Deperimiterized with Security in mind - Part 3

In part 3 of my moving to the cloud recommendation, I address a new taxonomy of securing your cloud based network or - service oriented architecture (SOA).

As companies embraces the cloud and BYOD they are also embarking on a journey where traditional IT security, and compliance measure will not work as effectively. Security and compliance require enabling effective people, process and technology solutions. Cloud based architecture requires new set of security processes and technologies.

The new strategy starts by addressing your network design architecture that outline how you Identify your hosts, and perimeter points. Network and port scanners are not enough to outline your network devices anymore. Traditional network diagrams, do not provide enough detail to outline the boundaries of your network. More complex data flow diagrams (DFD) that focus on application layer design are needed in a cloud only service model.  The design can be complex but worth the effort.  I'd recommend you consider looking at this great tutorial on how to create a DFD design. I'd also recommend reading my good friend Dan Griffin's blog on the topic - Cloud Security: Safely Sharing IT Solutions.

Next is to find new technical risk mitigation that are service oriented. Traditional technology such as firewalls, intrusion detection, and other perimeter protection solutions are not as effective. In this security model, newer methodology such as  Software Defined Perimeter (SDP) need to be considered. SDP provides a solution to "mitigates the most common network-based attacks, including: server scanning, denial of service, SQL injection, OS & application vulnerability exploits, man-in-the-middle, cross-site scripting (XSS), cross-site request forgery (CSRF), pass-the-hash, pass-the-ticket, and other attacks by unauthorized users" as outlined by the Cloud Security Alliance's SDP initiative.  In an SDP model "application owners have the ability to deploy perimeters that retain the traditional model’s value of invisibility and inaccessibility to outsiders".

Besides using SDP, I would include looking at security solutions that can help manage your virtual cloud security perimeter. This  include the use of cloud based proxies, or a cloud access security brokers (CASB).

Cloud proxy are exactly as it sounds. They provide a proxy solution that routes, and encrypts traffic from clients to cloud hosts. Providers in this category include  Vaultive, Centrify, Bluecoat, and many more.

A new emerging set of cloud based security as a service (SecaaS) solutions worth a look at is the cloud access security brokers space or CASB. This category of security solutions provides security policy enforcement points, placed between your users and cloud service providers much like proxy providers, and they also provide enforceable security solutions.  Some of these solutions provide MDM style services as well in their product lines. Products include Netskope, Perspecsys, Skyhigh, and Elastica for instance are in the CASB market. All of these service providers provide a means to manage, secure and log transactions to corporately managed cloud based services. Reducing risk, and enhancing security posture.

And that's it …for now!... Three simple steps, Classify your data, Protect your BYOD environment, and create a cloud based (service based) perimeter of security solutions.

With these tips I think it's possible to move over to a cloud only service model and trust that you have a level of control and security for your company as good as an on premise offering.





Your thoughts and opinions are important, if you think this design is sound or has flaws please let me know…



Next blog -
 In the future ill look closer at the compliance implications to this new model, as well as how 'personal cloud' and tools such as TOR make cloud security remarkably difficult and more complex.

Comments

Popular posts from this blog

Protecting sensitive data

Secure workstation - Root of trust to manage the cloud

Why is privileged access important?