DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

Related

  • Developers Are Scaling Faster Than Ever: Here’s How Security Can Keep Up
  • AI-Based Threat Detection in Cloud Security
  • Building Enterprise-Ready Landing Zones: Beyond the Initial Setup
  • It’s Not About Control — It’s About Collaboration Between Architecture and Security

Trending

  • Blue Skies Ahead: An AI Case Study on LLM Use for a Graph Theory Related Application
  • Concourse CI/CD Pipeline: Webhook Triggers
  • Artificial Intelligence, Real Consequences: Balancing Good vs Evil AI [Infographic]
  • Immutable Secrets Management: A Zero-Trust Approach to Sensitive Data in Containers
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Five Features of Information Security Every Cloud Platform Should Provide

Five Features of Information Security Every Cloud Platform Should Provide

A discussion of the five kinds of security and enterprise security management for cloud platforms that should be included in all cloud offerings.

By 
Doug Paris White user avatar
Doug Paris White
·
Apr. 24, 18 · Opinion
Likes (2)
Comment
Save
Tweet
Share
7.5K Views

Join the DZone community and get the full member experience.

Join For Free

1: Identity and Access Management (IAM)

Any interaction with a cloud platform should start with establishing who or what is doing the interacting - an administrator, a user, or even a service. Look for providers that offer a consistent way to identify and authenticate anyone accessing applications developed in the cloud.

Similarly, cloud platform vendors should offer a way for developers to build authentication into their mobile and web apps to control end-user access. For example, IBM ® Cloud offers developers App ID as a way to do so.

Organizations that have an existing identity and access management (IAM) system should expect a cloud provider to integrate it into the cloud platform for them - after all, IAM is extremely important for knowing who did what and when.

Finally, as part of IAM, a provider should automatically log all access requests and transactions and make them available for auditing purposes.

2: Networking Security and Host Security

These three technologies are crucial for maintaining network security in the cloud:

  • Security groups and firewalls - Network firewalls are essential for protecting perimeters (virtual private cloud/subnet-level network access) and creating network security groups for instance-level access. Make sure your cloud providers offer these protections.
  • Micro-segmentation - Developing applications cloud-natively as a set of small services provides a security advantage: you can isolate them using network segments. Look for a cloud platform that implements and automates micro-segmentation through network configuration.
  • Trusted compute hosts - Cloud platform providers that offer hardware with load-verify- launch protocols can give you highly secure hosts for running your workloads. Using trusted platform module (TPM) with Intel Trusted Execution Technology (Intel TXT) in compute hosts is an example of how providers might fundamentally secure their platform.

3: Data Security: Encryption and Key Management

It's a boot-strap dilemma of cloud platforms that encryption, to be useful, depends on keeping encryption keys from being accessed without authorization. How do you prevent administrators on a platform you don't control from accessing your keys? Bring your own keys.

A bring-your-own-keys (BYOK) model protects cloud workloads that require encryption. In this approach, your key management system generates a key on-premise and passes it to the provider's key management service. The root keys never leave the boundaries of the key management system, and you're able to audit all key management activities. Any platform provider serious about protecting client data should offer BYOK key management for encryption of data at rest, data in motion, and container images.

4: Application Security and DevSecOps

As your DevOps team members build cloud-native apps and work with container technologies, they need a way to integrate security checks without stalling business outcomes. An automated scanning system helps ensure trust by searching for potential vulnerabilities in your container images before you start running them.

However, since simply scanning registry images can miss problems such as drift from a static image to deployed containers, look for a cloud vendor that also scans running containers for anomalies. For example, IBM Cloud Container Service offers a Vulnerability Advisor to provide both static and live container security through image scanning.

5: Visibility and Intelligence

Expect full visibility into your cloud-based workloads, APIs, microservices - everything. Ask cloud providers you're considering if they have a built-in cloud activity tracker that can create a trail of all access points - including web and mobile access - to the platform, services, and applications. Your organization should be able to consume logs and integrate them into your enterprise security information and event management (SIEM) system.

Some cloud service providers also offer security monitoring with incident management and reporting and real-time analysis of security alerts. As an example, IBM QRadar® is a comprehensive SIEM offering that provides a set of AI-empowered security intelligence solutions that can grow with your organization's needs.

As organizations address the specialized security needs of cloud platforms, they need and expect their providers to become trusted technology partners. Use the five fundamentals of cloud security to find a well-defended platform environment that supports fast application development without sacrificing security.

Cloud security Information security

Published at DZone with permission of Doug Paris White, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • Developers Are Scaling Faster Than Ever: Here’s How Security Can Keep Up
  • AI-Based Threat Detection in Cloud Security
  • Building Enterprise-Ready Landing Zones: Beyond the Initial Setup
  • It’s Not About Control — It’s About Collaboration Between Architecture and Security

Partner Resources

×

Comments

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: