• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   AWS   »   Protect Your Net: How the Cloud is Changing Your Security Game

Protect Your Net: How the Cloud is Changing Your Security Game

  • Posted on:April 24, 2015
  • Posted in:AWS, Business, Cloud, Cloud Security, Microsoft, Private Cloud, Public Cloud, Security
  • Posted by:
    Steve Neville
0

Trend Micro is a proud National Sponsor of the upcoming FIFA Women’s World Cup 2015 soccer tournament in Canada this summer. “Good for you. But what’s soccer got to do with cyber security?” you might ask. Well, how do you win a soccer match? Yes, by scoring the most goals, but on the flip side, you also need a good defense. That’s why over the coming weeks, we’ll be blogging on ways that you can “Protect Your Net” – your data, apps, and cloud deployments – against threats and vulnerabilities that are trying to score on your organization.

In this series of posts called “Protect Your Net,” we’ll be exploring the opportunities and challenges of the software defined data center and the cloud – and how we can help your organization mount an effective defense against the opposition. I like to think of it like this: regardless of how big your organization is, when it comes to cyber security, just like in soccer, success can only be built on a strong defense. And nowhere is this more true than in cloud and virtualized environments.

It’s getting cloudy out there…

Organizations across the globe are embracing virtual and cloud technologies as a part of their modern IT strategy, with many customers that I talk to saying they have over 60 percent of their data centers virtualized and are using the cloud for specific projects. This paradigm shift in the delivery of IT services can offer the kind of cost savings, IT efficiency and flexibility, and improved business agility that IT managers could only dream of in the past when on-premise was the only approach. Exactly how popular are cloud computing and virtualization? Well, IDC predicts spending on public cloud services, including market-leaders like Amazon Web Services and Microsoft Azure, will reach a staggering $127 billion by 2018. This represents a five-year CAGR of 22.8 percent – six times the rate of growth for the IT market as a whole.

The same analyst firm reported that cloud IT infrastructure, including infrastructure to support deployment of technology from market-leader VMware, accounted for a third of combined worldwide server, disk storage, and Ethernet switch infrastructure spending in Q3 2014. What’s more, data center transformation and consolidation efforts, including virtualization-related projects, featured highly on SearchCIO’s list of top North American IT projects of 2015.

Things are different now

Just as cloud computing and virtualization have transformed modern IT, they have also introduced greater complexity and potential risk for the IT department to manage. Traditional security approaches make it very difficult to consistently secure servers across physical, virtual, and cloud deployments, typically requiring IT security to manually manage across multiple security offerings. As well, security in the cloud is a shared responsibility, meaning that the cloud service provider owns security up to and including the hypervisor layer, and customers own everything they put on the cloud (applications, servers, data). In this new reality, unless an organization has their game plan ready with a solid defense strategy, security gaps can happen, and cyber criminals are only too ready to exploit them.

Some examples of security challenges in the software defined data center and cloud include:

  • Inter-VM attacks – which traditional security solutions can’t spot because they are at the perimeter
  • Instant-on gaps – which arise when dormant virtual servers are provisioned but haven’t had their security updated accordingly. This becomes an even bigger problem when vulnerabilities like Shellshock (link) and Heartbleed (link) are discovered.
  • Unencrypted information – in the cloud your data is not automatically protected, even if there are built-in capabilities to help. The servers the data is on as well as the data itself need to be secured.
  • Resource contention – with virtualized deployments, applying traditional security can result in extreme load on systems and so-called “AV storms” which can damage security and severely affect performance
  • The perimeter is gone – in most cloud environments the provider is in control up to the hypervisor layer, Perimeter security approaches are challenging in the cloud… with the elastic nature of the environment, having a single choke point just doesn’t make sense.

 

While there are solutions to addressing these challenges—such as Trend Micro Deep Security—unless your organization has a plan, there can be additional risk added to the game.  You don’t have to look very hard to hear about the latest high profile breach, and we all know that high remediation and clean-up costs, along with damaged reputation and brand, customer churn, legal costs and negative impacts to the share price are all very real potential impacts.

So, for the software defined data center and cloud, you need a game plan to Protect your Net. To help with this, we’ll be sharing insights and best practices with you as you formulate your winning IT strategy. In our next post, we’ll provide security best practices for the biggest cloud service provider, Amazon Web Service (AWS). Stay tuned!

Follow @TrendMicro on Twitter and use the hashtag #ProtectYourNet.

Related posts:

  1. Hybrid Cloud: Going Beyond Security in a Software Defined Datacenter
  2. Protect Your Net: Shared Security Responsibility in the Cloud
  3. How to Win the Cloud Security Game by Balancing Risk with Agility
  4. Cloud Security: You can’t protect what you can’t see

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.