The cloud platform market is a competitive landscape, with well-established incumbents facing off against disruptive newcomers looking to secure their own market shares. This competition drives cloud service providers (CSPs) to focus on adding new features to differentiate themselves, potentially at the expense of cloud security.

Asking The Right Questions About Cloud Security

Naturally, consumers will look to evaluate CSPs based on these functional capabilities. This means they typically ask potential providers questions such as:

  • How quickly can I build my cloud-based offering?
  • How much money can I save by leveraging a CSP?
  • Which provider offers the best high-availability solution?

These are key factors when selecting a solution. Given the number of high profile data breaches that have occurred recently, however, cloud-savvy customers should rethink how they measure CSPs.

CSPs must be ready to react to a renewed focus on cloud security. The most successful providers will be those best equipped to answer the following questions:

These questions arise from a lack of understanding of how CSPs manage critical business assets. To bridge this gap, providers must look to build trust with their consumers by creating transparent and open communications.

Juggling Compliance Standards

To start, providers must aim to achieve well-known and trusted certifications, such as ISO 27K. These independently certifiable standards will assure consumers that the expected levels of IT security are in place.

CSPs should also consider adopting cloud-specific compliance initiates, such as the Cloud Security Alliance (CSA) Security Trust and Assurance Registry (STAR), which aims to demystify the growing number of IT-related compliance standards.

Transparency Transformation

As companies continue to adopt multicloud and hybrid models at an increasing rate, the roles and responsibilities of consumers, providers and subcontractors must be clearly defined. CSPs should move away from jargon-heavy terms and conditions and embrace a collaborative approach to ensuring the overall security and compliance of the offerings they host.

CSPs should also make attestation reports, such as the American Institute of Certified Public Accountants (CPA)’s Service Organization Control (SOC) reports, publicly available. They can also share their incident response plans with customers in the event of a security breach.

Auditing Frameworks

The traditional approach to point-in-time audits against recognized security standards help customers gain confidence in CSP practices. The dynamic nature of cloud services, however, will drive consumers to look for greater real-time transparency into the security posture of upstream providers.

CSPs will have to consider ways to give consumers increased visibility while protecting their intellectual property and business reputations. Frameworks for continuous auditing are being defined by research and cloud advocacy groups, but these frameworks will require the participation of CSPs to be successful.

Cloud security is a differentiating factor for CSPs. As cyberattacks continue to increase in volume and scope, it will become even more important for CSPs to answer customer concerns and take the necessary steps to build trust.

More from Cloud Security

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and the Washington, D.C. chapter of the Association for Computing Machinery’s Special Interest Group on Security, Audit and Control. As noted by National Today, those in…

Why Are Cloud Misconfigurations Still a Major Issue?

Cloud misconfigurations are by far the biggest threat to cloud security, according to the National Security Agency (NSA). The 2022 IBM Security X-Force Cloud Threat Landscape Report found that cloud vulnerabilities have grown a whopping 28% since last year, with a 200% increase in cloud accounts offered on the dark web in the same timeframe. With vulnerabilities on the rise, the catastrophic impact of cloud breaches has made it clear that proper cloud security is of the utmost importance. And…

Charles Henderson’s Cybersecurity Awareness Month Content Roundup

In some parts of the world during October, we have Halloween, which conjures the specter of imagined monsters lurking in the dark. Simultaneously, October is Cybersecurity Awareness Month, which evokes the specter of threats lurking behind our screens. Bombarded with horror stories about data breaches, ransomware, and malware, everyone’s suddenly in the latest cybersecurity trends and data, and the intricacies of their organization’s incident response plan. What does all this fear and uncertainty stem from? It’s the unknowns. Who might…

How an Attacker Can Achieve Persistence in Google Cloud Platform (GCP) with Cloud Shell

IBM Security X-Force Red took a deeper look at the Google Cloud Platform (GCP) and found a potential method an attacker could use to persist in GCP via the Google Cloud Shell. Google Cloud Shell is a service that provides a web-based shell where GCP administrative activities can be performed. A web-based shell is a nice feature because it allows developers and administrators to manage GCP resources without having to install or keep any software locally on their system. From…