While cloud security has certainly come a long way since the wild west days of early cloud adoption, the truth is that there’s a long way to go before most organizations today have truly matured their cloud security practices. And this is costing organizations tremendously in terms of security incidents.
A Vanson Bourne study earlier this year showed that almost half of breaches suffered by organizations in the past year originated in the cloud. That same study found that the average organization lost almost $4.1 million to cloud breaches in the last year.
Dark Reading recently caught up with the godfather of zero trust security, John Kindervag, to discuss the state of cloud security today. When he was an analyst at Forrester Research, Kindervag helped conceptualize and popularize the zero trust security model. Now he’s chief evangelist at Illumio, where amid his outreach he’s still very much a proponent for zero trust, explaining that it is a key way to redesign security in the cloud era. According to Kindervag, organizations must deal with the following hard truths in order to achieve success with this.
1. You Don’t Become More Secure Just by Going to the Cloud
One of the biggest myths today about the cloud is that it is innately more secure than most on-premises environments, Kindervag says.
“There’s a fundamental misunderstanding of the cloud that somehow there’s more security natively built into it, that you’re more secure by going to the cloud just by the act of going to the cloud,” he says.
The problem is that while hyperscale cloud providers may be very good at protecting infrastructure, the control and responsibility over their customer’s security posture they have is very limited.
“A lot of people think they’re outsourcing security to the cloud provider. They think they’re transferring the risk,” he says. “In cybersecurity, you can never transfer the risk. If you are the custodian of that data, you are always the custodian of the data, no matter who’s holding it for you.”
This is why Kindervag is not a big fan of the oft-repeated phrase “shared responsibility,” which he says makes it sound like there’s a 50-50 division of labor and effort. He prefers the phrase “uneven handshake,” which was coined by his former colleague at Forrester, James Staten.
“That is the fundamental problem, is that people think that there’s a shared responsibility model, and there’s an uneven handshake instead,” he says.
2. Native Security Controls Are Hard to Manage in a Hybrid World
Meanwhile, let’s talk about those improved native cloud security controls that providers have built up over the past decade. While many providers have done a good job offering customers more control over their workloads, identities, and visibility, that quality is inconsistent. As Kindervag says, “Some of them are good, some of them aren’t.” The real problem across all of them is that they’re hard to manage out in the real world, beyond the isolation of a single provider’s environment.
“It takes a lot of people to do it, and they’re different in every single cloud. I think every company that I’ve talked to in the past five years has a multicloud and a hybrid model, both happening at the same time,” he says. “Hybrid being, ‘I’m using my on-premises stuff and clouds, and I’m using multiple clouds, and I may be using multiple clouds to deliver access to different microservices for a single application.’ The only way that you can solve this problem is to have a security control that can be managed across all the multiple clouds.”
This is one of the big factors driving discussions about moving zero trust to the cloud, he says.
“Zero trust works no matter where you put data or assets. It could be in the cloud. It could be on-premises. It could be on an endpoint,” he says.
3. Identity Won’t Save Your Cloud
With so much emphasis placed on cloud identity management these days, and disproportionate attention on the identity component in zero trust, it’s important for organizations to understand that identity is only part of a well-balanced breakfast for zero trust in the cloud.
“So much of the zero trust narrative is about identity, identity, identity,” Kindervag says. “Identity is important, but we consume identity in policy in zero trust. It’s not the end-all, be-all. It doesn’t solve all the problems.”
What Kindervag means is that with a zero trust model, credentials don’t automatically give users access to anything under the sun within a given cloud or network. The policy limits exactly what and when access is given to specific assets. Kindervag has been a longtime proponent for segmentation — of networks, workloads, assets, data — long before he began mapping out the zero trust model. As he explains, the heart of defining zero trust access by policy is divvying up things into “protect surfaces,” since the risk level of different kinds of users accessing each protect surface will define the polices that will be attached to any given credential.
“That’s my mission, is to get people to focus on what they need to protect, put that important stuff into various protect surfaces, like your PCI credit card database should be in its own protect surface. Your HR database should be in its own protect surface. Your HMI for your IoT system or OT system should be in its own protect surface,” he says. “When we break up the problem into these small bite-sized chunks, we solve them one chunk at a time, and we do them one after another. It makes it much more scalable and doable.”
4. Too Many Firms Don’t Know What They’re Trying to Protect
As organizations decide how to segment their protect surfaces in the cloud, they first need to clearly define what it is that they’re trying to protect. This is crucial because each asset or system or process will carry its own unique risk, and that will determine the policies for access and the hardening around it. The joke is that you wouldn’t build a $1 million vault to house a few hundred pennies. The cloud equivalent to that would be putting tons of protection around a cloud asset that’s isolated from sensitive systems and doesn’t house sensitive information.
Kindervag says it is incredibly common for organizations to not have a clear idea of what they’re protecting in the cloud or beyond. In fact, most organizations today don’t even necessarily have a clear idea of what it is that is even in the cloud or what connects to the cloud, let alone what needs protecting. For example, a Cloud Security Alliance study shows that only 23% of organizations have full visibility into cloud environments. And the Illumio study from earlier this year shows that 46% of organizations don’t have full visibility into the connectivity of their organization’s cloud services.
“People don’t think about what they’re actually trying to accomplish, what they’re trying to protect,” he says. This is a fundamental issue that causes companies to waste a lot of security money without appropriately setting up protection in the process, Kindervag explains. “They’ll come to me and say ‘Zero trust isn’t working,’ and I’ll ask, ‘Well, what are you trying to protect?’ and they’ll say, ‘I haven’t thought about that yet,’ and my answer is ‘Well, then you’re not even close to beginning the process of zero trust.'”
5. Cloud Native Development Incentives Are Out of Whack
DevOps practices and cloud native development have been greatly enhanced through the speed, scalability, and flexibility afforded them by cloud platforms and tooling. When security is appropriately layered into that mix, good things can happen. But Kindervag says that most development organizations are not properly incentivized to make that happen — which means that cloud infrastructure and all of the applications that rest upon it are put at risk in the process.
“I like to say that the DevOps app people are the Ricky Bobbys of IT. They just want to go fast. I remember talking to the head of development at a company who eventually got breached, and I was asking him what he was doing about security. And he said, ‘Nothing, I don’t care about security,'” Kindervag says. “I asked, ‘How can you not care about security?’ and he says ‘Because I don’t have a KPI for it. My KPI says I have to do five pushes a day in my team, and if I don’t do that, I don’t get a bonus.'”
Kindervag says this is an illustration of one of the big problems, not just in AppSec, but in moving to zero trust for the cloud and beyond. Too many organizations simply do not have the right incentive structures to make it happen — and in fact many have perverse incentives that end up encouraging insecure practice.
This is why he’s an advocate for building up zero trust centers of excellence within enterprises that include not just technologists but also business leadership in the planning, design, and ongoing decision-making processes. When these cross-functional teams meet, he says, he’s seen “incentive structures change in real time” when a powerful business executive steps forward to say the organization is going to move in that direction.
“The most successful zero trust initiatives were the ones where business leaders got involved,” Kindervag says. “I had one in a manufacturing company where the executive vice president — one of the top leaders of the company — became a champion for zero trust transformation for the manufacturing environment. That went very smoothly because there were no inhibitors.”
Source: www.darkreading.com