February 18, 2021 By David Bisson 4 min read

Starting off on the right foot in digital defense today means having good Cloud Security Posture Management (CSPM). Although it can be challenging to adopt, this set of strategies and tools manages and orchestrates cloud security in ways other tactics don’t. It shows gaps might arise between organizations’ stated cloud defense policies, their actual posture or their overall defenses in the cloud. Let’s take a look at why this is important and how it can be used in the real world.

What Does Cloud Security Posture Management Protect Against?

Seven in 10 organizations experienced cloud computing security incidents some time in 2019, Solutions Review reports. Part of the reason these events keep occurring is that organizations aren’t getting their cloud security right. Most successful attacks on cloud services are the result of misconfigurations and mistakes, Gartner notes. The research firm went on to forecast that 99% of such attacks through 2025 would be the customer’s fault.

These findings highlight the need for groups to better protect themselves in the cloud. That begins with turning to Cloud Security Posture Management tools.

A Real World Example

You can’t shore up your posture if you don’t understand how security works in the cloud. After all, it’s not like classical perimeter defense where the enterprise has complete control over their infrastructure. They can’t manage everything in-house, because they’re using infrastructure that’s owned by someone else. That landscape could be potentially serving other clients.

The Amazon Web Services (AWS) shared responsibility model illustrates the difference between traditional and cloud security well. Cloud defense is shared between a cloud service provider (CSP) and a customer. For its part, the CSP keeps an eye on defense of the cloud by protecting the hardware, software, networking, facilities and other infrastructure that runs the services offered within the cloud. At the same time, the customer must shore up defenses in the cloud by safeguarding customer data, putting identity and access management (IAM) measurements in place, configuring their firewalls and protecting network traffic, depending on the type of cloud deployment model they use.

Barriers to CSPM Entry and How To Overcome Them

It’s this security in the cloud where CSPM provides the most meaningful benefit. You can use CSPM to spot and visualize risks to your cloud security. To do this, you need to understand the risks and threats confronting you in the cloud. CSPM requires that your team monitor for misconfigurations, vulnerabilities and risks to align their cloud security policies and postures.

This puts them face-to-face with some common computing security issues.

Whose Job Is It?

First, many don’t understand the shared responsibility model. In a 2020 study, only eight percent of respondents say they fully understood it with respect to their cloud deployments. This is a problem. If defense teams don’t understand what they need to do, there’s a chance they could leave themselves open. They could also fail to look into the types of options provided by their CSP. This might lead to doubling up on some of the things your cloud can already do.

Be Realistic About Your Users

Some don’t take what users are actually doing into account. Remember, users connect to the cloud using a lot of different devices, networks and locations. In this dynamic and dispersed environment, someone could compromise a real user’s account and then abuse that access to move to other parts of the network — and never be spotted.

Expect More From Vendors

Lastly, many don’t have high enough standards for their integrated vendors. As part of their ongoing move into the digital world, your enterprise might decide to streamline some or all of their supply chains. Many do this by adding third-party vendors into the cloud. Such a decision could make business more effective and productive. But it could also open up a new attack vector through which malicious actors could gain access to your cloud environments.

Having an understanding of those and other cloud security threats is only the beginning. It’s then up to you to use that knowledge in the context of Cloud Security Posture Management to make sure you’re keeping up with relevant regulatory standards and frameworks, adding security into DevOps procedures and responding to potential incidents.

How to Strengthen Your Cloud Security Posture

To strengthen your cloud security posture, you need to first find out where you stand. You can do this by undergoing a security maturity assessment. This exercise will provide a risk baseline to use going forward.

From there, tackle the risks and threats you’ve encountered from the examples above. Here are some ways to do that:

Assuming the enterprise has already migrated to the cloud, you can talk with the CSP about all of the security options that they have available and what’s expected of you under their cloud deployment model. You can then remove any products that might be doing the same thing the CSP can do.

An enterprise can also consider using the principle of least privilege across their entire infrastructure and not just their cloud environments. You could boost this even further by adding more access controls and watching user behavior for strange movements. All of this can take place within the context of a zero trust network.

Finally, hold vendors to account for their own defensive postures. You can do this by mandating vendors to complete service-level agreements that specify the types of security measures they must implement in order to continue to do business with you.

The Beginning of a New Era

Only by knowing your cloud security postures can you find the right tools and make the right investments that will protect your organization against cloud-based threats. It’s important to realize that security postures in the cloud are always changing and cloud-based threats are always evolving. That’s why organizations should consider assessing their postures often with Cloud Security Posture Management and approaching the task of strengthening their cloud security postures as an ongoing process.

More from Cloud Security

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

Cloud security uncertainty: Do you know where your data is?

3 min read - How well are security leaders sleeping at night? According to a recent Gigamon report, it appears that many cyber professionals are restless and worried.In the report, 50% of IT and security leaders surveyed lack confidence in knowing where their most sensitive data is stored and how it’s secured. Meanwhile, another 56% of respondents say undiscovered blind spots being exploited is the leading concern making them restless.The report reveals the ongoing need for improved cloud and hybrid cloud security. Solutions to…

Cloud security evolution: Years of progress and challenges

7 min read - Over a decade since its advent, cloud computing continues to enable organizational agility through scalability, efficiency and resilience. As clients shift from early experiments to strategic workloads, persistent security gaps demand urgent attention even as providers expand infrastructure safeguards.The prevalence of cloud-native services has grown exponentially over the past decade, with cloud providers consistently introducing a multitude of new services at an impressive pace. Now, the contemporary cloud environment is not only larger but also more diverse. Unfortunately, that size…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today