February 26, 2015 By Sreekanth Iyer 3 min read

The cloud offers simplified application development and delivery by providing infrastructure, platform and software services that are ready to use immediately. However, the major inhibitor for businesses has been concerns around security. IBM sees this not as a challenge, but rather as an opportunity to enhance your security posture by rethinking your approach to cloud security. Gaining a clear understanding of the various security options and how to apply them in your solution is crucial for successful and secure cloud adoption.

IBM has simplified the typical method for approaching this problem. Whether you’re looking to employ infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) or software-as-a-service (SaaS), use the framework below when designing your solution. Each platform comes with certain built-in security qualities and lets you use add-ons on top of the platform to secure each workload.

Manage Access

This involves managing identities and governing user access to cloud resources. When you are consuming infrastructure from the cloud, you also need to manage the identity involved in privileged activities, such as those performed by cloud administrators, and the tracking activities of the people involved in development and operations. Another important aspect of managing access is safeguarding people, applications and devices connecting to the cloud, especially when it comes to the use of SaaS offerings. All the good stuff related to access management, such as pattern-based protection, multifactor authentication, context-based access control and privileged and federated access, goes here.

Protect Data

This is all about what you can do to identify vulnerabilities in your application and data and which actions you should take to prevent attacks targeting sensitive data. This solution-oriented approach covers things you should do to encrypt data at rest (files, objects, storage) and in motion, as well as how to monitor data activity to verify and audit data outsourced to the cloud. The vulnerability assessment of both your data and application is an important step in this process because it hardens data sources and Web and mobile applications that are in the cloud.

Gain Visibility

Continuously monitoring each activity and event in the cloud is necessary for complete visibility across on-premise and cloud-based environments. You can also build improved security and visibility into virtual infrastructures by collecting and analyzing logs in real time across the various components and services in the cloud. With visibility across virtualized stacks and IaaS, PaaS and SaaS clouds, you can have a clear view into your enterprise cloud and any associated risks. This should prepare you well for managing your audit and compliance processes.

Read the white paper: Safeguarding the cloud with IBM Security solutions

Optimize Cloud Security Operations

Optimizing the processes, methods and tools for running your security operations is key to keeping the overall cost low. You should always keep assessing security practices, plans and designs and mature them in a timely manner to build out world-class security operations centers. Consolidating your view of this using big data, visualization and intelligent threat analysis — with the right expertise — is key to staying ahead of the threats and being ready to respond to any security incidents along the way.

To learn how to address each of these areas with IBM’s capabilities, take a look at my presentation from IBM InterConnect 2015.

More from Cloud Security

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

Cloud security uncertainty: Do you know where your data is?

3 min read - How well are security leaders sleeping at night? According to a recent Gigamon report, it appears that many cyber professionals are restless and worried.In the report, 50% of IT and security leaders surveyed lack confidence in knowing where their most sensitive data is stored and how it’s secured. Meanwhile, another 56% of respondents say undiscovered blind spots being exploited is the leading concern making them restless.The report reveals the ongoing need for improved cloud and hybrid cloud security. Solutions to…

Cloud security evolution: Years of progress and challenges

7 min read - Over a decade since its advent, cloud computing continues to enable organizational agility through scalability, efficiency and resilience. As clients shift from early experiments to strategic workloads, persistent security gaps demand urgent attention even as providers expand infrastructure safeguards.The prevalence of cloud-native services has grown exponentially over the past decade, with cloud providers consistently introducing a multitude of new services at an impressive pace. Now, the contemporary cloud environment is not only larger but also more diverse. Unfortunately, that size…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today