45 1 A DV I S O R S Critical Security and Compliance Considerations for Hybrid Cloud Deployments J U L 20 1 6 A Report from Custom Research Commissioned by: © 2 0 1 6 4 5 1 R E S E A R C H , L L C | W W W. 4 5 1 R E S E A R C H . C O M ABOUT 451 RESEARCH 451 Research is a preeminent information technology research and advisory company. With a core focus on technology innovation and market disruption, we provide essential insight for leaders of the digital economy. More than 100 analysts and consultants deliver that insight via syndicated research, advisory services and live events to over 1,000 client organizations in North America, Europe and around the world. Founded in 2000 and headquartered in New York, 451 Research is a division of The 451 Group. © 2016 451 Research, LLC and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication, in whole or in part, in any form without prior written permission is forbidden. The terms of use regarding distribution, both internally and externally, shall be governed by the terms laid out in your Service Agreement with 451 Research and/or its Affiliates. The information contained herein has been obtained from sources believed to be reliable. 451 Research disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although 451 Research may discuss legal issues related to the information technology business, 451 Research does not provide legal advice or services and their research should not be construed or used as such. 451 Research shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice. N E W YO R K SAN FRANCISCO LONDON BOSTON 20 West 37th Street 3rd Floor New York, NY 10018 P 212-505-3030 F 212-505-2630 140 Geary Street 9th Floor San Francisco, CA 94108 P 415-989-1555 F 415-989-1558 37-41 Gower Street London, UK WC1E 6HH P +44 (0)20 7299 7765 F +44 (0)20 7299 7799 1 Liberty Square, 5th Floor Boston, MA 02109 P 617-261-0699 F 617-261-0688 © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. II Overview The need for greater business agility and overall cost-containment pressures are the twin-turbo drivers behind the growing adoption of hybrid cloud. But standing in the way of this hybrid cloud migration are very real security and compliance challenges. Leveraging an extensive study by 451 Research, this report examines the current state of hybrid cloud security and compliance. It also recommends effective approaches to clearing a path for broader hybrid cloud deployments – and the business benefits of doing so. EXECUTIVE SUMMARY The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and financial pressures. But a major study by 451 Research reveals that organizations are struggling with the twin challenges of security and compliance in the hybrid cloud space. Organizations want to be able to replicate existing security, governance and compliance audit practices in hybrid cloud environments, where at least some of the cloud infrastructure belongs to third parties. Organizations are struggling with practical considerations in this regard, such as ensuring that workloads are moved securely from one environment to another, without having the data maliciously or inadvertently exposed. To date, these challenges and concerns are not necessarily deal breakers, as organizations continue to move, albeit cautiously, into hybrid cloud environments. But clearly they are doing so with minimal (if any) exposure of truly mission-critical or enterprise data to the hybrid cloud. If the challenges are not addressed, this apprehension will mean that the most important and valuable benefits of hybrid cloud deployments may not be realized. As it turns out, there are a number of steps that most organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud world. These include: a team approach to meeting security challenges; developing a strategy that takes into account the dynamic nature of security threats; and a recognition of the importance of logging to ensure compliance. INTRODUCTION Demand for the hybrid cloud model is unequivocal. As cloud computing has evolved in recent years, organizations have come to realize they need different types of clouds and cloud services to meet different needs. Hence the emergence of hybrid cloud – essentially an infrastructure with links between at least one private cloud and one public or third-party cloud. Ideally these links between clouds are ‘seamless,’ although that can be as much a goal as a reality today. In a recent 451 Research survey of enterprise IT and information security vendors, close to three-quarters of the respondents have already embarked on a hybrid cloud journey – embracing a mix of private, public and managed clouds. While the reasons for this profound shift may vary across organizations, our survey indicates that improved IT operational agility for service delivery requirements and cost efficiencies relative to existing datacenter operations are far and away the most prevalent drivers. However, as organizations embrace hybrid cloud architectures, security and compliance loom large as critical functional requirements that are needed to fully realize the benefits of this IT infrastructure model for service delivery. For those organizations that operate in highly regulated environments or that must contend with a shifting data privacy landscape, security controls for compliance and risk mitigation are primary hurdles to broader hybrid cloud deployments. These two challenges figure more prominently than organizational change and cross-functional expertise for effective hybrid implementation. The point of departure for evaluating hybrid cloud security and compliance is this: Can organizations replicate existing controls (e.g., data security, firewalls and access controls), monitoring and compliance audit processes in a hybrid cloud architecture? If not, are there tools from service providers or other third parties or open-source tools that can compensate? For 47% of survey respondents, the answer here is yes. But the picture becomes more complicated after that. Far fewer respondents – just 9% – require certification from regulating authorities at one end of the spectrum. Others see the need for improved interoperability and specific tools designed for hybrid cloud environments, such as protection and monitoring of the underlying virtualization and containerization layers. © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. III C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S For those already in the process of moving to a multi-cloud model, porting of consistent controls, interoperability and visibility are the hurdles to broader adoption. For compliance purposes, logging and auditing are imperative. Increasingly, data security and access controls fall into focus as organizations assess how they will need to stay aligned with revised data residency requirements. This dynamic is reflected in what IT