Story image

FireMon survey shows hybrid-cloud security woes

28 Feb 2019

FireMon has released the results of its inaugural State of Hybrid Cloud Security Survey which showed that 60% of respondents say cloud business initiatives are accelerating faster than security teams’ ability to secure them.

The survey polled over 400 information security professionals, ranging from operations to c-level, about their practices maintaining network security across hybrid cloud environments. 

The survey aims to shed a light on the challenges security and network professionals face as they expand hybrid cloud initiatives. Key findings:

Cloud business and cloud security misalignment

Only 56% of respondents indicated that network security, security operations or security compliance teams are responsible for cloud security.

In the remaining 44% of cases, IT/cloud teams, application owners or other teams outside the security organisation are responsible for cloud security.

Similarly, the relationship between security and DevOps is inconsistent across organisations, which can impact the consistency of cloud security controls, as more enterprises deploy “as-a-Service” models in the cloud. 

In some cases, DevOps and security are fully aligned and working well together. In other cases, the relationship is difficult or even dysfunctional:

  • 39% of respondents said they are using Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) models concurrently.
  • 30.7% of respondents said they are part of the DevOps team, as part of the emerging DevSecOps trend.
  • However, 30% indicated their relationship with DevOps is either complicated, contentious, not worth mentioning or non-existent.

Existing security tools can’t handle scale and complexity

The survey found that enterprises are inadvertently introducing complexity into their environments by deploying multiple solutions on-premise as well as across multiple private and public clouds. 

That complexity is compounded by a lack of integrated tools and training needed to holistically manage and secure hybrid cloud environments. 

Respondents also cited a lack of integration across tools, and lack of qualified personnel or insufficient training for using the tools, as key roadblocks to achieving cross-environment security management.

  • 59% of respondents use two or more different firewalls in their environment, with 67% also using two or more public cloud platforms.
  • Only 28% of respondents said they were using tools that can work across multiple environments to manage network security.
  • Almost 36% indicated using native tools for each environment or manual process, which means they are managing security in a stand-alone fashion within each component of a hybrid environment.
  • 44.5% of respondents said their top three challenges for securing public cloud environments are: lack of visibility, lack of training and lack of control.

​​​​​​​​​​​​​​Mandate: do more with less

The transition to hybrid cloud environments has dramatically expanded the enterprise attack surface and, subsequently, the range of assets that must be secured, but security resources are not expanding at that same scale. 

Budget and staffing are the key resource constraints cited:

  • 57.5% of respondents indicated that less than 25% of their security budget was dedicated to cloud security.
  • 52% indicated they had security teams of 10 people or fewer.

“The results of our survey are compelling, but not surprising. In large, complex enterprise environments, budget constraints, lack of clarity around which team is responsible for cloud security, and the absence of standards for managing security across hybrid cloud environments are impairing organisations’ ability to secure their cloud business initiatives,” says FireMon technology alliances vice president Tim Woods. 

“This problem will only be solved with a new generation of security technologies and processes that fully integrate with DevOps and provide end-to-end visibility and continuous security and compliance across hybrid environments.”

Woods adds that there is a clear indication that many companies are no longer aligned to any central security policy or security doctrine that provides the necessary security guardrails across their hybrid environments. 

“In the absence of a concise security rule book, where departments are managing their own security controls, they will do so on a best-effort basis,” he says. 

“You can be guaranteed that this opens the door for increased risk. If decentralised security responsibility is the future for cloud-first strategies, and we believe it is, then we must look for a way to reestablish a global security management strategy that aligns business intent, with compliance intent, with security intent.  Security implementations should closely reflect a central security doctrine. Security must be a component of application deployments where both are synchronised to each other.”

Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.
One Identity named Leader in PAM and IAM by KuppingerCole
KuppingerCole lead analyst Anmol Singh evaluated the strengths and weaknesses of 20 solution providers in the PAM market for the report.
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.