Deperimiterized with Security in mind - Part 3
In part 3 of my
moving to the cloud recommendation, I address a new taxonomy of securing your
cloud based network or - service oriented architecture (SOA).
As companies
embraces the cloud and BYOD they are also embarking on a journey where
traditional IT security, and compliance measure will not work as effectively.
Security and compliance require enabling effective people, process and
technology solutions. Cloud based architecture requires new set of security
processes and technologies.
The new strategy
starts by addressing your network design architecture that outline how you
Identify your hosts, and perimeter points. Network and port scanners are not
enough to outline your network devices anymore. Traditional network diagrams,
do not provide enough detail to outline the boundaries of your network. More
complex data flow diagrams (DFD) that focus on application layer design are
needed in a cloud only service model.
The design can be complex but worth the effort. I'd recommend you consider looking at this
great tutorial
on how to create a DFD design. I'd also recommend reading my good friend Dan
Griffin's blog on the topic - Cloud
Security: Safely Sharing IT Solutions.
Next is to find new
technical risk mitigation that are service oriented. Traditional technology
such as firewalls, intrusion detection, and other perimeter protection
solutions are not as effective. In this security model, newer methodology such
as Software Defined Perimeter (SDP) need
to be considered. SDP provides a solution to "mitigates the most common
network-based attacks, including: server scanning, denial of service, SQL
injection, OS & application vulnerability exploits, man-in-the-middle,
cross-site scripting (XSS), cross-site request forgery (CSRF), pass-the-hash,
pass-the-ticket, and other attacks by unauthorized users" as outlined by
the Cloud Security
Alliance's SDP initiative. In an SDP
model "application owners have the ability to deploy perimeters that
retain the traditional model’s value of invisibility and inaccessibility to
outsiders".
Besides using SDP, I
would include looking at security solutions that can help manage your virtual
cloud security perimeter. This include
the use of cloud based proxies, or a cloud access security brokers (CASB).
Cloud proxy are
exactly as it sounds. They provide a proxy solution that routes, and encrypts
traffic from clients to cloud hosts. Providers in this category include Vaultive,
Centrify, Bluecoat, and
many more.
A new emerging set
of cloud based security as a service (SecaaS) solutions worth a look at is the
cloud access security brokers space or CASB. This category of security
solutions provides security policy enforcement points, placed between your
users and cloud service providers much like proxy providers, and they also
provide enforceable security solutions. Some of these solutions provide MDM style
services as well in their product lines. Products include Netskope, Perspecsys,
Skyhigh,
and Elastica
for instance are in the CASB market. All of these service providers provide a
means to manage, secure and log transactions to corporately managed cloud based
services. Reducing risk, and enhancing security posture.
And that's it …for
now!... Three simple steps, Classify your data, Protect your BYOD environment,
and create a cloud based (service based) perimeter of security solutions.
With these tips I
think it's possible to move over to a cloud only service model and trust that
you have a level of control and security for your company as good as an on
premise offering.
Your thoughts and
opinions are important, if you think this design is sound or has flaws please
let me know…
Next blog -
In the future ill look closer at the
compliance implications to this new model, as well as how 'personal cloud' and
tools such as TOR make cloud security remarkably difficult and more complex.
Comments
Post a Comment