and information security professionals identify as their primary security challenges for hybrid cloud architectures. They are: • M aintaining consistent access security and authorization controls across execution environments through platform, service provider and existing datacenter tools. • Securing movement of data and workloads across environments through transport security and network firewalls. • Securing data residing and processed in third-party environments through encryption and tokenization. It is critical to note that even as security controls and data protection are major concerns, only in some cases are those concerns viewed as an absolute roadblock to taking the initial steps toward hybrid cloud implementations. In many instances, security and compliance are the most visible hurdles to moving from the current state of adoption to the desired state that fully accommodates business needs. This report provides a definition of the ecosystem and approaches necessary in order to overcome security and compliances challenges in a hybrid cloud infrastructure. © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. IV Table of Contents 1. THE SHIFT TOWARD HYBRID COMPUTING – BUSINESS DRIVERS 1 Figure 1: Business Drivers for Hybrid Cloud �����������������������������������������������������������������������������������������������������������������������������������������������1 COMPLIANCE AND SECURITY: GATEWAYS TO HYBRID CLOUD MATURITY ���������������������������������������������������������������������2 Figure 2: Top Security Challenges by Vertical Market ���������������������������������������������������������������������������������������������������������������������������3 2. THE STATE OF HYBRID CLOUD SECURITY AND COMPLIANCE 4 Figure 3: Current State of Hybrid Cloud Adoption����������������������������������������������������������������������������������������������������������������������������������4 COMPLIANCE – NECESSARY, BUT NOT NECESSARILY IMPERATIVE �����������������������������������������������������������������������������������5 ADDRESSING SECURITY AND COMPLIANCE CONCERNS: PUTTING TOOLS TO WORK �����������������������������������������������6 3. CRITICAL ELEMENTS OF A COMPREHENSIVE HYBRID CLOUD COMPLIANCE AND SECURITY APPROACH 7 CURRENT HYBRID CLOUD SECURITY TOOLS: ADEQUATE, BUT NOT GOOD ENOUGH (YET)�������������������������������������7 Figure 4: Top Hybrid Cloud Security Requirements��������������������������������������������������������������������������������������������������������������������������������7 COMPREHENSIVE HYBRID CLOUD SECURITY: MORE OF THE SAME, BUT MORE COMPLEX��������������������������������������8 EXTENDING SECURITY BEST PRACTICES TO HYBRID CLOUD ARCHITECTURES�������������������������������������������������������������8 Figure 5: Hybrid Cloud Security Approaches���������������������������������������������������������������������������������������������������������������������������������������������9 Satisfying Compliance Requirements Through Centralized Management and Policy Automation���������������������������� 11 Risk Mitigation Through Specific Hybrid Cloud Security Products����������������������������������������������������������������������������������������������� 12 4. BALANCING COMPLIANCE REQUIREMENTS AND RISK MITIGATION WITH THE DEMANDS OF HYBRID CLOUD ADOPTION 14 Figure 6: Migrating Workloads not Covered by Compliance Mandates or Regulatory Requirements ������������������������ 14 INTEROPERABILITY KEY TO HYBRID CLOUD MATURITY ������������������������������������������������������������������������������������������������������ 15 Figure 7: Current Hybrid Cloud Adoption by Organizational Function ������������������������������������������������������������������������������������� 16 © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. V C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S 5. RECOMMENDATIONS 17 HYBRID CLOUD SECURITY: IT TAKES A VILLAGE����������������������������������������������������������������������������������������������������������������������� 17 SECURITY IS MORE OF THE SAME, BUT RISKS ARE NEW ������������������������������������������������������������������������������������������������������ 17 THE ORGANIZATION THAT INTEGRATES TOGETHER, STAYS TOGETHER������������������������������������������������������������������������� 17 IF YOU CAN’T LOG IT, IT DOESN’T EXIST ������������������������������������������������������������������������������������������������������������������������������������� 17 SHARED RESPONSIBILITY DOES NOT MEAN NO RESPONSIBILITY ����������������������������������������������������������������������������������� 18 6. APPENDIX 19 RESEARCH METHODOLOGY ����������������������������������������������������������������������������������������������������������������������������������������������������������� 19 © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. VI 1. The Shift Toward Hybrid Computing – Business Drivers The most prevalent and consistent driver for implementing hybrid cloud architectures identified by end users in our survey and in-depth interviews is ensuring operational agility, with cost reduction a close second (see Figure 1). Of specific note is that the percentage of respondents who pointed to agility as the primary business driver was even higher for some industry verticals such as healthcare (80%), telecommunications (72%) and insurance (83%). These industries are dealing with huge volumes of data spread across massive infrastructures, so leveraging a hybrid cloud strategy makes sense. And each of them are highly regulated industries, with tough security and risk management mandates. Figure 1: Business Drivers for Hybrid Cloud What are the 2 most significant business reasons for evaluating hybrid cloud architectures? Financial services Communications, Media & Services eCommerce Education Energy/Utilities Government Healthcare Insurance Manufacturing Construction Legal Services Retail/Hospitality Technology Telecommunications Transportation Wholesale Trade 0% 20% 40% 60% 80% 100% Cost efficiencies relative to existing datacenter operations Operational flexibility for scaling up/scaling down to address fluctuating compute and service delivery Improved IT operational agility for service delivery requirements Accelerate delivery of applications for the lines of business Enable improvements in continuous integration and deployment processes and resource availability © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 1 C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S The common theme in this report is that hybrid cloud architectures can enable IT to better serve business needs through the use of third-party services in tandem with existing IT investments and environments. Delivering infrastructure – whether it’s hardware, storage capacity, execution