Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Cloud Security Architecture Needs to Be Strategic, Realistic, and Based on Risk

Global IT research and advisory firm Info-Tech Research Group has released a new research blueprint to help organizations plan the components necessary to build a cloud security architecture. The blueprint walks organizations through how to identify risks and the security services required to mitigate them.

Latest Aithority Insights : Taki, A Token Powered Social Network For Content Creators, Fuelled By Crypto Token $Taki, Will Launch Soon In India

The cloud is becoming increasingly more accessible and prevalent as a business enabler. Info-Tech’s research indicates that the cloud transition can bring tremendous value; however, it can also bring additional unforeseen risks. Access to new services and capabilities can be a game changer for organizations of all kinds. But, as with any change, the firm cautions that there is an element of risk, and IT needs to take steps to ensure that any cloud deployments meet security standards.

The cloud comprises five key elements, all of which need to be present for a service to be counted as a cloud service. The new research blueprint outlines these elements as the following:

On-Demand Self-Service – The ability to spin services up without contacting the vendor, typically through a console.
Broad Network Access – Resources can be accessed over the open internet.
Resource Pooling – Resources are shared among cloud customers, though tenants are functionally walled off from one another.
Rapid Elasticity – This is the ability to “pay as you go” and spin things up or down as needed.
Measured Service – Cloud providers charge with granularity appropriate to the service model.
With many cloud vendors proposing to share the security responsibility, it can be challenging for organizations to develop a clear understanding of how they can best secure their data off-premises. The challenge for IT security professionals is enabling access to the features and capabilities that cloud services can provide without putting the organization at undue risk. Move too far in either direction, and the cloud deployment will not succeed due to over-encumbrance or failure to mitigate crucial security risks. Info-Tech recommends that security professionals understand the tools and strategies at their disposal to appropriately secure and govern their environments.

Browse The Complete News About Aithority: Solace Event Streaming Now Available on Singtel Paragon 5G Platform

Related Posts
1 of 40,716

IT departments have been sharing responsibilities with third parties for years, from software vendors to managed service providers and consultants, cloud security is no different. The cloud brings this relationship into sharper focus, and old security techniques may no longer be as effective as they once were. Cloud providers are responsible for the security of the cloud. They manage the hardware, facilities, and other physical components of the cloud and some of the software and cloud networking. Organizations maintain responsibility for security in the cloud. Identity and access management, data classification, server-side encryption, and networking traffic are all areas that need to be managed by the cloud consumer.

Info-Tech’s blueprint explains that a cloud security architecture needs to be strategic, realistic, and based on risk. The NIST approach to cloud security is to include everything security-related into a cloud architecture to be deemed “secure.” However, it is possible to have a robust and secure cloud architecture using a risk-based approach to identify the necessary controls and mitigate services for a cloud environment.

As organizations continue to adopt a cloud environment, Info-Tech recommends organizations consider the following when planning the components needed to build a holistic cloud security architecture strategy:

Cloud Security Alignment Analysis – Explore how the cloud changes and whether the enterprise is ready for the shift to the cloud.
Business Critical Workload Analysis – Analyze the workloads to be migrated to the cloud. Consider the various domains of security in the cloud, taking into account the cloud’s unique risks and challenges as they pertain to the organization’s workloads.
Cloud Security Architecture Mapping – Map the organization’s risks to services in a reference model to build a robust launch point for the security architecture.
Cloud Security Strategy Planning – Map the organization’s risks to service in a reference architecture to build a robust roadmap.

Read More About Aithority News : NBCUniversal and HTC Join Anzu’s In-Game Advertising Mission Along with Sony Innovation Fund and WPP

 [To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.