- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe to Topic
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Permalink
- Report Inappropriate Content
What's New in Cloud Security, Compliance & Identity - August/September
Find out the most impacting news on Azure Defender, Security Center, Azure AD and Microsoft Information Protection:
What's New in Cloud Security, Compliance & Identity - MPN EMEA
Check out the MPN EMEA Blog for News and Resources for partners: https://aka.ms/MPNEMEABlog
If you need advisory from Technical Pre-Sales and Deployment team, open a request here: https://aka.ms/TPDMSForm
- Mark as New
- Bookmark
- Subscribe
- Mute
- Permalink
- Report Inappropriate Content
Understanding cloud security development and demands help to maximize the benefits of cloud adoption and make a secure landscape. Here are the top 4 cloud security trends your security team needs to watch out:
1. Cybersecurity Mesh
Companies have their data and assets outside their network when it comes to the cloud, which must be secured. Cybersecurity mesh is a concept of having a distributed network and infrastructure, creating the security perimeter around the people and machines on the network. With this concept, companies can manage access to their data from a centralized security point. This also provides centralized security policies with enforcements distributed. Cybersecurity mesh is also considered as one of the building blocks of Zero-Trust architecture.
2. Zero Trust
Zero-trust has the motto of “never trust, always verify,” which strongly implies that an organization should not trust anything outside or inside its perimeters.
Considering the recent approach of migrating everything to the cloud, zero trust must be enforced in every organization. Organizations rely on perimeter security and firewalls to protect their most valuable resources like user data and intellectual property.
Security teams are spending too much time on manual tasks since they lack the insight to reduce attack surfaces efficiently, especially in the cloud architecture. The practice of Zero Trust aims to enhance security around every device, user, and connection. In addition to that, it also provides the ability to manage threats proactively. This method helps in organizing and strategizing a thorough approach to counter threats.
3. Hybrid and Multi-Cloud Environment
As per the new cloud security trend, cloud infrastructure seems feasible and reliable compared to the old method; there are also types of methods to choose from. An organization can migrate their data completely onto the cloud or have partial data on the cloud and other services hosted privately. Most organizations prefer to use the hybrid approach since it proves to be more secure than moving the entire thing to the cloud.
The hybrid-cloud approach implies that services and applications that can be hosted are configured locally and can be migrated to the cloud. For example, containerization can be deployed in the cloud, other infrastructure level things like a local-work environment can be deployed on-premises and configured to work remotely.
The next popular cloud security trend is the multi-cloud environment. An IT survey reported that 95% of the companies are approaching a multi-cloud strategy. Multi-cloud proves effective when tools like SIEM and threat intelligence are deployed. One environment can contain security-based tools, and the others might have applications and other services.
4. Cloud-Native Tools and Platforms
Cloud-native applications are becoming more prominent when working on cloud platforms. These applications are specifically designed to work on the cloud. Cloud-native applications seek advantage of the speed and efficiency of the cloud platform. The security tools and platforms designed for the on-premises applications are not enough to protect the cloud-based resources.
Companies realized that failing to choose the right tools and platforms, could leave their applications exposed to threats. They are increasingly investing in cloud-based security tools to prevent attackers from exploiting their resources in the cloud.