environments or applications – at lower cost without the need to manage, maintain and, to some extent, even secure the infrastructure remains a significant consideration, especially for noncompliant workloads. Nonetheless, the dimension where end users see the most value is in terms of accelerating time to delivery of new services and applications – in other words, greater IT agility. Nonetheless, the dimension where end users see the most value is in terms of accelerating time to delivery of new services and applications With hybrid cloud architectures, time to delivery now is expressed in ways that speak directly to business needs – most notably, service delivery acceleration. In this sense, hybrid cloud architectures represent an evolution in the adoption of cloud computing, whether in the form or private clouds to modernize datacenter or public clouds to leverage scale, flexibility and operational cost savings. In fact, related 451 Research surveys indicate that adoption of hybrid cloud computing is motivated specifically by the desire to make IT departments more responsive to the needs of the business. 451 Research surveys indicate that adoption of hybrid cloud computing is motivated specifically by the desire to make IT departments more responsive to the needs of the business. C O M P L I A N C E A N D S EC U R I T Y: G AT E WAYS TO H Y B R I D C LO U D M AT U R I T Y Another significant facet of IT operational agility is enabling the integration of business rules that determine which workloads can run in which environments, while centrally defining a set of policies for workload management. IT decision-makers see agility as having the necessary components to deliver a service or application with a far higher degree of automation and flexibility, with cost, compliance and security as the defining dimensions. In addition, these components no longer need to be running in the same datacenter, or deployed via manual configuration. For example, users have identified the desired ability to easily respond to increased demand for customer-facing services while maintaining service levels at peak demand times through automated provisioning of virtual servers, preconfigured application servers, or even application containers in a dedicated public cloud instance or private cloud. © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 2 C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S Figure 2: Top Security Challenges by Vertical Market Ensuring compliance with regulatory and policy requirements Maintaining consistent network security policies for security domains Maintaining consistent access security and authorization controls across environments - ers and application resources across execution environments Central management of automation and controls for administrator access to management consoles and processes Securing movement of data and workloads across environments Securing data residing and processed in a third-party/hosted environment Containing application instances and resources within a shared/hosted environment 100% 80% 60% 40% 20% Wholesale Trade Transportation Telecommunications Technology Retail/Hospitality Legal Services Construction Manufacturing Insurance Healthcare Government Energy/Utilities Education eCommerce Communications, Media & Services Financial services 0% “We have some cloud services that we are running ourselves in one of our datacenters. We have some cloud services where we use external providers. And really, where they are hosted depends on the underlying application or service.” – CIO, Regional Hospital and Healthcare Network Equally, the use of hybrid cloud means that organizations are not required to provision dedicated hardware for a given product or service. Instead, they can provision on an as-needed basis, and simply scale down when demand has tailed off or a service is phased out. However, to effectively implement a cloud architecture where resources, applications and services are distributed across a hybrid cloud environment, the ability to meet compliance requirements and mitigate risk through security controls will define the bounds of adoption. An important consideration to bear in mind is that even as security and compliance were identified by IT professionals in a related 451 Research survey as the primary challenges for adoption of cloud-enabled technologies, those concerns are not an absolute inhibitor. Cleary, workloads defined as compliant must run in environments certified as meeting regulations – whether Payment Card Industry (PCI) or data privacy requirements. However, a handful of the organizations surveyed already have compliant workloads running in hybrid cloud architectures, and are interested in finding ways of reducing risk to expand hybrid cloud utilization for even more services and applications. ... even as security and compliance were identified by IT professionals in a related 451 Research survey as the primary challenges for adoption of cloud-enabled technologies, those concerns are not an absolute inhibitor. © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 3 2. The State of Hybrid Cloud Security and Compliance Our analysis shows three distinct end-user patterns emerging in terms of cloud security and compliance that can be understood as the cornerstone of a hybrid cloud adoption maturity model: • The first set of end users is still evaluating hybrid cloud architectures because vendor and service provider certifications and controls do not yet satisfy compliance requirements, or because of perceived security risks to data in third-party environments. • The second set of end users views vendor and service provider security, controls and logging as mostly adequate for their current cloud workloads. These users still require additional risk-mitigation measures and more comprehensive logging and auditing to expand deployment and move beyond tactical use cases (such as scaling for peak demand, noncompliant workloads or QA testing). • The third set of end users is moving swiftly toward a hybrid cloud model to support speedier IT service delivery. In order to transition hybrid cloud architecture to the standard operational model, these users see the need for broader cloud service provider and vendor interoperability, tighter controls based on dynamic policy enforcement, cloud event and data interoperability, orchestration and cross-cloud access security. The distribution of respondents within these three buckets suggests a groundswell of hybrid cloud adoption built on private cloud deployments and adoption of SaaS applications. In our survey, 42% of respondents have a hybrid cloud architecture under active evaluation and testing. When we add in those respondents that have a subset of workloads that currently run exclusively in cloud environments, at 23%, and those that have a subset of workloads that currently run