Essential Guide

Combat the latest cloud security challenges and risks

A comprehensive collection of articles, videos and more, hand-picked by our editors
Manage Learn to apply best practices and optimize your operations.

Seven cloud security risks that will ruin your day

3/9

Force-fitting traditional security methods to cloud

Source:  Michael Kloran
Designer: Michael Kloran for TechTarget

Doing things the way they've always been done can backfire. And not adapting security measures to public cloud is like trying to fit a square peg into a round hole -- it doesn't fit and there are bound to be gaps.

"Our technical architectures are brittle when we try to apply them [to the cloud]," said Jim Reavis, co-founder of the Cloud Security Alliance. Traditional security methods -- relying on the firewall to monitor traffic -- don't exist in the cloud.

Data centers have firewalls that offer the first line of defense. Many IT pros use security apps and data analyzers on top of that to capture packets going in and out. With cloud, companies don't have physical access to the system, so "there are more nuanced ways you have to apply security controls," Reavis added.

Developers also make the mistake of relying too heavily on the IaaS provider's security layers, said Justin Franks, lead cloud engineer, Lithium Technologies. Because Amazon Web Services (AWS) security groups, for example, are easy to use, developers may not take the extra steps to edit or manage additional layers of security.

Public cloud does have a security leg up over traditional data centers; cloud providers monitor data and alert customers to malicious activity. Providers also continue to roll out more security services and offer more visibility with access to log files, but those services tend to be a la carte.

"There are thousands of cloud services, so the onus is on the consumer to find out there's no uniform approach to how much visibility [the vendor] provides," Reavis cautioned.

View All Photo Stories

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchServerVirtualization

SearchVMware

SearchVirtualDesktop

SearchAWS

SearchDataCenter

SearchWindowsServer

SearchCRM

Close