Welcome!

@CloudExpo Authors: Elizabeth White, Pat Romanski, Yeshim Deniz, Liz McMillan, Aruna Ravichandran

Related Topics: @CloudExpo, Microservices Expo, Microsoft Cloud, Open Source Cloud, Containers Expo Blog, Cloud Security

@CloudExpo: Article

How Do You Eat a Network Security Elephant?

A cloud security take on an old riddle: analyze risks, deploy scalable model, and leave room for dessert

One byte at a time.

Now before you roll your eyes at my stupid pun, consider the deeper wisdom to this IT twist on an very old adage.

Security is big. It encompasses a great many definitions, confronts a great many issues and is addressed through a great many solutions using a great many formats. For many organizations, it can be an overwhelming proposition. Beyond the issues of data defense, regulatory compliance, traffic management, identity regulation, archiving, reporting, access control, intrusion detection, encryption, app administration, help desk assistance, there is the job the IT pro was hired to do…ensure the smooth technical operation of their organization. Securing the disappearing network perimeter and beyond has become more than a full-time job in itself.

This is a Gordian Knot conundrum for smaller enterprises and SMBs. In many cases, they are under the same threat, responsible to the same agencies for compliance and simply don’t have the bandwidth, or budget. But security is too big to ignore, yet too big to eat the whole elephant. Often it comes down to a decision between limited scope and performance. At the risk of seriously mixing my metaphors, it is like being asked to make a choice between wearing a suit of armor or holding a shield.

Most companies will invest barely enough to stave off penalties but not enough to honestly protect their assets or regularly avoid further audit scrutiny.  This usually means a base level of protection of firewalls, email scanners, malware detection and sys-log archiving. They chose the shield even though they know the suit of armor is a better course of action.

Now I don’t advocate buying a suit of armor because I am an armorer. There is responsible defense and then there’s overkill. But, remember, there’s still an elephant in the room. And that elephant is that inside salesman who  leaves under less than ideal circumstances; he’s the brute force and denial of service attack feints; he’s every at risk password, spoof, phish, hack, breach; every suspicious IP address from China and repeated failed login; and in this case what you don’t know will eventually hurt you.

And so, the elephant still remains uneaten. But it doesn’t mean you have to break the bank. It doesn’t mean you have to hire an army of experts. Eating a security elephant starts by eating it one byte at a time…and that means creating a coherent strategy of priorities that match the need of your size, your hierarchy, your industry, your growth arc while understanding your risk exposure. The fact that your SMB is modestly sized, does not mean you’re less likely to be infiltrated or that your data is more secure because you operate under the proverbial radar. It’s simply faulty logic. As I’ve emphasized  in earlier blogs (here, here, and here), its not even a matter of if, but when. But in all honesty, it’s probably already happening on some level (studies and stats noted here).

So going back to our palatable pachyderm…the over arching issue is not just how to eat the elephant, but knowing which are the edible parts and which bites provide the most nutrition. For many it comes down to how much is in the wallet and how many diners there are at the table. So if we are going to eat this elephant one byte at a time…where does the first fork plunge in (sorry to my vegetarian friends for this extended metaphor!)?

It’s a different answer for most companies, but there are certain common denominators: asset protection and regulatory compliance integrity. The answer is more than firewalls and latent sys-log collection and review.  For many companies that first bite is a variation of intrusion detection (boundary defense), application monitoring, network device monitoring, developing and reviewing audit logs, data loss prevention processes and alert procedures. Based on the requirements developed by most regulatory agencies (PCI, FFIEC, FISMA,  HIPAA…), this is a hybrid of several solutions, but SIEM (security information and security event management) and log management play the central role.

In a survey sponsored by a Microsoft funded think tank, the results showed that security frugality makes one a soft target for data theft. But we’ve always known security is a “get what you pay for proposition.” If you pay for a shield, your entire back flank is exposed. However, you just can’t support the cost for a full set of armor. Yes, frugality can be precarious, but if funding and resources are spent wisely, even a modest company expands the effectiveness of its security capabilities.