in hybrid models, at 20%, survey results point to a majority of organizations actively engaged in initiatives to derive value from hybrid cloud architectures. Figure 3: Current State of Hybrid Cloud Adoption What is the current state of hybrid cloud architecture adoption in your organization? In preliminary investigation 16% 42% 23% 19% Under active evaluation and testing Subset of workloads run exclusively in cloud environments Subset of workloads currently run in hybrid architecture models © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 4 C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S Furthermore, in-depth discussions with IT security professionals suggest that organizations with a hybrid cloud focus have active application development programs. They also have IT operations and information security teams that are engaged in enabling continuous integration and continuous delivery models, as well as microservices architectures. Still, many are looking for baseline interoperability, as we discuss later in this report. In many cases, organizations that are in the early stages of investigating hybrid cloud architectures could be said to be operating a ‘mixed’ environment in that many currently use SaaS offerings of some variety (be it email, financial planning or payroll processing). The dividing line between ‘mixed’ environments and hybrid cloud is the use of public cloud services. Nonetheless, for many organizations, service providers and vendors demonstrating comprehensive security and fully addressing compliance requirements are necessary precursors to adoption of hybrid cloud architectures. As with the initial opposition to SaaS offerings that leverage a shared services model, internal opposition to hybrid cloud at many regulated organizations and risk-averse enterprises is based on concerns about an approach that breaks with existing IT consumption models. The respondents that populate the first bucket described above are by and large highly regulated enterprises or government agencies that require external regulatory approvals before moving ahead with hybrid cloud architectures. However, for some enterprises that deal with a large amount of PCI data, risk mitigation looms large as a hurdle. Assurances from vendors and service providers may eventually assuage those concerns, but it’s the regulators and government agencies that will ultimately have to be persuaded. At this stage, it’s still unclear whether data privacy requirements that emerge in the aftermath of the Safe Harbor repeal will derail the journey to the hybrid cloud, but it seems likely the regulatory environment will shift. C O M P L I A N C E – N EC E S SA RY, B U T N OT N EC E S SA R I LY I M P E R AT I V E For organizations already on the journey to the hybrid cloud, satisfying compliance requirements is generally a necessary precursor to implementation and deployment. For many, preconfigured compliance templates for cloud instances and virtual machines (and eventually containers) are important. Still, the ability to mitigate risk, maintain visibility and enforce consistent controls across environments all figure as prominently as meeting compliance requirements. In particular there are prominent concerns not only about mitigating the risk of moving data outside of the corporate datacenter, but also securing data moving between environments, especially those operated by third parties. For many, preconfigured compliance templates for cloud instances and virtual machines (and eventually containers) are important Many of the hybrid cloud security challenges identified by our survey correspond with long-standing information security concerns. The distinction that emerges, however, is that most see hybrid cloud security as a superset of these traditional concerns. While concerns about data security loom large – as they do in the context of IT infrastructure generally – the challenges that organizations contend with in hybrid cloud environments relate to applying these existing security principles to a new architecture. The challenges also revolve around the movement of data in a highly automated and self-provisioning environment, as well as access to the data in a third-party environment and consistent policy enforcement. Many of the hybrid cloud security challenges identified by our survey correspond with long-standing information security concerns. The distinction that emerges, however, is that most see hybrid cloud security as a superset of these traditional concerns. These concerns are reflected in our survey results, when senior IT security professionals were asked to identify the most significant security challenges with hybrid cloud, as illustrated below. SECURITY CHALLENGES FOR HYBRID CLOUD ARCHITECTURES PERCENTAGE OF RESPONDENTS Maintaining consistent access security and authorization controls across environments 59% Securing movement of data and workloads across environments 55% Securing data residing and processed in a third-party or hosted environment 54% Maintaining consistent network security policies for security domains 49% Ensuring compliance with regulatory and policy requirements 45% © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 5 C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S A D D R E S S I N G S EC U R I T Y A N D C O M P L I A N C E C O N C E R N S : P U T T I N G TO O L S TO W O R K By and large, survey respondents are looking to cloud service providers to address these challenges. And they are turning to existing security vendors to fill the gaps in areas like encryption, access management, key management and network firewalling through products designed to operate in cloud service provider environments or private cloud environments such as OpenStack or Cloud Foundry. Only 8% of respondents indicated that they are not currently making use of cloud service provider security and compliance tools. By contrast, 90% of respondents indicated that they are actively using cloud service provider tools for security and compliance. As one IT professional at a global industrial enterprise pointed out: “None of this stuff is rocket science – it is easy, just follow the rules and process.” WHICH HYBRID CLOUD SECURITY TOOLS ARE CURRENTLY IN USE? PERCENTAGE OF RESPONDENTS Network security, including firewalls and TLS (transport layer security) 75% Data security, including at-rest encryption and cloud HSMs (hardware security modules) 67% Logging, monitoring and auditing of administrative actions (including configuration changes) 64% Access management, including IAM, admin access controls and authentication 58% Implementation of compliance templates 44% © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 6 3. Critical Elements of a Comprehensive Hybrid Cloud Compliance and Security Approach C U R R E N T H Y B R I D C LO U D S EC U R I T Y TO O L S : A D EQ UAT E , B U T N OT