Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

What's Driving Your Security Strategy in 2018?

DZone's Guide to

What's Driving Your Security Strategy in 2018?

In light of the several high-profile breaches of 2017, we take a look at 4 practices that should be driving your security in 2018.

· Security Zone ·
Free Resource

Mobile is increasingly becoming a part of every consumers’ identity, but the increasing use of this digital channel is escalating the security risks faced by consumers and institutions.

Securing your data and applications in the cloud has never been more important.

The headlines are a constant reminder of the disruptive (or calamitous) impact on a business in the wake of a breach. Many of 2017's most high-profile breaches were a reminder of the vulnerabilities that can come from both inside and outside your organization.

While there is no single solution to prevent every attack, proactively building cloud security awareness throughout the organization is the first line of defense for blocking the malicious activity that often precedes a breach.

Four Best Practices That Should Drive Your Security Strategy in 2018:

  1. Understand your security responsibility.
  2. Make sure your team's cloud security skills are up to the challenge.
  3. Implement security at every level of deployment.
  4. Build a security-first culture.

1. Understand Your Security Responsibility

In the cloud, the entire security framework operates under a shared responsibility model between provider and customer. For this model to be effective, a clear understanding of each side's roles and responsibilities is an essential starting point.

From an infrastructure perspective, the cloud service provider is responsible for ensuring sufficient levels of physical security at their data centers. The service provider manages security throughout their entire global infrastructure, from their physical presence to the underlying foundational resources that provide compute, storage, database, and network services. Together, these features provide a secure cloud environment.

Customers who import data and utilize the provider's services are responsible for using those services and features provided to design and implement their own security mechanisms. This may include access control, firewalls (both at the instance and network levels), encryption, logging and monitoring, and more.

AWS, Azure, and Google Cloud have all adopted a shared responsibility model. Check your service level agreements with each provider to fully understand the obligations on each side.

2. Make Sure Your Team's Cloud Security Skills Are Up to the Challenge

According to McAfee, 36% of organizations are adopting cloud even while admitting the right security skills are not in place.

In 2017, millions of customer records and other sensitive data were exposed as a result of human error and poorly configured security settings in services like Amazon Simple Storage Service (S3). Researchers at RedLock found that 40% of organizations using cloud storage have accidentally exposed one or more of these services to the public. Hackers and other bad actors are fully aware of human fallibility, and they are perfectly positioned to exploit security vulnerabilities when a business takes shortcuts.

In these instances, it's not a failure of technology, but a lack of understanding about the importance of security and a lack of skills that put your business at risk.

Just as business pressures impact the rush to migrate in the first place, the pace and volume of new services and updates released by the leading public cloud vendors make it challenging for teams to keep up. Cloud providers have been quick to develop and release innovative technologies to keep cloud data and applications secure. For example, AWS GuardDuty, released in November, is essentially an intelligent threat detection service, and the first that uses artificial intelligence and machine learning to detect suspicious activity.

It is crucial for companies to invest the time and resources required to train your internal cloud teams to correctly and effectively design safe, secure, auditable, and traceable cloud solutions that also meet the demands of your business.

3. Implement Security at Every Level of Deployment

Your infrastructure is only as secure as its weakest link. Threats are not limited to external sources. Your teams must be prepared to correctly architect against risks from non-malicious internal breaches or loopholes in user privileges to the most sophisticated attacks, and everything in between.

By implementing security measures at every layer of your deployments, you are minimizing the attack surface area of your infrastructure.

Amazon Web Services, Microsoft Azure, and Google Cloud Platform offer a range of services and tools that your teams can use to design, implement, and architect the proper level of security to protect your data and applications in the cloud. Your teams should have a full understanding of the managed security services offered by your cloud service provider, as well as the knowledge and skills to architect the relevant safeguards within their respective parts of the development and deployment lifecycle.

4. Build a Security-First Culture

Cloud adoption impacts your entire business, from technical changes at the infrastructure level to cultural changes that touch all levels and teams of employees. Therefore, security must be part of your business strategy, and it must be reinforced from the very top of your organization.

Without an understanding of the impact of security at every layer of deployment, best practices can be overlooked, mistakes can occur, shortcuts may be taken, and vulnerabilities will be quietly designed into solutions. Building a security-first culture will ensure that security is at the forefront of all corresponding methodologies, practices, processes, and procedures.

By issuing a 'security-first' directive and backing it up with action across all areas of the business, your organization will more confidently operate in the cloud.

Explore the authentication advancements that are designed to secure accounts and payments—without overburdening consumers with a friction-laden experience.

Topics:
security ,security awareness ,cloud security ,security compliance ,data security

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}