Cloud Security Assurance: Is Automation Changing the Game?

Cloud Security Assurance: is Automation Changing the Game?

Cloud Security Assurance: Is Automation Changing the Game?

Home ยป News ยป Cloud Security Assurance: Is Automation Changing the Game?
Table of Contents

Security assurance is a very powerful for better organizations, as senior managers are increasingly more in command of safety however ceaselessly lack the time to dive deep into its demanding situations and depend closely on safety and safety assurance groups. With automation and Infrastructure as Code (IaC) on the upward thrust within the cloud, managers now have a brand new dream: Replace guide, expensive, andhuman-centric assurance with cloud-provided, computerized assurance experiences to make assurance more practical. In the next, we discover the alternatives and obstacles of computerized safety assurance through taking a better have a look at cloud experiences for ISO 27001 within the context of the Google Cloud Platform (GCP) and Azure โ€“ a commonplace assurance state of affairs.

The Role of Security Assurance

Security assurance serves as the second one defensive line in a companyโ€™s chance control framework, in most cases arranged in line with the Institute of Internal Auditorsโ€™ (IIA) three-line fashion (Figure 1):

  • First Line: Operational groups answerable for day by day duties like patching servers, pen-testing, or community design.

  • Second Line: Security assurance groups that test the presence and right kind functioning of safety controls around the group, i.e., the paintings of the primary line. They in most cases test towards requirements like NIST, CIS, HIPAA, or ISO 27001.

  • Third Line: Internal audit validating the paintings of the primary and moment strains. In distinction to them, interior audit experiences to the board of administrators or the audit committee for independence.

  • External auditors and regulators entire the image.

Of these types of groups, the second-line group could gain advantage maximum from computerized cloud compliance experiences, as assurance groups search a holistic review around the group, information facilities, and programs. In distinction, all different groups have a narrower focal point.

The Challenge of Complex Application Landscapes

Complexity in software landscapes poses vital demanding situations for safety assurance. A internet hosting supplier with an ISO 27001 certificates is superb however inadequate if the applying layer isn’t coated. Thus, a holistic working out of knowledge facilities is very important:

  • The infrastructure layer covers {hardware}, hyperscaler capability, cloud setup, and community. A safe structure of the sellerโ€™s cloud infrastructure and that of the client information middle is very important, e.g., relating to community zoning. Other sides come with resilience, similar to emergency energy provides and coverage towards environmental affects.

  • The running machine layer makes a speciality of ok configuration and well timed updates, together with safety tracking and reporting integration.

  • Correct configurations, common updates, and patching are crucial for middleware elements similar to databases, API gateways, and listing or messaging products and services.

  • The software layer encompasses tool that builds on middleware elements and accommodates cloud PaaS, SaaS, and exterior products and services. Secure design and tool engineering practices, in addition to updating and patching third-party elements, are crucial.

A selected focal point for safety assurance is integration. Applications hardly function in isolation; they have interaction.Iinteraction and integration issues are conventional breaking issues โ€“ particularly when other groups and organizationsโ€™ tasks come in combination.

Cloud Provider Assurance Reports

For cloud workloads, safety assurance groups should assess and acquire proof for every partโ€™s adherence to safety requirements, together with for elements and configurations the cloud supplier runs. Luckily, cloud suppliers be offering downloadable assurance and compliance certificate. These certificate and experiences are crucial for the cloud suppliersโ€™ trade. Larger consumers, particularly, paintings handiest with distributors that adhere to the factors related to those consumers. The actual requirements range through the purchasersโ€™ jurisdiction and {industry}. Figure 3 illustrates the in depth vary of worldwide, country-specific, and industry-specific requirements Azure (for instance) supplies for obtain to their consumers and possibilities.

These cloud safety assurance experiences quilt the infrastructure layer and the safety of the cloud supplierโ€™s IaaS, PaaS, and SaaS products and services. They don’t quilt customer-specific configurations, patching, or operations, together with securing AWS S3 buckets towards unauthorized get entry to or patching VMs (Figure 4). Whether consumers configure those products and services securely and put them adequately in combination is within the consumersโ€™ palms โ€“ and the client safety assurance group should validate that.

Assurance Reports for Customer Cloud Environments

Ensuring cloud safety assurance and compliance calls for verification towards requirements like ISO 27001:2022, which comes to a large number of controls. Assurance consultants should acquire proof for elements and configurations now not coated through cloud supplier assurance experiences. With cloud suppliers providing integrated assurance experiences, there’s hope for an enormous aid in assurance paintings because of automated proof assortment. However, our examples from Azure and GCP display that hopes and realities don’t relatively fit (but).

GCP

Google approaches the subject bottom-up through mapping vulnerabilities and misconfigurations to doubtlessly impacted controls of a selected usual similar to ISO 27001 (Figure 5). For example, if a VM has a public IP (a safety no-go), GCP translates this as violating 4 ISO controls: A5.10, A5.15, A8.3, and A8.4. Thus, the GCP experiences assist establish vulnerable issues through checklist controls with many violations. However, those experiences can not exchange human exams โ€“ no less than now not for ISO 27001 โ€“ since they can not quilt crucial operational and procedural subjects which can be in particular vital in ISO 27001.

Azure

Microsoftโ€™s Azure follows a unique way through imposing a top-down philosophy. It lists all controls, e.g., those for ISO 27001, and offers insurance policies for every of those ISO controls to ensure their implementation. Azure supplies automated compliance reporting, however just for a couple of of those insurance policies. Many require guide review. For instance, just one out of 5 of the keep an eye on โ€œclassification of informationโ€ is computerized. So, it’s best to know Azure insurance policies as adapted to-do lists for cloud safety assurance, very similar to the ISO 27002 report. ISO 27002 and the Azure file supply detailed regulations and tips for imposing ISO 27001 controls . This characterization of the Azure way signifies that Azure does now not automate a lot in their consumersโ€™ safety assurance paintings.

To conclude, cloud supplier assurance experiences are terrific for figuring out misconfigurations and vulnerabilities in visitor software landscapes. However, changing human consultants with robotically generated assurance experiences is unrealistic, no less than for ISO 27001, as defined in our dialogue of GCP and Azure features. The demanding situations are even amplified in multi-cloud environments with workloads in Azure, AWS, Alibaba Cloud, and GCP the place organizations generally tend to try for constant assurance experiences โ€“ or if auditors and regulators call for in-depth protection of particular controls or detailed proof. Thus, cloud safety assurance will proceed to practice the Panini booklet concept: you wish to have a human devoted to accumulating the stickers (proof) for all elements โ€“ and also you spend some huge cash till you succeed in your purpose.

author avatar
roosho Senior Engineer (Technical Services)
I am Rakib Raihan RooSho, Jack of all IT Trades. You got it right. Good for nothing. I try a lot of things and fail more than that. That's how I learn. Whenever I succeed, I note that in my cookbook. Eventually, that became my blog.ย 
share this article.

ADVERTISEMENT

ADVERTISEMENT

Enjoying my articles?

Sign up to get new content delivered straight to your inbox.

Please enable JavaScript in your browser to complete this form.
Name