G O O D ENOUGH (YET) The point of departure for evaluating hybrid cloud security is essentially this: Can an organization replicate existing controls, monitoring and compliance audit processes in a hybrid cloud architecture? If not, are there service-provider or third-party tools that can compensate? Having established that 90% of survey respondents are making use of cloud service providers’ tools and having identified the ones most widely in use, the obvious follow-up question is: What is the current level of satisfaction with those tools, and do the tools adequately address their security and compliance needs? The answer is revealing: 47% of those using service-provider tools indicate that they comprehensively address security and compliance needs. However, 36% of respondents said the tools only partially address their requirements but are sufficient for their subset of workloads. The market is responding to this demand, with third-party vendors working with systems vendors and cloud service providers to develop a security ecosystem for the hybrid cloud world. These vendors and their partners would do well to listen to the concerns expressed by end users in this study. Figure 4: Top Hybrid Cloud Security Requirements What are the top two requirements you use when evaluating hybrid cloud security capabilities? Financial services Communications, Media & Services eCommerce Education Energy/Utilities Government Healthcare Insurance Manufacturing Construction Legal Services Retail/Hospitality Technology Telecommunications Transportation Wholesale Trade 0% 20% 40% 60% 80% 100% Ability to define and enforce compliance templates Ability to monitor changes to templates and configuration files and generate alerts Ease of integration with existing security policies and controls (such as firewall rules, IAM, data security policies) Ability to isolate security domains in a third-party environment Ability to provide a consolidated view of activity across environments © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 7 C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S C O M P R E H E N S I V E H Y B R I D C LO U D S EC U R I T Y: M O R E O F T H E SA M E , B U T MORE COMPLEX The hybrid cloud security picture becomes more complicated once we move beyond baseline security and compliance tools. Having established that baseline controls can be implemented, and that data can be adequately secured in a thirdparty environment or private cloud, here are the next questions that organizations ask themselves: • Can I adequately log and monitor activity across my hybrid cloud architecture? If not, can I move compliant workloads outside of my four walls? • How do I ensure that workloads are moved securely from one environment to another, without having the data maliciously or inadvertently exposed? For those organizations further down the hybrid cloud journey that are focused on improving their maturity, risk mitigation requires better control of who has access to the underlying infrastructure and a consolidated view of activity in the various environments. ... risk mitigation requires better control of who has access to the underlying infrastructure and a consolidated view of activity in the various environments. These concerns encompass the desire to extend existing security best practices and processes across a hybrid infrastructure where the organization does not directly own or manage the execution environment. The current set of critical security requirements can be grouped into three distinct categories: • Extending security best practices to hybrid cloud architectures • Satisfying compliance requirements through centralized management and policy automation • Risk mitigation through specific hybrid cloud security products (workload segmentation or micro-segmentation, consolidated visibility, administrative controls, etc.) E X T E N D I N G S EC U R I T Y B E ST P R A C T I C E S TO H Y B R I D C LO U D A R C H I T EC T U R E S As you will note in the following tables, we see a remarkable degree of consistency among survey respondents in terms of what are either critical requirements or very important components for ensuring hybrid cloud security and compliance. Almost all respondents recognize that since hybrid cloud architectures by their nature involve the movement of data from one environment to another, securing data in transit as well at rest is critical. Likewise, they view the ability to replicate existing network security rules as practically a prerequisite. The same holds true for access management policies. As we move the scope beyond those foundational requirements, we encounter more diversity in what is deemed critical. Again, we believe this reflects the fact that respondents occupy a range of points on the hybrid cloud maturity model. One growing approach to managing this complexity is called micro-segmentation, which is a method of creating a series of zones by leveraging the underlying virtualization tier, and applying a specific set of policies to the zone based on the attributes of the workloads. We have seen both in this survey and in discussions with IT executives that micro-segmentation is increasingly viewed as a standard building block for hybrid cloud architectures. And as enterprises look to architect for a hybrid-cloud-first model, managing and controlling administrative access to the hypervisor tier and to emerging IT automation tools is quickly becoming a risk concern. The outcome of moving further along the hybrid cloud adoption curve is that logging and auditing (and by extension, consolidated visibility) are not only compliance concerns – they become critical to risk mitigation. The survey data and ongoing 451 Research discussions bear this observation out: the current set of service-provider tools is sufficient to make the initial move to hybrid cloud for many, and third-party tools exist for those enterprises with an interest in going deeper. The next hurdle is ensuring comprehensive risk mitigation that enterprises can implement and maintain with relatively low overhead, and which is more tightly integrated with hybrid cloud environments. © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 8 C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S Figure 5: Hybrid Cloud Security Approaches Extending Security Best Practices to Hybrid Cloud Architectures Data Security - Data in Motion, Data at Rest Network security Integration of existing identity and access management authoritative sources Logging, Auditing and Reporting 0% 20% 40% 60% 80% 100% Satisfying Compliance Requirements through Centralized Management and Policy Automation Enforcement of compliance and regulatory requirements for VMs, workloads 0% 20% 40% 60% 80% 100% 60% 80% 100% Risk Mitigation Through Specific Hybrid Cloud Security Products Enforcement of controls for administrative access at the