How To Secure IaaS/PaaS Environments Effectively With Cloud Workload Protection
Securing Infrastructure-as-as-Service (IaaS) and Platform-as-a-Service (PaaS) offerings are about having the right tools and the right managed security provider. Cloud computing offers significant advantages to IT who must continuously meet changing business demands and opportunities. IT can recognize economies of scale, save on overhead and staff resources, and scale up or down near-instantly with as-a-service offerings. Moving to the cloud gives IT/Security the opportunity to refocus limited time and resources on strategic business opportunities instead of managing infrastructure and technology. For most mid-sized organizations and smaller enterprises, freeing-up IT time means faster time-to-market and increased revenue from products and services.
What changes from a security perspective when migrating to IaaS/PaaS?
Fundamentally, none of the security essentials change when migrating to cloud computing. Rather, what changes is the security focus of the IaaS tenant — in other words the enterprise. In the IaaS shared security model, the IaaS provider assures security of the virtual machines, disks & storage and networking, while the IaaS tenant is responsible for security of the operating system, software stack, and data. The IaaS tenant must now focus on what he or she can control, but must also trust (and verify) that the IaaS is doing its job correctly. This bifurcation of responsibilities is good because the IaaS tenant’s limited security resources will now go a lot further in reducing overall risk.
Is IaaS/PaaS more or less secure than on-prem environments?
A few years ago, the enterprise perception was that cloud computing environments were less secure than on-premise environments. The reality is that for all organizations (except perhaps the most well resourced large ones) IaaS has the ready-potential to be substantially more secure than on-premise environments. Security is an overhead cost, and big organizations with big budgets can spend much more money and time than mid-sized organizations to do security correctly. This trend extends to IaaS/PaaS providers who have the most extensive security budgets and world-class security teams with state-of-the-art security tools and processes. As long as the tenant picks a reputable IaaS/PaaS provider and focuses on what they should be controlling, they will improve their security. This last point is critical because if the IaaS tenant does not do their part, the whole security model will fail.
What should IaaS/PaaS customers be doing to secure their part of the shared security model?
There are a number of controls and best practices you should put in place. Here are some key ones (in no particular order):
- Lock down root account credentials and create access groups and users with limited privileges (based on job responsibilities). Monitor all access 24/7 for suspicious activity.
- Remove unneeded software and applications from workload images and harden through configuration settings. Monitor 24/7 for any configuration drift.
- Scan production workloads in real-time for vulnerabilities and kill instances deemed risky. Replace with new workloads based on the patched image.
- Segment network traffic using Virtual Private Clouds and host firewalls. Monitor traffic for malicious activity.
- Encrypt data-at-rest and data-in-motion and monitor for correct crypto configurations.
- Monitor logs, processes running, and other workload settings 24/7 for indicators of compromise (IoCs) and take immediate action when incidents happen. Learn more about Masergy’s managed detection and response security services.
How should IaaS customers do this?
It starts with a mature, well-defined process for dev-sec-ops: make sure code is architected and developed securely, well tested along the way, and configured correctly. But it also needs real-time security monitoring, which can’t be accomplished with traditional security tools such as software appliances. They don’t have enough visibility into workloads and containers, are prone to misconfigurations which cause security issues, and simply do not scale in dynamic cloud environments.
What do you recommend for securing cloud workloads?
Cloud Workload Protection is a new agent-based technology that is specifically designed for cloud computing environments. It deploys quickly, scales immediately, and is automated to remove human errors. Cloud Workload Protection also offers rigorous security and workload integrity controls and monitoring capabilities to address any and all security risk cases.
What are the drawbacks to Cloud Workload Protection?
None, except that, like with any detection and response tool, it requires continuous monitoring to catch security incidents before they become major issues or breaches. And that’s why Masergy has launched Cloud Workload Protection as a managed service. We’ve extended our Managed Detection and Response ecosystem to cover the best available Cloud Workload Protection technology from our partner CloudPassage. We have integrated it with Masergy’s patented security analytics for rigorous coverage. As a managed service, our certified and tenured security analysts monitor cloud workloads in our 24/7 global Security Operations Centers (SOC). Masergy SOC analysts immediately triage alerts and execute responses in a highly competent manner. Masergy Cloud Workload Protection is a turnkey IaaS/PaaS security managed service.
Why should organizations be interested in Managed Cloud Workload Protection?
Leveraging a managed security service for tenant-side security gives IT/Security teams the opportunity to refocus limited time and resources on strategic business opportunities instead of managing infrastructure and technology. For most mid-sized organizations and smaller enterprises, freeing up the time spent managing IaaS/PaaS alerts and risk means faster time-to-market and increased revenue from products and services. Managed Cloud Workload Protection cost-effectively solves IaaS/PaaS security challenges with automated visibility, control, and 24/7 monitoring from our global team of certified security experts for real-time alerting and incident response. Like with IaaS/PaaS vendors, Masergy customers benefit from our economies of scale and scope for security operations and monitoring without ever losing our industry-leading customer focus. Furthermore, Managed Cloud Workload Protection is a turnkey service, which means that our teams are available to help with security policy configurations, ensuring that each workload type is rigorously protected. Don’t miss out on the opportunity to enhance your cloud security capabilities.
Contact us today and consult with one of our Managed Security experts.
Call us now to arrange a consultation (866) 588-5885.
Or arrange for a consultation through our request form.
Four Strategies to Improve Network Security and Unlock IoT Innovation
Security and network visibility can obstruct IoT innovation. These tips can help you prioritize and address the most critical aspects of IoT.
Security maturity: How to benchmark your status and focus on strategic objectives
Benchmarking security maturity sharpens your strategy. Here’s a model for self-assessment, next steps, and sound investments at every maturity level.
Automation supercharges the Masergy client experience
New automation engine accelerates time-to-service, giving clients faster price quotes, speedier order orchestration, and smoother migration processes.
What is SASE? And why it’s the next big thing
SD-WAN, trends in security, and changes at the WAN edge are triggering an IT rethink — it’s called SASE.
The impact of AI on cybersecurity: Are humans still your best asset?
With AI, how much of security can be automated today? It’s time to unpack advances in cybersecurity technologies.
Masergy ramps up marketing and introduces new brand identity and website
Masergy Cyber Security Chief David Venable Honored Among ‘Most Influential People in Security’
Masergy Announces Top Channel Partners for FY 2019
Masergy Launches Integrated SD-WAN And Security Bundles
Masergy Announces 2020 STEM Scholarship Opportunities–Students Apply Now!
Masergy supports students with inventions making an impact on society. A new STEM scholarship will award $10,000 in total prizes to innovative college students. Get the application details.
Masergy Appoints Rebecca Carr as Chief Marketing Officer
Masergy Announces Spring 2019 STEM College Scholarship Winner
Threat Minute: Dispelling the Biggest Cybersecurity Myth in InfoSec Today
The Director of Security Solutions at Masergy dispels one of the biggest cybersecurity myths that he hears the most.
Managed Security Services vs. Managed Detection and Response: What’s the Difference?
Detection and response services take traditional security services a step further. Here’s how it’s different and how to know if you need it.
IoT Necessities: Getting Your Network and Security Ready
Are you ready for IoT? Five necessities prepare the IT environment to successfully manage and secure a plethora of connected devices.