Five pillars of secure cloud transformation.

Companies’ cloud transformation ambitions have accelerated in the past few years thanks to an increased appetite for enhanced digital technologies, as well as more pressure to support remote working. According to the Office of National Statistics, 85% of employees now expect options for hybrid work, demonstrating that even as the pandemic passes, the demand for flexible cloud-based services shows no sign of abating.

However, the cloud services needed to facilitate new digital ways of working also raise new cybersecurity challenges, which can seem daunting. Organisations that allow these challenges to deter them from embracing cloud transformation options, will only find themselves falling further and further behind their competitors. Indeed Gartner predicts that, by 2025, cloud native platforms will provide a foundation for over 95% of new digital initiatives.

The security challenges presented by the cloud are different to those associated with traditional on-premises security, where everything sat behind a firewall. To mitigate these new risks, organisations should introduce and follow a secure cloud adoption framework (S-CAF) based on the following five key pillars:

Pillar 1: Adopt a zero-trust mindset Zero Trust works on the assumption that all users, devices and activities are malicious until proven otherwise. It may sound harsh, but the modern threat landscape has made this approach necessary in order to avoid the pitfalls of remote working, where so many endpoints go unguarded.

Pillar 2: Threat detection and response With cyberattacks evolving faster and faster, the best cybersecurity approach for many organisations is to ensure that the tools used to mitigate attacks are just as strong as tools used to detect them in the first place. It is simple logic that the earlier a threat is spotted, the quicker it can be acted upon, but where this level of advanced detection is not possible, organisations must at least be positioned to
reduce harm.

Pillar 3: Asset protection Organisations must have appropriate policies and processes in place in order to account for all their assets throughout their respective lifecycles. From a cybersecurity perspective, these policies should cover software, hardware and corporate data.

Pillar 4: Identity and governance Having visibility of every user’s access permission is crucial to securing all endpoints within an organisation. So too is the ability to adjust levels of access quickly and easily in response to employees joining, leaving or changing roles. This pillar is essential as it minimises the opportunity for employees to abuse their access rights.

Pillar 5: Innovation security Innovation may come in a variety of forms but when preparing and deploying successful security measures, development, security and operations (DevSecOps) is proven to keep organisations ahead of any would-be attackers.

Baking in security with DevSecOps

For a cloud transformation journey based on the S-CAF model to be successful, it’s critical that security controls and measures are baked into an organisation’s operations. DevSecOps provides this foundation. In an environment where cloud-based services can be provisioned quickly via self-service portals, DevSecOps plays a central role in ensuring security risks are identified and remediated in the quickest possible timeframe.

This approach requires organisations to think critically about their infrastructure security from the beginning of the transformation journey. Yet as it is more than a set of new tools, it should incorporate cultural factors, such as policy and governance. For example, policies should be set at the architecture level so they can evolve alongside the cloud transformation journey. This means that as organisations scale, the guidelines remain relevant and useful, rather than a hinderance requiring regular manual updates. With DevSecOps, processes can be dynamic and constantly tailored to the organisation’s specific applications and infrastructure requirements.

The key to developing these areas is to focus on the security controls that need to be in place when moving from on-premises architecture to single or multi-cloud hybrid architecture. The initial focus should be on the technical assets rather than on the concept of Zero Trust, and with it threat detection, identity, and governance, which are important at other stages of the cloud transformation journey.

Conclusion

While the S-CAF is just one approach to a secure cloud transformation, its approach is inclusive and well positioned to tackle the challenges associated with moving to a cloud-based environment. The five pillars are applicable to an organisation of any size, operating in any sector, and they will provide security teams with a firm foundation to tweak and tailor cloud security to meet the needs and demands of customers and employees now and in the future.

Organisations that insulate themselves from the dangers of an open internet, will find it is no longer a case of putting up a border and stopping people from crossing it. Transforming to the cloud demands a more agile, modern approach and the sooner one is selected and deployed, the sooner organisations can guarantee important data and information is secure.

David Guest

Solution Architect and Technology Evangelist at Kocho

Data-Sharing Done Right: Finding the Best Business Approach

Bart Koek • 20th November 2024

To ensure data is not only available, but also accessible to those that need it, businesses recognise that it is vital to focus on collecting, sorting and governing all the data in their organisation. But what happens when data also needs to be accessed and shared across the business? That is where organisations discover a...

Nova: The Ultimate AI-Powered Martech Solution for Boosting Sales, Marketing...

Erin Lanahan • 19th November 2024

Discover how Nova, the AI-powered engine behind Launched, revolutionises Martech by automating sales and marketing tasks, enhancing personalisation, and delivering unmatched ROI. With advanced intent data integration, revenue attribution, and real-time insights, Nova empowers businesses to scale, streamline operations, and outperform competitors like 6Sense and 11x.ai. Experience the future of Martech with Nova’s transformative AI...

How E-commerce Marketers Can Win Black Friday

Sue Azari • 11th November 2024

As new global eCommerce players expand their influence across both European and US markets, traditional brands are navigating a rapidly shifting landscape. These fast-growing Asian platforms have gained traction by offering ultra-low prices, rapid product turnarounds, heavy investment in paid user acquisition, and leveraging viral social media trends to create demand almost in real-time. This...

Why microgrids are big news

Craig Tropea • 31st October 2024

As the world continues its march towards a greener future, businesses, communities, and individuals alike are all increasingly turning towards renewable energy sources to power their operations. What is most interesting, though, is how many of them are taking the pro-active position of researching, selecting, and implementing their preferred solutions without the assistance of traditional...

Is automation the silver bullet for customer retention?

Carter Busse • 22nd October 2024

CX innovation has accelerated rapidly since 2020, as business and consumer expectations evolved dramatically during the Covid-19 pandemic. Now, finding the best way to engage and respond to customers has become a top business priority and a key business challenge. Not only do customers expect the highest standard, but companies are prioritising superb CX to...

Automated Testing Tools and Their Impact on Software Quality

Natalia Yanchii • 09th October 2024

Test automation refers to using specialized software tools and frameworks to automate the execution of test cases, thereby reducing the time and effort required for manual testing. This approach ensures that automation tests run quickly and consistently, allowing development teams to identify and resolve defects more effectively. Test automation provides greater accuracy by eliminating human...