hypervisor tier Enforcement of role-based access for segmented networks and security domains Centralized definition and enforcement of workload segmentation Consolidated Discovery and Visibility Across Hybrid Environments 0% 5 - Critical requirement 20% 4 - Very important 2 - Somewhat important 40% 3 - Important 1 - Not at all important Data Protection: The protection of data is a core element of information security. This requirement looms even larger when the architecture incorporates third-party elements where the enterprise does not fully control the underlying architecture. The issue of management and access to encryption keys has gained increased visibility as a concern. DATA PROTECTION – SECURING DATA IN MOTION AND DATA AT REST. USERS SHOULD BE ABLE TO IMPLEMENT ENCRYPTION OF THEIR DATA AT REST AND IN MOTION BETWEEN ENVIRONMENTS AND SUBNETS WITHIN A HOSTED CLOUD ENVIRONMENT. IDEALLY, WORKLOADS SHOULD REMAIN ENCRYPTED IF THEY MOVE FROM ONE SECURITY DOMAIN TO ANOTHER. PERCENTAGE OF RESPONDENTS Critical Requirement 53% Very Important 32% Important 11% Somewhat Important 3% REPRESENTATIVE VENDORS • Vormetric (Thales E-Security) • Gemalto SafeNet • Sophos • Trend Micro • HPE Security – Data Security • Bracket Computing © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 9 C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S Infrastructure and Network Protection: Firewall rules and transport security may not be ‘cutting edge,’ but these are critical foundational requirements for both security and compliance, especially as workloads traverse environments or are instantiated in third-party environments. Replicating firewall rules and ACLs will ensure that security controls are consistent across environments. INFRASTRUCTURE & NETWORK PROTECTION – FIREWALL RULES AND POLICIES FOR CLOUD INSTANCES, WORKLOADS AND CUSTOM APPLICATIONS SHOULD BE INSTANTIATED AUTOMATICALLY AS THEY SPIN UP IN A VIRTUALIZED ENVIRONMENT, AND SHOULD BE TIED TO WORKLOAD ATTRIBUTES AND DATA CHARACTERISTICS. IN ADDITION, FIREWALL POLICIES AND RULES SHOULD BE CENTRALLY MANAGED. SECURE CONNECTIONS AND TUNNELING SHOULD ALSO BE SUPPORTED. PERCENTAGE OF RESPONDENTS REPRESENTATIVE VENDORS • Tufin Critical Requirement 39% • AlgoSec • Check Point • Barracuda Very Important 43% • RedSeal • Cisco • CloudPassage Important 14% Somewhat Important 4% • Dome9 • HPE Trend Micro TippingPoint • Palo Alto Networks • HPE Aruba • Cumulo Networks Identity and Access Management: Organizations invest heavily to ensure that appropriate access controls and authorization policies are in place for sensitive systems. The same holds for resources and applications in hybrid cloud architectures – and the value is undermined if new rules must be created or maintaining consistency in access control is overly complex. INTEGRATION OF EXISTING IDENTITY & ACCESS MANAGEMENT AUTHORITATIVE SOURCES – ACCESS CONTROLS FOR WORKLOADS RUNNING IN HYBRID CLOUD DEPLOYMENTS SHOULD RELY ON A SHARED AUTHORITATIVE SOURCE FOR IDENTITY PROFILES, POLICY OBJECTS AND AUTHORIZATION RULES. RATHER THAN HAVE TO CREATE AN IDENTITY SILO FOR EACH ELEMENT OF THE HYBRID CLOUD IMPLEMENTATION, ACCESS POLICIES AND ADMIN PRIVILEGES SHOULD BE BASED ON A COMMON OR CONSOLIDATED AUTHORITATIVE STORE. PERCENTAGE OF RESPONDENTS Critical Requirement 33% Very Important 37% Important 24% REPRESENTATIVE VENDORS • OpenStack KeyStone (Open Source) • AuthO • Okta • OneLogin • Ping Identity • Microsoft Azure AD Somewhat Important 4% • HPE Software • CA Secure Cloud © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 10 C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S Logging, Auditing and Reporting: Compliance mandates and regulatory requirements uniformly require attestation of controls, and many specifically include logging rules. We are seeing an increased focus on logging, auditing and reporting as tools for risk mitigation, and identifying suspicious or anomalous activity. LOGGING, AUDITING & REPORTING – FROM AN OPERATIONAL PERSPECTIVE, LOGGING PROCESSES SHOULD FOLLOW THE WORKLOAD, AND BE IMPLEMENTED CONSISTENTLY ACROSS HYBRID ENVIRONMENTS. LOGGING OF EVENTS GENERATED BY CLOUD WORKLOADS SHOULD BE EASILY CONSUMED BY CENTRALIZED SYSTEMS, AND BE USED AS INPUT FOR BOTH FORENSIC ANALYSIS AND PERFORMANCE. ALSO, FOR COMPLIANCE PURPOSES, REPORTING AND AUDITING OF ALL ACTIVITY SHOULD BE CAPTURED IN A DASHBOARD DESIGNED TO AUTOMATE THE AUDIT PROCESS. Critical Requirement PERCENTAGE OF RESPONDENTS 23% REPRESENTATIVE VENDORS • Spunk • Sumo Logic • Loggly Very Important 45% • LogEntries (Rapid7) • AlertLogic • AWS CloudTrail Important 26% • FluentD (Open Source) • HPE Software Somewhat Important 4% • HPE ArcSight • AlienVault S AT I S F Y I N G C O M P L I A N C E R E Q U I R E M E N T S T H R O U G H C E N T R A L I Z E D M A N A G E M E N T A N D P O L I C Y A U T O M AT I O N Enforcement of Virtual Machine Configuration and Settings: Particularly as issues such as the demise of Safe Harbor come into focus, it is critical to have the ability to ensure that virtual machines and associated workloads are managed based on a predefined set of rules that ensure they cannot move out of a particular IP range, geography or subnet dedicated to compliance workloads. ENFORCEMENT OF COMPLIANCE & REGULATORY REQUIREMENTS FOR VMS, WORKLOADS – AS WORKLOADS MOVE ACROSS AND BETWEEN EXECUTION ENVIRONMENTS AND ARE PROVISIONED, THEY SHOULD BE ASSOCIATED AT INSTANTIATION WITH A SET OF POLICIES (SUCH AS GEOGRAPHIC LOCATION, ACCESS POLICIES, SERVICE CONNECTIVITY AND CONFIGURATION FILES). PERCENTAGE OF RESPONDENTS Critical Requirement 27% Very Important 42% Important 27% REPRESENTATIVE VENDORS • Catbird • Illumio • HyTrust • CloudPassage • OpenStack (Open Source) • AlertLogic • vArmour Somewhat Important 3% • Bracket Computing • HPE Software • Cloud Raxak © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 11 C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S R I S K M I T I G AT I O N T H R O U G H S P E C I F I C H Y B R I D C L O U D S E C U R I T Y P R O D U C T S Hypervisor Administrative Access Controls: As virtualization becomes more of a central element in datacenter architectures, ensuring not only that there are a set of tools in place to constrain how the hypervisor admin account can be accessed, but also that role-based policies are enforced to limit abuse or exploitation, comes into focus as a risk-mitigation measure. ENFORCEMENT OF CONTROLS FOR ADMINISTRATIVE ACCESS AT THE HYPERVISOR TIER – THE VIRTUALIZATION HYPERVISOR IS A CRITICAL COMPONENT OF HYBRID CLOUD IMPLEMENTATIONS. IN ORDER TO EFFECTIVELY LIMIT THE POTENTIAL FOR INSIDER ABUSE AND THWART EXTERNAL ATTACKERS ABUSING ADMINISTRATOR CREDENTIALS TO GAIN ACCESS TO SENSITIVE DATA, ACCESS TO THE HYPERVISOR MUST BE TIGHTLY CONTROLLED. IN ADDITION TO ENFORCING ACCESS CONTROLS, ADMINISTRATORS MUST BE CONSTRAINED BY THEIR ROLE TO A SPECIFIC SET OF