Cloud security is that equalizer that removes the emphasis on capital expenditures and intensive man hours and places them on end results. The concept of SIEM (intrusion detection, real-time alerting, stack correlation) is sound, but the application is often beyond the operation and budget scope of small companies. SIEM from the cloud removes those cost obstacles; no servers to buy, no suites to install. But let’s make this first bite even more delicious…what if it could also incorporate the features and functions of an enterprise log management deployment for the same cost?

As a single bite, it makes great sense.  It has great “nutrition;” it’s a cost-effective “meal;” and leaves room to add another bite when you’re “hungry” later on.  As an important priority, it addresses key concerns such as knowing who is accessing your network perimeter, enforcing actionable plans to deal with suspicious activity, streamlining tedious compliance reporting,  maintaining vital privacy directives, and creating 24/7/365 real time visibility on your assets. The survey referenced above noted 62 percent of cloud-adopters said their levels of privacy protection increased. Nearly all, or 91 percent, of the SMBs using the cloud said their cloud provider made it easier for them to satisfy compliance requirements. This is in stark contrast to the 39% of on-premise users who said compliance requirements barred them from using cloud applications.

Another benefit is the scalability of your first bite. To some, SIEM and Log could be this full-size elephant with large tusks: analyzing upwards of 2000 events per second, monitoring hundreds or thousands of devices. But if your company is a tenth of that size, you don’t need all that power. You need an elephant that fits on your right-sized plate. Again security from the cloud allows for the same enterprise-class power, but at a significantly scaled back deployment. And the cost is right-sized as well. In many cases there are package bundles and tiered programs that make this bite more than manageable.

So, to recap…how do you eat a security elephant? Analyze your company’s existing risks with what you are currently doing (or not doing!), identify specific needs to improve or expand based on those vulnerability gaps, develop a priority list based on your technical capacity with deference to regulatory requirements and client/brand trust, address the highest priority that has the furthest reaching impact, deploy a scalable model that generates manageable TCO, measure results and….

Leave room for the next bite…and that just might be including a new division or department for monitoring/assessment,  Identity Management (IDaaS), Access control, single sign on, automatic provisioning, password management, SaaS federation or a long line of other important victuals. Which, by the way, can all be deployed, managed and unified in the cloud.

Kevin Nikkhoo

Great things are not done by impulse, but by a series of small things brought together” – Vincent Van Gogh

