sb-eu logo
Story image

FireMon survey shows hybrid-cloud security woes

28 Feb 2019

FireMon has released the results of its inaugural State of Hybrid Cloud Security Survey which showed that 60% of respondents say cloud business initiatives are accelerating faster than security teams’ ability to secure them.

The survey polled over 400 information security professionals, ranging from operations to c-level, about their practices maintaining network security across hybrid cloud environments. 

The survey aims to shed a light on the challenges security and network professionals face as they expand hybrid cloud initiatives. Key findings:

Cloud business and cloud security misalignment

Only 56% of respondents indicated that network security, security operations or security compliance teams are responsible for cloud security.

In the remaining 44% of cases, IT/cloud teams, application owners or other teams outside the security organisation are responsible for cloud security.

Similarly, the relationship between security and DevOps is inconsistent across organisations, which can impact the consistency of cloud security controls, as more enterprises deploy “as-a-Service” models in the cloud. 

In some cases, DevOps and security are fully aligned and working well together. In other cases, the relationship is difficult or even dysfunctional:

  • 39% of respondents said they are using Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) models concurrently.
  • 30.7% of respondents said they are part of the DevOps team, as part of the emerging DevSecOps trend.
  • However, 30% indicated their relationship with DevOps is either complicated, contentious, not worth mentioning or non-existent.

Existing security tools can’t handle scale and complexity

The survey found that enterprises are inadvertently introducing complexity into their environments by deploying multiple solutions on-premise as well as across multiple private and public clouds. 

That complexity is compounded by a lack of integrated tools and training needed to holistically manage and secure hybrid cloud environments. 

Respondents also cited a lack of integration across tools, and lack of qualified personnel or insufficient training for using the tools, as key roadblocks to achieving cross-environment security management.

  • 59% of respondents use two or more different firewalls in their environment, with 67% also using two or more public cloud platforms.
  • Only 28% of respondents said they were using tools that can work across multiple environments to manage network security.
  • Almost 36% indicated using native tools for each environment or manual process, which means they are managing security in a stand-alone fashion within each component of a hybrid environment.
  • 44.5% of respondents said their top three challenges for securing public cloud environments are: lack of visibility, lack of training and lack of control.

​​​​​​​​​​​​​​Mandate: do more with less

The transition to hybrid cloud environments has dramatically expanded the enterprise attack surface and, subsequently, the range of assets that must be secured, but security resources are not expanding at that same scale. 

Budget and staffing are the key resource constraints cited:

  • 57.5% of respondents indicated that less than 25% of their security budget was dedicated to cloud security.
  • 52% indicated they had security teams of 10 people or fewer.

“The results of our survey are compelling, but not surprising. In large, complex enterprise environments, budget constraints, lack of clarity around which team is responsible for cloud security, and the absence of standards for managing security across hybrid cloud environments are impairing organisations’ ability to secure their cloud business initiatives,” says FireMon technology alliances vice president Tim Woods. 

“This problem will only be solved with a new generation of security technologies and processes that fully integrate with DevOps and provide end-to-end visibility and continuous security and compliance across hybrid environments.”

Woods adds that there is a clear indication that many companies are no longer aligned to any central security policy or security doctrine that provides the necessary security guardrails across their hybrid environments. 

“In the absence of a concise security rule book, where departments are managing their own security controls, they will do so on a best-effort basis,” he says. 

“You can be guaranteed that this opens the door for increased risk. If decentralised security responsibility is the future for cloud-first strategies, and we believe it is, then we must look for a way to reestablish a global security management strategy that aligns business intent, with compliance intent, with security intent.  Security implementations should closely reflect a central security doctrine. Security must be a component of application deployments where both are synchronised to each other.”

Story image
New tech startup looks to help lawyers and finance pros
StructureFlow has launched to market, dubbing itself as a tech startup with the mission of helping lawyers and finance professionals visualise complex legal structures and transactions. More
Story image
DigiCert receives top award from Frost & Sullivan thanks to agile approach
DigiCert has received the 2020 Global Company of the Year Award by Frost & Sullivan, with specific focus on its global transport layer security (TLS) certificate market. More
Story image
Vulnerability discovered in DNS recursive resolvers that can be abused to launch DDoS attacks against any victim
Researchers have discovered a vulnerability in the implementation of DNS recursive resolvers that can be abused to launch disruptive DDoS attacks against any victim.More
Story image
ExtraHop brings SaaS network detection and response solution to market
"Reveal(x) 360 is the culmination of a multi-year R&D investment to secure data centre, remote sites, and cloud workloads with frictionless deployment and actionable insights that can be securely accessed from anywhere.”More
Story image
Current security practices 'grossly inadequate' for protecting cloud infrastructures - report
"As cloud stacks become increasingly complex, with new technologies regularly added to the mix, what's needed is a holistic approach with consistent protection across the full cloud stack."More
Story image
Former AWS executive joins Ping Identity
"Candace has deep expertise in enterprise security strategy and an acute understanding of the innovations that businesses require."More