February 22, 2022
Whether you understand cloud computing or not, if you are savvy enough to use a smartphone or a laptop, chances are you already use cloud computing services. For example, if you have used Amazon.com or any Google Application or Microsoft 365 Suite or even streamed movies and songs online – you have used cloud computing services.
Microsoft defines cloud computing as the “delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale. You typically pay only for cloud services you use, helping you lower your operating costs, run your infrastructure more efficiently, and scale as your business needs change.” Basically, companies can use the services mentioned above through the internet as opposed to their on-premise server.
Due to lower operating costs and other efficiency factors, most companies, no matter the size, are quickly migrating to the cloud. This has led to many criticalities arising in the management of cloud architecture. Specifically, the security aspect needs utmost attention, mainly in application domains where integrity, privacy, and confidentiality of information must be guaranteed
Wikipedia describes Security as a Service (SECaas) as a “business model in which a service provider integrates their security services into a corporate infrastructure on a subscription basis.” This security as a service is generally more cost-effective than most corporations provide on their own when the total cost of ownership is considered. To understand, consider SECaaS as a SaaS (Software as a Service) model where the service provider offers cybersecurity-focused services to aid with customer’s networks and IT systems.
According to IDC’s Cloud computing study, 92% of organizations have at least some part of their IT environment as cloud-based. Added to that, more than 55% of the organizations currently use multiple public clouds. The survey also found that Technology decision-makers believed privacy and security challenges to be the major hurdles preventing them from taking full advantage of their public clouds. ‘The State of Cloud Security 2020’, a survey by Sophos, found almost 2/3rd of the organizations (70%) hosting data/workloads in the public cloud experienced a security incident. Moreover, Multi-cloud organizations reported more security incidents than those using only a single platform.
A lot of work has been done regarding the security of the cloud and the data within it. However, there was still a dearth of best practices guidelines to follow during developing and implementing an elastic cloud model. The Cloud Security Alliance (CSA) solved this problem by breaking the SECaaS into various categories:
IAM provides controls for access intelligence, identity verification and access management. It includes processes such as provisioning/de-provisioning of accounts, directory services, authentication, token management etc
THREATS ADDRESSED:
This is a preventive measure that mainly ensures that data (structured and unstructured) remains under control.
It deals with monitoring, protecting, and verifying the security of data in the cloud and on-premises. Its functionalities include- data labeling & classification, identification of sensitive data, Structured data matching, SQL regular expression detection etc.
THREATS ADDRESSED:
This is a reactive and real-time protection mechanism against online applications offered via the cloud by redirecting web traffic to the cloud provider. It provides services like web filtering, spyware & bot network analyzer, phishing site blocker, email security etc.
THREATS ADDRESSED:
As the name suggests, email security provides control over inbound and outbound emails, thus helping in enforcing corporate policies. Its functionalities include accurate filtering to block spam, flexible policies to define mail flow, encryption, etc.
THREATS ADDRESSED:
These are audits of cloud services or assessments of on-premises systems via cloud-provided solutions generally done by third parties. Some of the features are Risk management, compliance, technical compliance audits, application security assessments etc
THREATS ADDRESSED:
This process uses pattern recognition to detect and react to statistically unusual events to stop/prevent an intrusion in real-time. Generally, it provides identification of intrusions & policy violations, automatic/manual remedy actions, updates to address new vulnerabilities & exploits.
THREATS ADDRESSED:
This is a detection process in which the systems accept log/event information. This information is then analyzed and is used to report and alert on events that may require intervention. It provides real-time log & event correlation, forensic support, log normalization, compliance reporting etc
THREATS ADDRESSED:
This process makes the data indecipherable by managing encryptions, hashing, digital signatures, key exchanges etc. Its functionalities include- data protection, data validation, message authentication, data time-stamping, code signing, forgery detection etc
THREATS ADDRESSED:
This refers to various services that help in distributing, managing, and monitoring security controls in a network. The functionalities are traffic/NetFlow monitoring, security monitoring, data threats, access control threats, security gateways, DoS protection/mitigation etc
THREATS ADDRESSED:
Since many companies are adopting cloud technologies but are still ill-informed about the security aspect, they need their service providers to look after their Cloud Security needs. There are various cloud security issues such as data breaches, distributed denial of services attacks, phishing scams, etc. that SECaaS providers can efficiently address. Also, developing in-house cloud security experts is costly and requires regular upskilling and training of the employees. Partnering with a trusted SECaaS service provider can help organizations focus on their core business area while the partner will help keep their digital assets secure.