December 28, 2016 By Richard O'Mahony 2 min read

The cloud platform market is a competitive landscape, with well-established incumbents facing off against disruptive newcomers looking to secure their own market shares. This competition drives cloud service providers (CSPs) to focus on adding new features to differentiate themselves, potentially at the expense of cloud security.

Asking The Right Questions About Cloud Security

Naturally, consumers will look to evaluate CSPs based on these functional capabilities. This means they typically ask potential providers questions such as:

  • How quickly can I build my cloud-based offering?
  • How much money can I save by leveraging a CSP?
  • Which provider offers the best high-availability solution?

These are key factors when selecting a solution. Given the number of high profile data breaches that have occurred recently, however, cloud-savvy customers should rethink how they measure CSPs.

CSPs must be ready to react to a renewed focus on cloud security. The most successful providers will be those best equipped to answer the following questions:

These questions arise from a lack of understanding of how CSPs manage critical business assets. To bridge this gap, providers must look to build trust with their consumers by creating transparent and open communications.

Juggling Compliance Standards

To start, providers must aim to achieve well-known and trusted certifications, such as ISO 27K. These independently certifiable standards will assure consumers that the expected levels of IT security are in place.

CSPs should also consider adopting cloud-specific compliance initiates, such as the Cloud Security Alliance (CSA) Security Trust and Assurance Registry (STAR), which aims to demystify the growing number of IT-related compliance standards.

Transparency Transformation

As companies continue to adopt multicloud and hybrid models at an increasing rate, the roles and responsibilities of consumers, providers and subcontractors must be clearly defined. CSPs should move away from jargon-heavy terms and conditions and embrace a collaborative approach to ensuring the overall security and compliance of the offerings they host.

CSPs should also make attestation reports, such as the American Institute of Certified Public Accountants (CPA)’s Service Organization Control (SOC) reports, publicly available. They can also share their incident response plans with customers in the event of a security breach.

Auditing Frameworks

The traditional approach to point-in-time audits against recognized security standards help customers gain confidence in CSP practices. The dynamic nature of cloud services, however, will drive consumers to look for greater real-time transparency into the security posture of upstream providers.

CSPs will have to consider ways to give consumers increased visibility while protecting their intellectual property and business reputations. Frameworks for continuous auditing are being defined by research and cloud advocacy groups, but these frameworks will require the participation of CSPs to be successful.

Cloud security is a differentiating factor for CSPs. As cyberattacks continue to increase in volume and scope, it will become even more important for CSPs to answer customer concerns and take the necessary steps to build trust.

More from Cloud Security

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Cloud threat report: Possible trend in cloud credential “oversaturation”

3 min read - For years now, the dark web has built and maintained its own evolving economy, supported by the acquisition and sales of stolen data, user login credentials and business IP. But much like any market today, the dark web economy is subject to supply and demand.A recent X-Force Cloud Threat Landscape Report has shed light on this fact, revealing a new trend in the average prices for stolen cloud access credentials. Since 2022, there has been a steady decrease in market…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today