EXECUTABLES, WITH VIOLATIONS FLAGGED AND AUDITED. PERCENTAGE OF RESPONDENTS Critical Requirement 27% Very Important 42% Important 27% Somewhat Important 3% REPRESENTATIVE VENDORS • HyTrust • OpenStack • Catbird • Conjur • Xceedium (CA) Enforcement of Role-Based Access for Segmented Network Administration: Many enterprises have implemented methods of insulating their cloud environments from potential access by service provider administrators. Still, there is the challenge of managing access by their own administrators to these new environments in a consolidated manner. ENFORCEMENT OF ROLE-BASED ACCESS FOR SEGMENTED NETWORKS & SECURITY DOMAINS – MOST ENTERPRISES ARE CHALLENGED WITH EFFECTIVE CONTAINMENT OF ADMINISTRATIVE ACCESS WITHIN ON-PREMISES ENVIRONMENTS. THE CHALLENGE IS COMPOUNDED WHEN ADMINISTRATIVE ACCESS PRIVILEGES ARE EXTENDED TO CLOUD ENVIRONMENTS – AND THE RISK OF ACCESS BY CLOUD PROVIDER ADMINISTRATORS, UNINTENTIONALLY OR OTHERWISE, ALSO COMES INTO SCOPE. ADMINISTRATOR ACCESS AND PRIVILEGES SHOULD BE CONSISTENTLY DEFINED BY ROLE AND BY SECURITY DOMAIN, AND UNIFORMLY ENFORCED. PERCENTAGE OF RESPONDENTS REPRESENTATIVE VENDORS • Catbird Critical Requirement 25% Very Important 41% Important 27% Somewhat Important 6% • Xceedium (CA Technologies) • HyTrust • OpenStack (Open Source) • Conjur • Hashicorp Vault (Open Source • Microsoft Azure • HPE Cloud Service Automation © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 12 C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S Centralized Definition and Enforcement of Workload Segmentation: In order to effectively scale in hybrid cloud architectures, satisfy business needs for IT agility, and ensure that consistent security and compliance rules are enforced, enterprises need to maintain a centralized management tool for workload definition and segmentation. In addition to meeting operational needs, the segmentation should also allow for policy settings to be maintained independently of the execution environment. CENTRALIZED DEFINITION & ENFORCEMENT OF WORKLOAD SEGMENTATION – HYBRID CLOUD ARCHITECTURES BY DEFINITION INVOLVE THE USE OF MULTIPLE EXECUTION ENVIRONMENTS. IN ORDER FOR ENFORCEMENT OF CENTRALLY DEFINED SECURITY POLICIES AND COMPLIANCE MANDATES TO REMAIN CONSISTENT, THE SAME SET OF RULES AND CONTROLS SHOULD APPLY REGARDLESS OF EXECUTION ENVIRONMENT. SEGMENTATION OF WORKLOADS ACCORDING TO COMPLIANCE MANDATES (HIPAA, PCI OR DATA RESIDENCY REQUIREMENTS) AND SECURITY POLICIES IS A KEY COMPONENT OF ALIGNING AUTOMATION OF HYBRID CLOUD ENVIRONMENTS WITH SECURITY NEEDS. IDEALLY, WORKLOADS SHOULD REMAIN ENCRYPTED IF THEY MOVE FROM ONE SECURITY DOMAIN TO ANOTHER. AND THERE SHOULD BE SOME PROTECTION OF CONFIGURATION FILES AND SETTINGS. PERCENTAGE OF RESPONDENTS Critical Requirement 52% Very Important 20% Important 28% Somewhat Important 6% REPRESENTATIVE VENDORS • Catbird • Ilumio • vArmour • CloudPassage • vArmour • evident.io (AWS) • RightScale • Bracket Computing Consolidated Discovery and Visibility: In a multi-cloud model, where each element is purposefully designed for automated provisioning, an obvious operational concern and governance risk is that resources and workloads can proliferate. The security concern is that some enterprise assets may be outside of existing monitoring programs or even policies. CONSOLIDATED DISCOVERY & VISIBILITY ACROSS HYBRID ENVIRONMENTS – IN MUCH THE SAME WAY THAT INITIAL ADOPTION OF VIRTUALIZED DATACENTERS LED TO VIRTUAL SPRAWL, ONE OF THE GOVERNANCE CHALLENGES POSED BY HYBRID CLOUD ENVIRONMENTS IS THE RISK THAT WORKLOADS, VIRTUAL MACHINE IMAGE CONFIGURATIONS AND ASSOCIATED RESOURCES ARE NOT VISIBLE TO A CENTRALIZED MANAGEMENT FRAMEWORK. DISCOVERY AND MONITORING OF RESOURCES ACROSS THE HYBRID DEPLOYMENT ARE CRITICAL TO GOVERNANCE – SINCE ADMINISTRATORS CANNOT CONTROL WHAT THEY CANNOT SEE. PERCENTAGE OF RESPONDENTS Critical Requirement 22% Very Important 43% Important 28% Somewhat Important 6% REPRESENTATIVE VENDORS • Catbird • Illumio • vArmour All of the concerns examined above encompass the desire to extend existing security best practices and processes across a hybrid infrastructure where the organization does not directly own or manage the execution environment. © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 13 4. Balancing Compliance Requirements and Risk Mitigation with the Demands of Hybrid Cloud Adoption “The security model doesn’t change just because you’re going on cloud. But unless you have interoperability, you are better off keeping everything in a private cloud deployment.” – IT Executive, Global Financial Services Enterprise As we’ve noted throughout this report, the current spectrum of hybrid cloud adoption maturity ranges from ‘in a holding pattern until approved by government regulators’ to ‘need for interoperability to better orchestrate and secure a multi-cloud model.‘ A full two-thirds of survey respondents feel the full spectrum of their organizations’ security and compliance requirements are more complex than what is offered by the current tools from cloud service providers. Although this might seem to run contrary to the response from the nearly half of participants who indicated the tools available from service providers meet the requirements for current workloads, this question was aimed at understanding the extent to which organizations might be comfortable moving all of their workloads into a hybrid architecture. A full two-thirds of survey respondents feel the full spectrum of their organizations’ security and compliance requirements are more complex than what is offered by the current tools from cloud service providers. In this context, only one-third of respondents feel that third-party tools are completely adequate for their organizational security and compliance requirements. The implication here is that across the hybrid cloud adoption maturity model – and even for those with a strategic thrust toward hybrid cloud adoption – there is still plenty of room for improvement in terms of vendor and provider security and compliance. However, the overwhelming response to the question by those who see their requirements as more complex is that they still anticipate migrating workloads that are not covered by compliance mandates or regulatory requirements into hybrid cloud architectures. The overall positive response to the question was 88%, with respondents from verticals such as technology (at 95%) and retail/hospitality at 92%. (see Figure 6).What’s more, across the board we see a trend toward getting more production workloads into hybrid cloud environments. Figure 6: Migrating Workloads not Covered by Compliance Mandates or Regulatory Requirements Do you still anticipate migrating workloads that are not covered by compliance mandates or regulatory requirements to the cloud service provider’s environment? Financial Services Communications, Media & Services eCommerce