Roy_Headshot_Dome9

Four Cloud Security Mega Trends

Cloud Security Trends

Last year was a big year for the cloud. Cloud adoption continued to grow at a rapid clip, even as executives from companies such as McDonald’s and ENEL talked about how their organizations are embracing a cloud-first approach to IT with an eye toward a cloud-only future. It was also a year of transition, as the customer base for AWS shifted toward large enterprises running their mission-critical workloads in the cloud.

As we experience firsthand many of these enterprises’ transitions into the public cloud, I share my views on where things are headed. Rather than writing about futuristic predictions about what to expect in 2017, I’m sharing my observations about broad sweeping trends that will continue to shape the direction of cloud security in the years to come.

1. Assimilation of Security Technologies into Cloud Platforms

The major cloud providers such as Amazon Web Services (AWS) and Microsoft Azure have invested heavily in their platforms’ security over the past few years to address customer concerns and earn their trust. The first wave of investment focused on foundational security and governance capabilities to enhance platform visibility, with features such as AWS CloudTrail and VPC flow logs as well as control capabilities such as Identity and Access Management (IAM).

Building on this firm foundation, the cloud providers (mostly AWS) are now turning to advanced security technologies. These technologies, which until recently were offered as dedicated products and services by third-party vendors, are now seamlessly assimilated into the cloud platform as integral features.

This disruption has already happened to a number of products in very focused, IP-heavy areas. A few examples:

  • Web Application Firewall (WAF) – First introduced as an advanced protection product in the 90s, WAF was offered as a native service by AWS at the end of 2015 and by Microsoft in Sep 2016
  • Amazon Inspector – A host security service for Linux and Windows workloads (GA on Aug 2016)
  • DDOS mitigation – Provided in Azure and now announced for AWS (AWS Shield)

We have seen this trend of standalone products becoming features of the underlying platform play out several times before. For example, technologies such as storage compression and WAN optimization were first introduced into the market as standalone products, but over time became features of the underlying storage and networking platforms. This integration of technologies is great for cloud consumers who will enjoy more integrated and affordable security services, but spells bad news for legacy security vendors who will find themselves being marginalized or directed into more focused niche markets.

2. A Multi-Cloud Future Becomes Real

Cloud consumers have always understood the value proposition of a multi-cloud strategy in principle. But for many years, multi-cloud was just a fluffy buzzword with low correlation to reality. The complexity and pain associated with managing different cloud environments was just too high compared to the benefits. There was also lack of parity between different cloud services in terms of technological capabilities.

In recent years, multi-cloud environments are starting to become more common, either as a deliberate strategic decision by enterprises, or because of acquisitions, leadership changes, etc. So what’s changed to make multi-cloud environments more feasible?

  • Maturity of Cloud Service Offerings: AWS had a huge head start in the public cloud race. While still lagging in breadth and depth of features, Azure and Google Cloud Platform (GCP) have finally as of end-2016 built solid offerings and filled the critical gaps. As an example, in 2016, Google added IAM and some other mandatory ‘enterprise’ features.
  • Advances in Container Technologies: Several years ago, Docker introduced containers as the building block that encapsulated a single compute unit, with the ability to run the same container image on the developer laptop, on the on-prep server and on any cloud. Since then we’ve seen fast progress in container orchestration technologies: Kubernetes, Mesosphere, Docker Swarm and the new Docker for AWS and Azure offering. These technologies deliver on the ‘write once run everywhere’ no-vendor lock-in promise and allow enterprises to maintain consistent workloads among different cloud providers.
  • Maturity of Third-Party Cloud-Agnostic Governance Tools: One of the challenges with adopting multi-cloud environments was the complexity of managing these different environments. Different clouds provide vastly different operational models for security, cost control, governance, etc. For example, the security model in AWS includes VPCs, Security Groups with unordered “allow” rules, while Azure offers Network Security Groups with ordered “allow” and “deny” rules but without group-to-group micro-segmentation capabilities. Companies had to learn how to use the specific constructs and tools provided by each of the clouds. But now, new cloud-native tools offer enhanced governance in areas like cost management (for example: Cloudyn), security and compliance (e.g., Dome9 Security), have now added multi-cloud support, thus, lowering the bar for enterprises to adopt a multi-cloud strategy. These tools use the native capabilities of each cloud, but combine it with cloud-agnostic orchestration that allows customers to specify policies once and manage everywhere.

