for each.
Take patching as an example, which is typically applied according to criticality. Patches are
applied immediately to highly critical assets, monthly for medium criticality assets, and every six
months for low criticality assets. If you just had one rule for patching and apply it across the estate
at the right time, you free up resources to focus on ensuring patches are tested properly first.
After tests are completed successfully, patching can then be applied automatically. Windows
Server has this capability once a patch is approved. This way, patching becomes a one size fits all
model and there’s no complexity and potential for mistakes.
The same applies to your application environment. If you have 15 servers or devices, five of
which you put in the cloud and ten you keep on physical infrastructure, some of the challenges
encountered will be in running a mixed mode environment. With cloud you have virtual switches
and firewalls, a guest network within the cloud platform and virtual machines (VMs). The way this
software and technology works will impact how your traditional infrastructure functions.
For example, OS templates for hardening VMs cannot be deployed automatically on physical
servers. This additional complexity overhead increases your risk of a mistake or something not
working properly. This is not to say you can’t run a mixed environment, but if you are going to do
it, you have to think about the added complexity it entails. However, it could be argued that it’s
better to run each application estate as a unified environment (cloud or physical), or migrate each
application one at a time rather than attempting a mixed mode deployment.
Information Assurance
The practical guide to
secure cloud adoption
Moving faster
With information security and IT there are many inter-related aspects. Whilst it is important to
consider all of them, by making the right decisions it’s possible to positively impact the indirect
aspects. This is the case with criticality. Often you will find stakeholders arguing that the complexi-
ty and the cost are too high. But in practice, by keeping things simple and classifying assets at
an estate level, there will only be several technology items to acquire. Costs can be justified by
focusing on delivering the business benefits, ensuring rapid time to market, and maximising return
on investment (ROI).
Covering 80% of your traditional risk at the outset of a cloud migration project and focusing your
time and money on mitigating the 20% of risk directly associated with cloud ensures a faster
migration and time to market. The only area to address is the delta between what you have done
and what is specific to your application (the risks identified with threat modelling).
Consider a market analysis application estate that includes 15 individual assets. If that application
is feeding important data to another application to make trades, then the confidentiality, integrity
and availability (CIA) of that data are much higher. The requirements you identify here are critical
– i.e. the information has to be 100% guaranteed integrity when it reaches the destination, and it
has to be available within a certain timeframe (milliseconds).
Specify, engage, and demand
Having applied the 80 / 20 principle to arrive at a solid scope identifying the application estate
to migrate, criticality and risk, specifying the right architecture and solution set in the cloud stack
is relatively easy. There is an element of associated cost, but it relates to ensuring you have the
right compute and storage capacity. Here, the ‘Chaos Monkey’ model can help, whereby you spin
up VMs for an hour, transfer the application or system you are running onto that VM, hypervisor
or stack, and then shut down the original host to expose your cloud environment to any sort of
attack or risk.
At this point, you are also ready to commence informal conversations with suppliers. Visit the CSA
register to identify approved or certified providers of technologies by category and rating. Some
will have been assessed by advanced auditors (such as IACS) and achieved Platinum or Gold
status. This resource enables you to select a small number that you want to engage with based
on their experience and maturity level.
The premise of the methodology discussed in this guide is to get you to the point where you are
ready to start talking about technology or engaging an external advisor. Crucially, you are now
equipped with the right level of knowledge to ensure a rapid implementation. Armed with this
approach, you can now be assertive in the articulation of your requirement, and confident in the
fact you will have a robust cloud-enabled environment supporting your strategic goals.
Cut through the complexity and keep cloud migration simple. Get in touch at
enquiries@iacs-llp.com for impartial advice on developing a pragmatic game
plan for secure cloud adoption.
IACS LLP Tel: 0845 519 6138
58 Ayres Street Email: enquiries@iacs-llp.com
London www.iacs-llp.com
SE1 1EU

Más contenido relacionado

Último

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 

Último (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 

Destacado

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destacado (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Secure Cloud Adoption - A Practical Guide

