Q1. What's likely going to be top of the agenda for most CISOs and other security leaders at Black Hat USA 2020?
What are some of the biggest security concerns (and misconceptions) organizations continue to have when it comes to migrating business critical workloads to the cloud?
With cloud adoption, many organizations believe they must choose between security and innovation since the ever-evolving nature and complexity of the cloud makes it impossible to prevent misconfigurations and other security issues. But, this is a false choice.
An asynchronous approach to cloud adoption and the security that should go with it creates tremendous risk. Enterprises are accepting this risk in order to reap the benefits of speed and agility that cloud offers, and they are doing so needlessly. As long as organizations take a comprehensive approach to cloud security, including ensuring the right people, processes and tools are in place at the time of cloud adoption, innovation and security go hand-in-hand.
Q2. A recent survey that DivvyCloud conducted found that a majority of organizations believe cloud adoption is necessary for innovation but is not prepared for the security challenges. Where do the biggest security challenges exist and why?
Enterprise cloud adoption has largely been driven by companies eager to take advantage of its agility. Their developers are often under pressure to rapidly bring new products to market that provide competitive advantages.
Embracing self-service access to the cloud is how companies stay agile and innovative. But the speed of development combined with a lack of cloud security expertise often results in engineers and developers bypassing certain security and compliance policies. A common byproduct of bypassing these policies is data breaches, thanks to misconfigurations and other security glitches.
Shutting down self-service access to the cloud, however, is not the solution. The cloud offers huge benefits for companies looking to get—or stay—ahead of their competitors, and developers being able to spin up new services quickly are key. To allow developers the freedom to innovate without sacrificing security and compliance, enterprises should establish, and enforce, a full lifecycle cloud security strategy.
This starts with enterprises implementing a continuous and automated cloud security solution to detect and remediate threats, such as misconfigurations and compliance violations, in real-time. This allows companies to either automate the remediation of those vulnerabilities or alert the appropriate personnel of the issue before a devastating data leak or breach occurs.
These organizations should also include a more preventive approach by integrating cloud security into the CI/CD process and evaluating Infrastructure as Code (IaC) templates before a build. By shifting security left, they will be better equipped to address many security and compliance issues. Developers are empowered to participate in addressing any security issues because decision-making on how to fix the problem is now at the level that has the most context.
Additionally, companies should strive to adopt the principle of least-privileged access when provisioning IAM permissions in the cloud. While this isn't easy to accomplish, companies can start by using behavior analytics and automated cloud security tools to adjust privileges to include but not exceed the needs of a role.
Lastly, organizations that are not prepared to employ the necessary people, processes, and systems concurrent with cloud adoption (not weeks, months, or years later) will not be prepared adequately. It is only when enterprises address security during cloud adoption can they ensure continuous security and compliance in the cloud from the start.
Q3. What is DivvyCloud's main focus at Black Hat USA 2020? What do you plan on highlighting at the virtual event?
At this year's Black Hat, DivvyCloud plans to focus on how cloud identity and access management (IAM) is the new perimeter. In cloud and container environments, everything has an identity: users, applications, services, and systems. While cloud provides enormous flexibility, it also requires careful and specialized governance, as every service is potentially reachable by every other one.
With a rapidly growing remote workforce, organizations will need to focus on IAM in their cloud infrastructure. This will ensure employees and users are able to securely access the tools and resources they need to do their jobs or access the resources and services they need to access while thwarting fraudulent, unauthorized attempts from bad actors and even well-intentioned but menacing insiders.
Protecting the identity perimeter at scale requires automated monitoring and remediation around access management, role management, identity authentication, and compliance auditing.
Furthermore, in our session on August 5th at 1:30 pm PST, DivvyCloud's VP of Technology, Chris DeRamus, will discuss Augmenting Native Cloud Security Services to Achieve Enterprise-Grade Security. During the session, he will take a deep dive into what CSPs offer in terms of security and how organizations can use and augment these native CSP security controls to fulfill their security objectives.