Action Items for Multicloud Security Best Practices
Implement Zero Trust and strong security posture across multicloud environments
The core idea is to minimize risk by granting access on a need-to-know basis and continuously monitoring for potential threats, regardless of whether the user or system is inside or outside the network. This approach often involves MFA, strict access controls, and segmentation of resources to limit the potential spread of threats. Zero Trust is designed to address modern cybersecurity challenges, including cloud-based environments and remote work setups, where traditional boundaries are no longer effective.
Zero Trust, Shulz mentioned, is also instrumental in fighting AI-powered black hat exploits.
"So as I mentioned, the bad actors are using generative AI to up their game, which means that they're leveraging the technology," he said. "They are leveraging and exploiting the vulnerabilities, both those known but also those unknowns that we talked about, the advanced persistent threats. They're finding holes in, gaps in your security, your protection and your detection capabilities." He mentioned ways of probing and testing for denial-of-service attacks and other scenarios.
"How are you going to respond? Where are the weak spot? Are there vulnerabilities in your apps or in your browsers or in your APIs? Have you you have a lack of patch and remediation up and down the entire stack and across your different platforms, and are they tested?"
Leverage CSPM tools to identify and remediate security misconfigurations across multi-cloud infrastructure
Cloud Security Posture Management (CSPM) tools are solutions designed to automate the process of identifying and mitigating risks in cloud environments. CSPM tools help organizations ensure their cloud configurations comply with security best practices, regulatory standards, and organizational policies.
Shulz mentioned the use of these tools and fielded a question about how organizations can optimally use them to identify and remediate security misconfigurations across a multicloud infrastructure.
"Yeah, that's a good one, in that using different tools with different acronyms all come into play to gain that insight," Shulz said. "You know, whether it's CSPM, whether MDR, XDR, EDR, whether you go right on down that list, it's having those tools. It's one thing to have the tools. It's another thing to actually be using them and leveraging them to gain that insight. What tools are available directly via your different cloud providers, and can those tools look multicloud and go deep and gain information and feed information to others?
"Then there are other different third-party tools. Yeah, that can allow you to look at different layers at different points of elevations, whether it's the network or at the server, the storage, or whether it's up at the moving up from the infrastructure as a service, or moving up into the paths or the SaaS. What are the different tools at the different layers that allow you to gain that insight, that awareness, but that can also be leveraged by different groups within your organization as part of feeding into overall dashboards, information centers, response centers?"
Incentivize developers to prioritize bug-free, secure code over rapid feature releases
Shulz fielded another question about a company with a focus on IT, operations, DevOps and associated areas to find and fix things collectively. "What role should our app developers be doing?" read the question.
"That's a good one," Shulz replied. "It ties back to earlier that question about, are we being used more as beta testers? And debuggers and stuff like that. And so on the one hand, the developers, they're under pressure to kick out these apps as fast as they can. Nothing really new there -- that's been going on for a long, long time. But part of it is that the organization needs to reward the organization, i.e. a company or entity, whatever you happen to be, is for finding errors, finding omissions, finding bugs, putting bug bounties out there that incentivizes workers to get their project done, that they've got a product release, that they've hit their PR, they've hit that objective so they get their check marks, but that it's also the fact that it's bug free, that they aren't in that race to get a PR out, that they're not cutting corners that come back to bite.
"Part of that, it's very much a cultural, there's financial aspects to it, but it's also a culture of work harder, work smarter. And it's not just about how many lines of code you can crank out. It's how many lines of productive, usable, bug-free, error-free, omission-free code out there. So I think those are some things that can move things along quite a bit, quite a ways. It's really a collaborative got to break down these walls where developers throw it over support puts it back now. They got to work together hand in hand."
Review policies and leverage technology to enforce them, rather than the other way around
In response to yet another question that read: "Is the solution to use the newest technology versus worry about people and policies?" Shulz replied, "A little bit of both."
He continued: "Use the new technology as well as old technology and new ways. So in other words, review your policies, and rather than focusing on the technology, leverage your policies to apply to the technology that then your technology is implementing your policies and what you want done. Your work -- the technology should be working for you, not you working for the technology."
Note that most of these action items resulted from submitted questions, and the ability to ask bona-fined topic experts one-on-one questions is a primary benefit of attending such online tech events live (not mention winning a raffle prize).
With that in mind, here are some upcoming events being put on by Virtualization & Cloud Review through next month.
- Ransomware & Cloud Data Protection Summit: What's Ahead for 2025 - Dec. 18
- Multicloud Trend Watch: Top Challenges, Strategies & Solutions Summit - Jan 10
- Top 10 Technical Predictions for 2025 -- Jan. 14
- Balance Security and Developer Productivity in the software supply chain: Trusted strategies and best practices - Jan 15
Also, the replay is well worth watching to benefit from Shulz's entire list of best practice insights into which he goes in to detail, including:
- Cloud Security and Data Protection are a shared responsibility!
- In general: Similar to your home or vehicle, check for unlocked and open doors, windows, and other entry points; also, who has keys or access? The same applies to clouds… who has access to data that can be used to get someone to provide something else or to go fishing, phishing, vishing, and other attacks to get credentials and info...
- How strong is your cloud security and data protection posture?
- How good is your cloud monitoring, logging, and remediation hygiene?
- Do you have in case of emergency break glass access accounts?
- Invest in and support your resources (people, HW, SW, tools, services)
- Encourage workers to find and fix bugs, errors, and omissions
- Educate and train workforce, invest in HW and SW tools
- Leverage automation and smart management tools
- Revisit, enhance, leverage your incident response center
- Have an up to date recovery, restoration, and incident response plan
- Workers are trained on what to do, and what not to do
- Conduct continuing education and awareness, test the plans
- Maintain your plan, enhance refine on an ongoing basis
- Continually review and assess health and posture of your environment
- Regular vulnerability scans, anomaly detection
- Know what you have, where, how it is used and by whom
- Good remediation hygiene from core to edge (HW, SW, FW, Devices)
- Leverage red and blue team pen test across clouds, APIs, and gateways
- Revisit your:
- Network segmentation (logical, physical, virtual, micro, public, private)
- End point protection (Gateways, Firewalls, Apps, APIs, Services, Nets)
- OU's, Roles, Policies, IAM, RBAC for inter and intra cloud access
- Default configuration settings along with service provider defaults
- Accounts, subscriptions, tenants, groups, and resources you have
- How are you using resources, are you paying for resources not in use?
- Testing of recovery and incident plans, remediation, and pen-testing
- Are you protecting and preserving your logs and data protection data?