  • 1. The practical guide to secure cloud adoption Keeping applications and data safe when migrating them to the cloud can be challenging, but it’s not impossible. You need to know your exact requirements, why you’re migrating, and a clear idea of how the solution should be designed and delivered to reduce risk and maximise ROI. Plenty of organisations now benefit from applications delivered via the cloud. Yet the majority of these are relatively simple software as a service (SaaS) applications where the Cloud Ser- vice Provider (CSP) manages the infrastructure and application stack. When it comes to migrating core applications and data to the cloud, the consumer assumes much more responsibility for configuring and securing those applications and data – unless of course, they are taking it as a managed service. Even under the latter, the consumer is still responsible for defining the requirement and ensuring their suppliers design and deliver the platform properly. The benefits of migrating to the cloud are well documented. Moving bigger, more expensive application environments can mean massive savings in terms of air con, power, cabling, rack and data centre space. Unfortunately, there’s also been a lot of focus on the associated com- plexity, cost and risk, which has meant organisations have remained reticent. Nevertheless, there are technology products, services and processes available in the market today to address the vast majority of cloud concerns. Migrating core applications is not that risky if you know what you are doing, engage the right people to support you and specify the right solution set. Getting started The first step for any organisation looking to benefit from cloud computing is to gain a true un- derstanding of its requirement. Rather than just earmarking an application or system, you need to know exactly what that application environment is comprised of at an estate level, the business functions it serves and anticipated benefits in migrating it (or part of it) to the cloud. You also need to know the level of information security required. This includes how many servers and devices there are, and the LAN-based security applications and appliances needed – such as anti virus (AV) and anti malware, firewalls, intrusion prevention systems (IPS), load balancers, patching, protocols, and security information and event management (SIEM). The practical guide to secure cloud adoption www.iacs-llp.com
  • 2. The practical guide to secure cloud adoption www.iacs-llp.com Information Assurance The practical guide to secure cloud adoption Approaching suppliers with a generic list of requirements and saying ‘I don’t know what I need, help me…’ will almost certainly result in a large quotation with a complex technology solution, lengthy project timeline and a huge bill for consultancy. To avoid this, it’s vital to be clear on the project scope by defining no more than five objectives or reasons why. For example, the application or system identified is not mission-critical, so issues encountered during a migration could be tolerated. Or perhaps the current operating system (OS) running the application or system is coming out of support, providing a good opportunity to install a newer version and virtualise it. Once you’ve identified your key objectives or reasons why the planned migration makes sense, list no more than five key security concerns or reasons as to why not. Taking the time to under- stand the arguments for and against enables you to address issues and overcome stakeholder concerns. It is also vital to review your reasons objectively and be absolutely certain that they are directly related to the project scope, as practical experience shows that 80% of risk is actually related to generic information security and IT, with only 20% related directly to cloud issues or industry-spe- cific threats. Keeping it simple To understand your risk, you need to assess the criticality of the data held on your assets and un- dertake a threat modelling exercise. Both of these processes can entail a great deal of complexity in terms of threat modelling, information security frameworks, and cost versus risk formulas that lead to a solution design of such technical granularity that cloud migration projects slow to a crawl. Fortunately, these processes don’t have to be complex if you keep it simple. For threat modelling, there are a number of systems and sources available that allow you to understand the specific threats to your industry. The Cloud Security Alliance (CSA) for example, publishes ‘The Notorious Nine’ report on cloud computing top threats, while PwC’s annual Global State of Information Security Survey splits findings by threat type, source of incident and reported losses. Harnessing these freely available sources of information enables you to not only assess the threats that your organisation is exposed to and better understand where your risks come from, but also to understand the threat posed to the application environment you are looking to migrate. There are also several information security frameworks that you may need to follow. ISO 21007 is the high-level framework addressing information security managements systems. There’s also much more detailed frameworks for ensuring compliance with regulation such as the Payment Card Industry Data Security Standard (PCI DSS). PCI DSS isn’t directly related to cloud, but it is relevant if the applications you are migrating will be processing cardholder details or financial transactions. Likewise, the CSA’s Cloud Controls Matrix (CCM) provides a controls framework that gives a detailed understanding of security concepts and principles aligned to guidance in 13 domains. CCM is a comprehensive and robust framework with 400 or so controls. But as with the others, it’s quite complex and all of them will take you a long time to follow when in actual fact, informa- tion security in the cloud doesn’t have to be this complicated – there is a much simpler way.
