Intelligent CIO Africa Issue 11 | Page 15

LATEST INTELLIGENCE drives those who manage network security. East-west traffic, traffic between systems inside the network, now dominates the corporate data flow. Hybrid cloud environments link corporate systems and applications to external data sources and customers. Private cloud deployments serve up compute power as a service to application developers deploying new functionality to both internal and external users. The network design paradigm for the data center is now flatter. The net result: once breached, the network is exposed to threats which can remain hidden, lurking or dormant for days or weeks, waiting for the right moment to wreak havoc or steal confidential data. It is just this type of threat that weighs heavily on the minds of those tasked with cloud security. For those seeking to tackle this challenge, we outline here the key elements to consider in a cloud security solution. Keeping in mind that the first order may not only be to prevent a breach, but also to assume there will be one, and ensure that elements of a cloud solution can remain resilient and protected. Public cloud security Public cloud security represents the most high-profile security concern. Both business leaders and users have only recently overcome the inherent skepticism of sharing systems and bandwidth with unknown third parties. Concerns over cloud security, until very recently, had been a reason why many were slow to adopt public cloud options. For effective public cloud security, there are two key elements that must be addressed: a shared security model and provider integration. Shared Security Model – The shared security model not only has to be the approach security teams adopt when securing the cloud, but the solutions companies deploy must be flexible enough to support the deployment of security functionality in a shared model. The shared security model consists of two key components. Security “of” the cloud, which includes all of the data center components on the cloud provider side of the equation, and security “in” the cloud which consists of what you as the cloud subscriber are responsible for providing in terms of your data and applications in the cloud. Download White Papers free from http://www.intelligentcio.com/africa/white-papers/ www.intelligentcio.com INTELLIGENTCIO 15