Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
      • Practitioner Playlists
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
          • Practitioner Playlists
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How to Secure a Multi-Cloud Strategy
Cybersecurity as a Business Enabler

How to Secure a Multi-Cloud Strategy

Bill DoerrfeldBy Bill DoerrfeldOctober 9, 2022Updated:February 16, 20236 Mins Read
Facebook Twitter LinkedIn Email
multi-cloud security strategy
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Multi-cloud is on the rise — 60 percent of organizations are already using multiple clouds. Most are reaping many business benefits from a multi-cloud strategy, such as reduced vendor lock-in, the ability to optimize computing workloads, and even cost reduction. Multi-cloud also empowers developers with more ownership to choose their favorite cloud for deployments.

Although hybrid multi-cloud is the new normal, there are undoubtedly new security implications within this novel paradigm. The most obvious result is an increased surface area for attack. When you’re managing multiple clouds, there’s more room for misconfigurations and more administrative secrets and keys that could be exposed. Inconsistencies between cloud providers could result in broken institutional knowledge, not to mention that cloud-native technologies have varying degrees of default settings — some of which are more locked down than others.

Multi-cloud is becoming an unavoidable reality for most organizations. But, many of the risks associated with multi-cloud can be mitigated. Below is a brainstorm of some strategies to consider as your organization adopts multiple clouds. While not exhaustive, these tips are a starting point for addressing the unique cybersecurity implications of deploying and managing software across various cloud-based environments.

Tip #1: Continually audit your surface area.

The first step of any holistic cybersecurity strategy is to know your surface area. Without a clear depiction of your active workloads and resources and where they’re running across your stack, components could easily be left behind. Forgotten systems or shadow or zombie application program interfaces (APIs) might be outdated and contain unpatched vulnerabilities. It’s also good practice to tag ownership to each resource so that teams know who is in charge of maintaining it. Although still an evolving practice, requesting a Software Bill of Material (SBOM) from cloud-based dependencies is another method to audit your surface area.

Tip #2: Centralize common cloud configurations.

When an engineer goes to deploy code into a given cloud, there are many options to choose from, including region, computing type, size, scalability settings, permissions, and other factors. These fields vary slightly from cloud to cloud and configuring them differs in each cloud graphical user interface (GUI). It’s a good idea to centralize standard cloud configurations for reuse. Building knowledge repositories per cloud makes it easier to deploy code consistently. Even better, codifying configurations as infrastructure-as-code (IaC) can make them more structured for reuse and ensure more consistent policies that enforce access control.

Tip #3: Set guardrails for developers.

CloudOps will want to set common security policies across multiple clouds. For example, you might want to detect suspicious behavior or ensure traffic is not coming from an invalid IP address. Policies should also match developer administrative credentials. Such guardrails could help prevent accidents in the development lifecycle, such as haphazardly opening an EC2 instance or load balancer. Implementing real-time scanning for new code bases and container images, as well as checking policies in real time, can help ensure multi-cloud governance. Open-source tools such as Cloud Custodian or Open Policy Agent are popular options for implementing cloud-native policy-as-code.

Tip #4: Store and share secrets safely.

In 2020, GitGuardian found more than 2 million secrets exposed on GitHub. With more clouds come more secrets and keys to manage infrastructure, which, if leaked, could be used by hackers to escalate their permissions into your walled gardens. Thus, it’s important to ensure these administrative credentials are never revealed or inserted within public code repositories: Everything from API keys to cloud environments should be obfuscated. Furthermore, multiple authentications and authorization checks should be implemented to avoid hasty connections. OAuth and OpenID Connect, for example, help validate user identity, or SPIFFE/SPIRE helps initiate secure service-to-service connections.

Tip #5: Lock down insecure default states.

Don’t assume every platform handles security the same way — certain functions, such as multi-factor authentication, may be turned on by default in one environment but left off in another. Therefore, it’s a best practice to audit the default security schemes when adopting new cloud technologies. Open-source, cloud-native technologies that work between clouds may have insecure states as well. For example, the cloud-native community notes that Kubernetes, the popular container orchestrator, has default states that are “too open.” Applying a zero-trust approach, even for internal testing, can pay dividends in ensuring a more secure footprint.

Tip #6: Keep an eye on cloud vulnerabilities and exploits.

It’s a good practice to keep current with common vulnerabilities and exposures (CVEs), and even implement regular automated scanning of runtime environments. But it’s not only the code you host that might contain vulnerabilities — exploits have been found within major cloud service providers as well. For example, Log4Shell produced vulnerabilities in AWS that recently made it prone to privilege escalation. Or, in 2021, Microsoft Azure’s central database exposed a massive amount of customer records. Where sensitive data is concerned, it’s a good idea to pay special attention to highly valuable ingress and egress ports.

Tip # 7: Practice multi-cloud observability.

Observability is an evolution of application monitoring that involves logs, metrics, and traces to measure a system’s state and the data it creates. It’s been a much-hyped trend in recent years — and for a good reason. Applied to cybersecurity, an investment into observability can help reduce false positives and decrease the mean time to resolutions. These points can then be used to discover performance bottlenecks and the root causes of incidents. Improving how an organization responds to issues (and practicing this response process) can only aid a multi-cloud strategy.

Multiple clouds multiply the security response.

Adopting multiple clouds can multiply success, yet it also multiplies the risk potential. Access control and privilege issues remain a common concern for connected software, and organizations must take care to retain tight cloud service configurations. As investment into abstracted deployment processes increases, guardrails must be adopted to ensure these abstractions aren’t putting an organization at risk.

A defense-in-depth posture utilizes many layers to protect a digital system. In addition to the abovementioned concerns, general cybersecurity guidelines apply just as well to hardening multi-cloud adoptions. These include best practices like planning for backup and recovery, following common cybersecurity frameworks, and always adopting the rule of least privilege. From the onset, all these practices may seem overwhelming, but don’t let analysis paralysis set in — it’s good to start tackling things one at a time.


Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

Interested in GitGuardian?

Schedule a discovery meeting to see if we can help achieve your goals

Connect With Us

Book a Demo

Cybersecurity Cybersecurity channel GitGuardian multi-cloud
Share. Facebook Twitter LinkedIn Email
Analystuser

Bill Doerrfeld

Tech Journalist
Editor-in-Chief

Areas of Expertise
  • Cybersecurity
  • Low Code/No Code
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

  Contact Bill Doerrfeld ...

Related Posts

How to Avoid Surprises in a Data Migration From On-Premise Systems to the Cloud

March 27, 2023

Cloud Confidence Index Up 6.1% in March

March 27, 2023

How Expanding ERP Automation Beyond Finance Enables Manufacturing Innovation

March 27, 2023

Why Cybersecurity Is a Critical Component of ESG Frameworks

March 26, 2023
Add A Comment

Comments are closed.

Recent Posts
  • How Qlik Makes It Easier for Customers to Connect Diverse SaaS Apps, Data Sources
  • How to Avoid Surprises in a Data Migration From On-Premise Systems to the Cloud
  • Cloud Confidence Index Up 6.1% in March
  • How Expanding ERP Automation Beyond Finance Enables Manufacturing Innovation
  • Why Cloud Apps Are Superior to Spreadsheets for Data Management and Analytics

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Securing Multi-Cloud Ecosystems

March 24, 2023

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023

Cloud Data Strategy, Analytics, and Governance

February 27, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.