  • 3. The practical guide to secure cloud adoption www.iacs-llp.com Information Assurance The practical guide to secure cloud adoption Applying the 80 / 20 principle In the context of cloud security, the 80 / 20 principle means grouping similar assets and applying the same level of security instead of spending time and money on varying levels of security hard- ening guidelines, software, policies and processes that invariably ends up increasing complexity (and thus cost and risk). The importance of applying the 80 / 20 principle becomes apparent when performing threat mod- elling because, as stated previously, you will find that 80% of the risk you are exposed to within a cloud environment is the same as that in conventional physical IT environments. The remaining 20% of the risk will be specific to your application and can be drawn out by using threat model- ling and the aforementioned sources to look at what has happened previously in your industry. Approaching information security in the cloud using the 80 / 20 principle allows you to make decisions that avoid complexity, such as how you assess your levels of criticality. One of the key challenges with this process is that traditional security models have proved too complex to be practical. Data classification is a prime example. The concept is that you classify the various data on a server as low, medium or high and then apply the appropriate level of controls – such as how that data can be run, how it is secured when at rest and how it is transmitted securely. The trouble with data classification is that it’s far too complex, so nobody does it. Typically, there will be multiple levels of classification on one server, thus the corresponding multiple levels of con- trols results in increased complexity, increased cost, greater management overhead and a much higher probability that someone at some point will make a mistake. Taking a uniform approach Although it can be important to classify data, it should be implemented at asset level at an abso- lute minimum. To make information security even simpler, why not take data classification up a level again, to the application estate? Because at the asset level, you might have 15 applications you migrate to the cloud with different levels of criticality and controls and still end up with differ- ent levels of controls for each. Take patching as an example, which is typically applied according to criticality. Patches are applied immediately to highly critical assets, monthly for medium criticality assets, and every six months for low criticality assets. If you just had one rule for patching and apply it across the estate at the right time, you free up resources to focus on ensuring patches are tested properly first. After tests are completed successfully, patching can then be applied automatically. Windows Server has this capability once a patch is approved. This way, patching becomes a one size fits all model and there’s no complexity and potential for mistakes. The same applies to your application environment. If you have 15 servers or devices, five of which you put in the cloud and ten you keep on physical infrastructure, some of the challenges encountered will be in running a mixed mode environment. With cloud you have virtual switches and firewalls, a guest network within the cloud platform and virtual machines (VMs). The way this software and technology works will impact how your traditional infrastructure functions. For example, OS templates for hardening VMs cannot be deployed automatically on physical servers. This additional complexity overhead increases your risk of a mistake or something not working properly. This is not to say you can’t run a mixed environment, but if you are going to do it, you have to think about the added complexity it entails. However, it could be argued that it’s better to run each application estate as a unified environment (cloud or physical), or migrate each application one at a time rather than attempting a mixed mode deployment.
  • 4. Information Assurance The practical guide to secure cloud adoption Moving faster With information security and IT there are many inter-related aspects. Whilst it is important to consider all of them, by making the right decisions it’s possible to positively impact the indirect aspects. This is the case with criticality. Often you will find stakeholders arguing that the complexi- ty and the cost are too high. But in practice, by keeping things simple and classifying assets at an estate level, there will only be several technology items to acquire. Costs can be justified by focusing on delivering the business benefits, ensuring rapid time to market, and maximising return on investment (ROI). Covering 80% of your traditional risk at the outset of a cloud migration project and focusing your time and money on mitigating the 20% of risk directly associated with cloud ensures a faster migration and time to market. The only area to address is the delta between what you have done and what is specific to your application (the risks identified with threat modelling). Consider a market analysis application estate that includes 15 individual assets. If that application is feeding important data to another application to make trades, then the confidentiality, integrity and availability (CIA) of that data are much higher. The requirements you identify here are critical – i.e. the information has to be 100% guaranteed integrity when it reaches the destination, and it has to be available within a certain timeframe (milliseconds). Specify, engage, and demand Having applied the 80 / 20 principle to arrive at a solid scope identifying the application estate to migrate, criticality and risk, specifying the right architecture and solution set in the cloud stack is relatively easy. There is an element of associated cost, but it relates to ensuring you have the right compute and storage capacity. Here, the ‘Chaos Monkey’ model can help, whereby you spin up VMs for an hour, transfer the application or system you are running onto that VM, hypervisor or stack, and then shut down the original host to expose your cloud environment to any sort of attack or risk. At this point, you are also ready to commence informal conversations with suppliers. Visit the CSA register to identify approved or certified providers of technologies by category and rating. Some will have been assessed by advanced auditors (such as IACS) and achieved Platinum or Gold status. This resource enables you to select a small number that you want to engage with based on their experience and maturity level. The premise of the methodology discussed in this guide is to get you to the point where you are ready to start talking about technology or engaging an external advisor. Crucially, you are now equipped with the right level of knowledge to ensure a rapid implementation. Armed with this approach, you can now be assertive in the articulation of your requirement, and confident in the fact you will have a robust cloud-enabled environment supporting your strategic goals. Cut through the complexity and keep cloud migration simple. Get in touch at enquiries@iacs-llp.com for impartial advice on developing a pragmatic game plan for secure cloud adoption. IACS LLP Tel: 0845 519 6138 58 Ayres Street Email: enquiries@iacs-llp.com London www.iacs-llp.com SE1 1EU