Cloudaccess.com

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

@CloudExpo Stories
Recently, REAN Cloud built a digital concierge for a North Carolina hospital that had observed that most patient call button questions were repetitive. In addition, the paper-based process used to measure patient health metrics was laborious, not in real-time and sometimes error-prone. In their session at 21st Cloud Expo, Sean Finnerty, Executive Director, Practice Lead, Health Care & Life Science at REAN Cloud, and Dr. S.P.T. Krishnan, Principal Architect at REAN Cloud, will discuss how they bu...
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, will discuss how from store operations...
Nordstrom is transforming the way that they do business and the cloud is the key to enabling speed and hyper personalized customer experiences. In his session at 21st Cloud Expo, Ken Schow, VP of Engineering at Nordstrom, will discuss some of the key learnings and common pitfalls of large enterprises moving to the cloud. This includes strategies around choosing a cloud provider(s), architecture, and lessons learned. In addition, he’ll go over some of the best practices for structured team migrat...
SYS-CON Events announced today that Datera will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datera offers a radically new approach to data management, where innovative software makes data infrastructure invisible, elastic and able to perform at the highest level. It eliminates hardware lock-in and gives IT organizations the choice to source x86 server nodes, with business model option...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. They are the industry leader in DNS, DHCP, and IP address management, the category known as DDI. We empower thousands of organizations to control and secure their networks from the core-enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements.
Digital transformation is changing the face of business. The IDC predicts that enterprises will commit to a massive new scale of digital transformation, to stake out leadership positions in the "digital transformation economy." Accordingly, attendees at the upcoming Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA, Oct 31-Nov 2, will find fresh new content in a new track called Enterprise Cloud & Digital Transformation.
SYS-CON Events announced today that NetApp has been named “Bronze Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. NetApp is the data authority for hybrid cloud. NetApp provides a full range of hybrid cloud data services that simplify management of applications and data across cloud and on-premises environments to accelerate digital transformation. Together with their partners, NetApp emp...
SYS-CON Events announced today that N3N will exhibit at SYS-CON's @ThingsExpo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. N3N’s solutions increase the effectiveness of operations and control centers, increase the value of IoT investments, and facilitate real-time operational decision making. N3N enables operations teams with a four dimensional digital “big board” that consolidates real-time live video feeds alongside IoT sensor data a...
Smart cities have the potential to change our lives at so many levels for citizens: less pollution, reduced parking obstacles, better health, education and more energy savings. Real-time data streaming and the Internet of Things (IoT) possess the power to turn this vision into a reality. However, most organizations today are building their data infrastructure to focus solely on addressing immediate business needs vs. a platform capable of quickly adapting emerging technologies to address future ...
The dynamic nature of the cloud means that change is a constant when it comes to modern cloud-based infrastructure. Delivering modern applications to end users, therefore, is a constantly shifting challenge. Delivery automation helps IT Ops teams ensure that apps are providing an optimal end user experience over hybrid-cloud and multi-cloud environments, no matter what the current state of the infrastructure is. To employ a delivery automation strategy that reflects your business rules, making r...
As people view cloud as a preferred option to build IT systems, the size of the cloud-based system is getting bigger and more complex. As the system gets bigger, more people need to collaborate from design to management. As more people collaborate to create a bigger system, the need for a systematic approach to automate the process is required. Just as in software, cloud now needs DevOps. In this session, the audience can see how people can solve this issue with a visual model. Visual models ha...
Enterprises are adopting Kubernetes to accelerate the development and the delivery of cloud-native applications. However, sharing a Kubernetes cluster between members of the same team can be challenging. And, sharing clusters across multiple teams is even harder. Kubernetes offers several constructs to help implement segmentation and isolation. However, these primitives can be complex to understand and apply. As a result, it’s becoming common for enterprises to end up with several clusters. Thi...
SYS-CON Events announced today that Avere Systems, a leading provider of hybrid cloud enablement solutions, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Avere Systems was created by file systems experts determined to reinvent storage by changing the way enterprises thought about and bought storage resources. With decades of experience behind the company’s founders, Avere got its ...
In the fast-paced advances and popularity in cloud technology, one of the most critical factors revolves around concerns for security of your critical data. How to assure both your company and your customers they can confidently trust and utilize your cloud environment is most often top on the list. There is a method to evaluating and providing security that exceeds conventional modes of protecting data both within the cloud as well externally on mobile and other devices. With the public failure...
Containers are rapidly finding their way into enterprise data centers, but change is difficult. How do enterprises transform their architecture with technologies like containers without losing the reliable components of their current solutions? In his session at @DevOpsSummit at 21st Cloud Expo, Tony Campbell, Director, Educational Services at CoreOS, will explore the challenges organizations are facing today as they move to containers and go over how Kubernetes applications can deploy with lega...
SYS-CON Events announced today that Avere Systems, a leading provider of enterprise storage for the hybrid cloud, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Avere delivers a more modern architectural approach to storage that doesn't require the overprovisioning of storage capacity to achieve performance, overspending on expensive storage media for inactive data or the overbui...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
Today most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes significant work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reducti...
Microsoft Azure Container Services can be used for container deployment in a variety of ways including support for Orchestrators like Kubernetes, Docker Swarm and Mesos. However, the abstraction for app development that support application self-healing, scaling and so on may not be at the right level. Helm and Draft makes this a lot easier. In this primarily demo-driven session at @DevOpsSummit at 21st Cloud Expo, Raghavan "Rags" Srinivas, a Cloud Solutions Architect/Evangelist at Microsoft, wi...