March 13, 2013 By Vikash Abraham 2 min read

While Cloud has been clearly identified as the next step to IT optimization, essential for increased performance and cost reduction, many of us are in a haze when it comes to the fundamental security measures required.

Our fears related to cloud security, for e.g the fear of the unknown ( where is my data stored?) and the fear of the unseen (how does my data flow from one Virtual Machine to another) and the fear of how ‘secure’ the cloud really is lead us to be wary of cloud adoption. Also the new layers of infrastructure create new grey areas, requiring new security solutions such as Virtual Server Protection for specific protection.

Basic components of Cloud and ways to optimize their security

Even though the cloud uses a different mechanism to serve IT infrastructure, be it computing power, memory or storage, the elements that create a cloud still include traditional datacenter components – servers, network, nodes and endpoints. The risks that exist in traditional data centers are also relevant in a cloud environment. Hence, traditional protection solutions such as Firewalls, IPS and Anti-viruses for physical hosts are essential to secure the cloud too. But how do we get smart in customizing traditional solutions to adapt to the requirements of the cloud?

Three cloud scenarios and the relevant host security features

1) Heterogeneous components:

The Cloud is about heterogeneous components coming together to serve as a single standard entity: this would mean that the host environment in a typical cloud would include different types of endpoints running different OS platforms. If separate security products are needed for different OS systems, it would become an administration and configuration nightmare. Hence, a single host protection solution that can support many platforms could reduce considerable effort and cost.

2) Distributed resources:

The Cloud is about a large number of distributed resources working together: this would mean a large number of endpoints at different locations that need to be managed, configured and secured. Again, an administrative nightmare to track and maintain security policies across these endpoints. Here, centralized security management of endpoints needs to be a part of the security solution.

3) Multiple technology layers:

The Cloud is also about multiple technology layers that work seamlessly: the higher the number of layers, the more the chances of gaps and vulnerability. Hackers identify easy entry points and don’t limit themselves to one point of entry. Using techniques such as ‘Advanced Persistent Threats’, they attack through multiple vectors. Security administrators need to ensure that they stay ahead of the hacker and secure the infrastructure from organized attacks.  It is essential to implement a security product that can not only do its specified point job, but can communicate with other security components. This integrated approach will enable identification and blocking of advanced threats to the cloud.

I look forward to your thoughts, queries and comments. Watch out for upcoming blogs that will feature relevant IBM Security solutions to help you resolve these issues.
Learn more about how IBM Security’s Host Protection solutions address cloud security.

More from Cloud Security

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

Cloud security uncertainty: Do you know where your data is?

3 min read - How well are security leaders sleeping at night? According to a recent Gigamon report, it appears that many cyber professionals are restless and worried.In the report, 50% of IT and security leaders surveyed lack confidence in knowing where their most sensitive data is stored and how it’s secured. Meanwhile, another 56% of respondents say undiscovered blind spots being exploited is the leading concern making them restless.The report reveals the ongoing need for improved cloud and hybrid cloud security. Solutions to…

Cloud security evolution: Years of progress and challenges

7 min read - Over a decade since its advent, cloud computing continues to enable organizational agility through scalability, efficiency and resilience. As clients shift from early experiments to strategic workloads, persistent security gaps demand urgent attention even as providers expand infrastructure safeguards.The prevalence of cloud-native services has grown exponentially over the past decade, with cloud providers consistently introducing a multitude of new services at an impressive pace. Now, the contemporary cloud environment is not only larger but also more diverse. Unfortunately, that size…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today