February 26, 2015 By Sreekanth Iyer 3 min read

The cloud offers simplified application development and delivery by providing infrastructure, platform and software services that are ready to use immediately. However, the major inhibitor for businesses has been concerns around security. IBM sees this not as a challenge, but rather as an opportunity to enhance your security posture by rethinking your approach to cloud security. Gaining a clear understanding of the various security options and how to apply them in your solution is crucial for successful and secure cloud adoption.

IBM has simplified the typical method for approaching this problem. Whether you’re looking to employ infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) or software-as-a-service (SaaS), use the framework below when designing your solution. Each platform comes with certain built-in security qualities and lets you use add-ons on top of the platform to secure each workload.

Manage Access

This involves managing identities and governing user access to cloud resources. When you are consuming infrastructure from the cloud, you also need to manage the identity involved in privileged activities, such as those performed by cloud administrators, and the tracking activities of the people involved in development and operations. Another important aspect of managing access is safeguarding people, applications and devices connecting to the cloud, especially when it comes to the use of SaaS offerings. All the good stuff related to access management, such as pattern-based protection, multifactor authentication, context-based access control and privileged and federated access, goes here.

Protect Data

This is all about what you can do to identify vulnerabilities in your application and data and which actions you should take to prevent attacks targeting sensitive data. This solution-oriented approach covers things you should do to encrypt data at rest (files, objects, storage) and in motion, as well as how to monitor data activity to verify and audit data outsourced to the cloud. The vulnerability assessment of both your data and application is an important step in this process because it hardens data sources and Web and mobile applications that are in the cloud.

Gain Visibility

Continuously monitoring each activity and event in the cloud is necessary for complete visibility across on-premise and cloud-based environments. You can also build improved security and visibility into virtual infrastructures by collecting and analyzing logs in real time across the various components and services in the cloud. With visibility across virtualized stacks and IaaS, PaaS and SaaS clouds, you can have a clear view into your enterprise cloud and any associated risks. This should prepare you well for managing your audit and compliance processes.

Read the white paper: Safeguarding the cloud with IBM Security solutions

Optimize Cloud Security Operations

Optimizing the processes, methods and tools for running your security operations is key to keeping the overall cost low. You should always keep assessing security practices, plans and designs and mature them in a timely manner to build out world-class security operations centers. Consolidating your view of this using big data, visualization and intelligent threat analysis — with the right expertise — is key to staying ahead of the threats and being ready to respond to any security incidents along the way.

To learn how to address each of these areas with IBM’s capabilities, take a look at my presentation from IBM InterConnect 2015.

More from Cloud Security

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Cloud threat report: Possible trend in cloud credential “oversaturation”

3 min read - For years now, the dark web has built and maintained its own evolving economy, supported by the acquisition and sales of stolen data, user login credentials and business IP. But much like any market today, the dark web economy is subject to supply and demand.A recent X-Force Cloud Threat Landscape Report has shed light on this fact, revealing a new trend in the average prices for stolen cloud access credentials. Since 2022, there has been a steady decrease in market…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today