3. Automation in Security, Compliance and Governance

IT governance and compliance management used to be a point-in-time process that companies engaged in periodically (once a quarter, once a year, etc.), but is now transitioning into a continuous process. The forces for this change come from the ‘demand’ side, i.e. the need as well as the ‘supply’ side, i.e. technological feasibility. On the demand side we can see the dynamic, elastic nature of new cloud environment, turbocharged by DevOps and continuous delivery (CD) practices. The new reality that your core production systems are now in the cloud and being deployed multiple times a day is a real change from the past. On the supply side we can see the technological enhancements that makes continuous security, governance and compliance a reality:

  • With API-driven compute, most of the new cloud datacenter is ‘describe-able’ by API. Compare that with unreliable past data gathering methods (port scanning as an example).
  • This solid clean data is an enabler for proper monitoring, reasoning and even taking automated actions.
    Improvements in cloud native auditing, notifications and event driven computing (like AWS Config, CloudTrail, CloudWatch Log events, Lambda) – lowering the technical bar for implementing continuous monitoring and even auto-remediation systems.
  • Proliferation of new companies and products that target continuous cloud security and compliance, enhancing the CSP’s capabilities and diversifying the ecosystem.

Still not sure?

To get a sense of future trends, take a look at how AWS is educating the industry. Here’s the list of the security sessions from last re:Invent:
Yes, almost 40% of the sessions had some sort of ‘automation’ in their title!

cloud security trends

4. IAM Merges with Network and Host Security

The cloud of 2016 is very different from the cloud of 2006. Public IaaS clouds started out with just compute (virtual machines) and storage services, but now provide dozens of services. The line between IaaS and PaaS is blurring rapidly.

This means that a modern cloud datacenter does not look like an on-premises deployment. Instead, a typical application has a hybrid architecture that includes traditional virtual machines or instances as well as hosted, managed services such as databases, data warehouses, load-balancers, Lambda / FaaS and so on. Let’s compare 2006-style cloud deployment with a 2016-style deployment.

In the 2016 deployment, operations teams have only limited control over many of the building blocks of the application. From a security point of view, legacy network and host security tools are just not enough. For example, where would you install a security agent in a Lambda function? How do you get network visibility to the traffic between an API Gateway and a Lambda (serverless) backend?

To truly manage security in this brave new world, administrators need to complement network security with robust IAM management. IAM and cloud-native settings are becoming the logical glue and the main security policy to drive new cloud deployments. What is needed is a holistic approach to control, monitor, protect and govern in the cloud, which includes cloud configurations, IAM policies, cloud events and audit trails as well as traditional network and host-based security.

We are expecting to see this trend translated into cloud consumers’ practices (possibly breaking some internal silos) as well as to cloud-native security products.

By Roy Feintuch, Co-Founder / CTO, Dome9

Roy Feintuch

Roy is the Co-Founder & CTO of Dome9 Security. Since 2011, Roy has enabled some of the largest AWS deployments with enhanced network security and identity access management protection. A veteran technology leader, he has spent more than a decade managing R&D within various Israeli high-tech startups. Previously, he served as Chief Architect at DV-Tel, focusing in IT security management solutions and IP-video development, as well as a Captain (reserve) in the IDF C4I Corps. He received a B.Sc. in Mathematics and Computer Science at BGU University, Israel.

View Website
Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, ...
Cloud Advances One Funeral at a Time

Cloud Advances One Funeral at a Time

The Advancing Cloud Forecasts scream huge growth rates for cloud but in the big picture it is tiny. Max Planck ...
The Cloud Debate - Private, Public, Hybrid or Multi Clouds?

The Cloud Debate – Private, Public, Hybrid or Multi Clouds?

The Cloud Debate Now that we've gotten over the hump of whether we should adopt the cloud or not, "which ...
Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords Simple passwords are no longer safe to use online. John Barco, vice president of Global ...
The Shift from Monolithic to Microservices: What It Means for CTOs.

The Shift from Monolithic to Microservices: What It Means for CTOs.

The Shift to Microservices The shift in application development strategies is moving from monolithic design to isolated and resilient components ...
Apcela

Direct Connect To Cloud: Solving For Performance, But At What Cost?

Direct Cloud Connect Executives embarking on the journey to becoming a digital enterprise are essentially asking IT to enable the ...
Cisco Announces Intent to Acquire July Systems

Cisco Announces Intent to Acquire July Systems

Today we are announcing our intent to acquire July Systems, a privately-held company headquartered in Burlingame, California with offices in Bangalore, India. We are excited to welcome July Systems and its cloud-based mobile experience and ...
Teradata sues Germany's SAP, alleging it stole trade secrets

Teradata sues Germany’s SAP, alleging it stole trade secrets

FRANKFURT (Reuters) - SAP SE, Europe’s most valuable technology company, was sued on Wednesday by U.S. company Teradata, which accused it of stealing trade secrets, copyright infringement and anti-trust violations. The case, filed at the ...
Radware Anti-DDoS Defenses Actively Shield Veon Customers During World Cup 2018

Radware Anti-DDoS Defenses Actively Shield Veon Customers During World Cup 2018

Russian telecoms company Veon already stopping hundreds of DDoS attacks every day, with further spikes expected MAHWAH, N.J., June 25, 2018 (GLOBE NEWSWIRE) -- Radware® (NASDAQ:RDWR), a leading provider of cyber security and application delivery ...