Business transitions, incompatible technology environments and rapid changes in dynamic public cloud services can cause hybrid cloud security challenges.
Single hybrid cloud is now multiple clouds, said Mark Buckwell, executive cloud security architect at IBM, during last April's RSA Conference.
Legacy systems might work with some public cloud services and not others.
Security teams need to ensure on-premises security controls and processes coexist with native-cloud technologies to meet business and compliance requirements.
Companies focused on solving a business problem might lift and shift existing systems and controls to a CSP. And IT teams might be tasked with addressing tricky integration issues involving technology, protocols and standards after the hybrid cloud environment is up and running.
For most companies, security is ultimately about protection of sensitive data - where it is, who has access to it and how it's used.
Hybrid cloud deployments enable organizations to house sensitive data and applications on private clouds or on premises and take advantage of wider network infrastructure provided by public clouds for managed services, workload distribution and storage.
Security managers need to have visibility into all resources, systems and data in motion in their organization's hybrid cloud environment.
Security teams rely on logs and syslog to monitor application files and network devices for anomalies and potential security events.
The chief information security officer protects the company's information assets by setting up a security strategy, policies supporting that strategy and incident response.
Mixed environments such as hybrid cloud architecture have a shared security model.
Security responsibilities should be documented in contractual agreements with the service provider before a security incident like a data leakage occurs.
As hybrid cloud security challenges increase network complexity, CISOs and CIOs face resource cuts.
Respondents ranked cloud computing as the number one skills gap in their security teams, followed by AI and machine learning and zero-trust implementation.
The cloud attack surface notwithstanding, human error remains one of the biggest threats to enterprise cloud deployments.
Companies avoid vendor lock-in by using multiple public cloud providers in hybrid cloud deployments.
This model can improve security and risk management by lessening dependence on a cloud that might have been compromised.
Hybrid Kubernetes and Terraform enable security teams to work with containerized applications on any cloud.
Companies can use secure access service edge architectures or cloud access security brokers to monitor access and enforce security policies.
Single sign-on authentication lets users log in to a hybrid cloud network using one set of login credentials.
This Cyber News was published on www.techtarget.com. Publication date: Thu, 04 Jan 2024 20:13:04 +0000