Hybrid multi-cloud deployments have become commonplace in the enterprise, resulting in data becoming more dispersed than ever. Not only do organizations have to consider which services should be run in on-premises, public cloud, private cloud or hybrid cloud environments; they must also determine how data security will be applied to protect and secure such dynamic workloads.

According to IDC’s “2018 Global CloudView Survey” of more than 5,700 firms, 81 percent of companies currently use or plan to use public clouds, and 86 percent of companies currently use or plan to use private clouds. This amounts to an overall increase of more than 30 percent from the previous year’s results.

By 2020, more than 90 percent of global organizations will have a multi-cloud strategy in place. Most organizations using public clouds will also deploy on private cloud platforms and leverage a hybrid cloud strategy.

This trend is reflected in the way organizations are consuming database management solutions. Common patterns include:

  • Deploying database management solutions on-premises or in private data centers (the heritage model). This remains a dominating pattern as organizations progress toward modernizing their workloads based on criticality and business impact.
  • Deploying traditional database management solutions on public cloud infrastructure–as-a-service (IaaS) models. For example, deploying Oracle database server on Amazon EC2.
  • Consuming database-as-a-service (DBaaS) solutions that are hosted and fully managed by a cloud provider. For example, a firm might subscribe to Amazon RDS for MySQL or Azure SQL Database.
  • Deploying database management solutions using cloud native architectures. This includes running databases like MongoDB within containerized environments such as Docker.
  • Combinations of all of the above.

Take Advantage of the Cloud With Visibility and Control

Security and IT organizations are working to keep up with the fast-paced innovation delivered through cloud service providers. At the same time, they are working to keep their data secure in accordance with evolving compliance mandates. As a result, taking a hybrid multi-cloud approach to data security is quickly becoming a critical requirement for organizations of all sizes. While it may seem like too daunting of a task at first, if the new practice is implemented correctly, it can become a source of positive differentiation for any business.

With regard to database management patterns, the fundamental drivers and use cases for data protection remain intact during the shift toward hybrid cloud architectures. Compliance, privacy and data security analytics are still the most compelling drivers. With that said, scaling data security solutions and best practices across a hybrid mix of on-premises, private and cloud deployment models introduces additional layers of complexity that must be addressed.

The widest cloud data security gaps are around visibility and control. While cloud deployment models improve IT speed and business agility and allow organizations to take advantage of the cloud’s elasticity and scalability, they also invoke new data security challenges due to the lack of fine-grained visibility and control. This is because cloud architectures work on a shared responsibility model between the cloud provider and the consumer.

For instance, with an IaaS model, the cloud consumer has the ability to implement data security measures similar to those which they would deploy on-premises. The user can then exercise tight controls through actionable policies. On the other hand, with a software-as-a-service (SaaS) model, cloud consumers often have limited visibility and control over the management of data running through that service — or none at all. They must rely on the limited, one-size-fits-all options offered by the cloud provider. This can greatly limit a company’s ability to exercise the granular controls needed to protect and secure their sensitive data.

Likewise, it is ultimately the customer’s responsibly to ensure proper data protection measures are in place, regardless of the chosen architecture.

Security Must Follow Data to the Hybrid Cloud and Back

A hybrid cloud data protection strategy must address these constraints by providing the means to augment and implement flexible and purpose-built data security measures based on industry best practices and regulatory standards. Specifically, it should fulfill requirements for:

  1. Visibility — The right level of visibility and granularity on data source activities is necessary to take purposeful action.
  2. Control — All normalized visibility must be centralized to make near-real-time, efficient and effective decisions, satisfy compliance demands, and identify data security risks.
  3. Flexibility — The strategy must be able to pivot and adapt to the changing cloud and IT landscape. To avoid cloud vendor lock-in, organizations should select cloud services and data security solutions that have the flexibility to evolve with changing technology and business needs.

When it is implemented correctly, hybrid multi-cloud data protection can help to address the aforementioned challenges and enable organizations to protect critical data across their choice of on-premises, public and/or private cloud services.

Learn more about Guardium multi-cloud data protection

More from Cloud Security

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Cloud threat report: Possible trend in cloud credential “oversaturation”

3 min read - For years now, the dark web has built and maintained its own evolving economy, supported by the acquisition and sales of stolen data, user login credentials and business IP. But much like any market today, the dark web economy is subject to supply and demand.A recent X-Force Cloud Threat Landscape Report has shed light on this fact, revealing a new trend in the average prices for stolen cloud access credentials. Since 2022, there has been a steady decrease in market…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today