According to the research of Sophos, a network security organization, cloud security events are happening all the time.
According to the cloud security situation in 2021 released by the company, nearly three quarters of enterprises have suffered from cloud security attacks, of which malware, ransomware, cloud leakage and configuration errors are the biggest threats.
In addition, running a multi cloud environment is also one of the factors that enterprises suffer from cloud security events. In 2022, the concept of cloud security will burst out after all walks of life set off a wave of cloud. According to Gartner’s prediction, by 2023, the size of the cloud security market will increase tenfold, reaching US $12.4 billion (compared with us $1.2 billion in 2020).
At the same time, more and more small and medium-sized enterprises are also increasing their investment in network security, which has virtually boosted the pace of cloud security from a niche market to the mainstream.
Cloud computing brings all-round changes to the business. With the more extensive business deployment environment in the cloud era, the types of terminals that organizations need to manage are also more diversified.
At the same time, it resources and capabilities in the cloud era can be rapidly applied to business innovation, and the iteration speed of applications has become faster. The wide application of cloud native architecture and open source code makes enterprise IT architecture and application more and more complex.
This series of changes has brought many new challenges to enterprise security. After the enterprise’s business is put on the cloud, most of the traditional security products cannot be directly deployed to the cloud environment, and the security problems in the cloud era context such as containers and API attacks have become ineffective.
In a multi cloud and multi terminal environment, two closely integrated but separated ecosystems, security protection and operation management, are required, which results in a complex operating environment. Running a parallel environment using a variety of different technology platforms will bring continuous operational complexity in the fields of monitoring, security and production support.
The complexity of the cloud architecture itself will also make security protection more complex and costly. Therefore, a more simplified way to achieve security protection is required.
From the host to the virtual machine, from the virtual machine to the container, cloud security seems to be omnipotent, running through the whole history of the cloud era. Cao Jia, vice president of Lvmeng technology group, believes that the cloud looks safe, but it is very easy to become a breakthrough.
Whether it is a public cloud, a private cloud or a hybrid cloud, there is a large amount of self-development business, and the security problems of such applications will be highlighted.
At the same time, 70% of enterprises will use some open source components to build software applications, and third-party components will also introduce security risks, thus breaking the balance between business and security. A large amount of public information opened by the API may also be exploited by attackers, creating new security risks.
Therefore, for any enterprise that wants to build a cloud security system, cloud security strategy is becoming increasingly important.
Nowadays, more and more enterprises realize that building a cloud security strategy is a continuous work. Cloud security requires top-down top-level design, and all cloud applications should be built with security as the starting point.
In terms of strategic priority, enterprises should take cloud security as the “zero task” throughout the whole process of the cloud journey. From the initial technical concept, to the management mechanism, and then to the enterprise culture, each cloud service should take cloud security as a priority from the design stage.
For enterprises, to build security capabilities in the cloud era, we can start from three aspects: adopting security products and services delivered by cloud, building protection capabilities suitable for cloud and cloud native applications, and adopting it infrastructure suitable for the cloud era.
In the cloud environment, the traditional network boundary has disappeared, and almost all terminals and networks are unsafe environments. Therefore, in the cloud era, it is necessary to re-establish a new security protection model.
Zero trust architecture is a security mode widely recognized by the industry to realize cross cloud protection. Although zero trust is beautiful, the current implementation is often unsatisfactory. When building a zero trust system, enterprises should fully consider the feasibility of relevant products and solutions, and cannot choose overly complex products to cause the solutions to fail to be implemented.
In addition, if the infrastructure can be built with security capabilities, the security risks of enterprises in the cloud era can be greatly reduced.
The infrastructure built locally by the enterprise, including private cloud platform and hyper integration, is almost completely decoupled from the security capability and infrastructure, and the security construction needs to be considered separately.
In the cloud era, enterprises need to adopt more digital infrastructure with inherent security protection capabilities, such as built-in anti blackmail storage, built-in micro isolated network, and virtual patch computing platform.
Of course, this it infrastructure construction suitable for the cloud era does not mean to replace all the existing security facilities of the enterprise, but rather to cloud some of the capabilities of traditional security products and incorporate them into the cross cloud management platform, making them part of the security protection of the cloud environment, which not only greatly improves the security effect, but also simplifies the complexity of delivery.
Returning to the cloud era, the most essential demand of enterprises for security is to be effective, not only to effectively protect the business, but also to effectively resist attacks.
Although security itself will not create value for the business, the loss caused by lack of security to the business will far exceed imagination. Therefore, security must be simple enough and reliable enough to make users more and more worry free, rather than more and more complicated.