Education Energy/Utilities Government Healthcare Insurance Manufacturing Retail/Hospitality Technology Telecommunications Transportation Wholesale Trade Construction Legal Services 87% 8% 5% 100% 100% 100% 100% 70% 20% 89% 100% 71% 21% 92% 95% 88% 100% 100% 10% 9% 3% 7% 8% 5% 13% 0% 0% Yes No Don’t know © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 14 C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S It’s important to note that compliance requirements are generally imposed on organizations, while risk is more of a subjective metric that takes into account multiple aspects, such as the sensitivity and value of the data, the likelihood of a successful attack, and the appetite for additional security controls. However, security controls are integral to addressing compliance requirements. And as the responses above indicate, security and compliance are not always absolute inhibitors to adoption, but they certainly represent obstacles to further adoption. In both instances, control and visibility are crucial, especially as automation and integration across multiple clouds come into focus. Without the existence of controls to address both compliance requirements and security measures – whether in the form of workload or micro-segmentation, access controls, administrative segregation of duties, change monitoring of configuration files, etc. – organizations cannot maintain visibility into their environments. There exists a subset of end users, especially in the government sector, who will need very specific guidance from regulators to enable them to move to a hybrid cloud model. But for those organizations that have already moved and have already looked at hybrid cloud more strategically, interoperability comes up time and again as an issue. Equally, the ability to centrally define policies and configurations such as where a workload can run and how data is secured – with those policies and configuration files easily consumed by control points and provisioning systems in the target cloud environment – is critical to advancing hybrid cloud maturity. I N T E R O P E R A B I L I T Y K E Y TO H Y B R I D C LO U D M AT U R I T Y While many organizations are comfortable with moving non-compliant or non-business-critical workloads into a hybrid cloud architecture, they are not satisfied with the extensibility of the current set of service provider tools. Some 69% of respondents indicated that they have concerns about the extensibility of cloud service provider security tools, and of those respondents, 74% reported that they perceive the lack of extensible security and governance tools to be a hurdle to broader adoption. Extensibility and interoperability go hand in hand, since in theory they would rely on a common set of conventions for integrations and event descriptions. “I think the key element for hybrid cloud technology and service providers is that they need to understand two things. One is interoperability between vendors. Second is ability to seamlessly integrate with the existing systems using a non-proprietary solution. So it may not always be that operationally efficient, but at least you have a starting point.” – IT Executive, Global Manufacturing Company Interoperability is key to expanding adoption for a number of reasons. First, organizations want to have a choice in private and public cloud providers. And they want to be able to maintain a consistent set of security settings and policies when moving workloads dynamically between public and private cloud environments. For those moving to a more highly automated model (because of trends like microservices architectures or DevOps), there is a need to define compliance templates and ‘golden images‘ of configuration files that will be consistently deployed and provisioned across execution environments. But from a risk management and mitigation perspective, our in-depth discussions with IT and information security professionals indicate a strong desire for consolidated visibility. For information security professionals, visibility is key to monitoring activity and ultimately identifying anomalous behavior, which assumes even more importance when both the environments and identities (user, administrator, service or virtual machine) proliferate in hybrid cloud architectures. In addition, demonstrating adequate controls and maintaining logs to satisfy compliance requirements is labor-intensive in the absence of a consolidated repository and aggregated event feed. At a minimum, information security professionals are looking for an event feed from hybrid cloud environments to a central repository, progressing to full-event details and metadata fed into a central repository, and eventually real-time feeds into an event management system. Similarly, for IT operations, visibility is key to identifying service delivery issues. Without some starting point, troubleshooting and performance management across events can be a laborious, time-consuming and circuitous process. As with the initial stages of SaaS adoption, IT operations professionals are concerned that without broad visibility across event types, identifying a root cause can devolve into a blame game. © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 15 C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S Likewise, interoperability is critical to the utility of tools employed to enforce workload and micro-segmentation, for both compliance and security reasons. Particularly in light of impending changes to EU data privacy regulations with the demise of Safe Harbor, the concern for many IT professionals is that network configurations and policy rules will not be easily ported from one environment to another. This can potentially undermine the value proposition that hybrid cloud architecture promises for service delivery acceleration. The Safe Harbor Privacy provision allowed for US companies to store and process data covered by EU data protection and privacy regulations, if they adhered to a set of seven principles in their operations. On account of concerns that US-domiciled companies would be subject to federal surveillance efforts or blind subpoenas, the EU’s highest court has invalidated the Safe Harbor framework – and in doing so, generated uncertainty whether US cloud providers can store or process data from EU citizens or companies. Finally, interoperability facilitates an API-centric approach to integration across environments – whether for identity assertions or for event data. The enthusiasm for an integration tier with standard APIs is probably only matched by the enthusiasm for a real-time event feed from hybrid cloud architectures. Figure 7: Current Hybrid Cloud Adoption by Organizational Function What is the current state of hybrid cloud architecture adoption in your organization? A cross-functional team with members from different parts of the IT (software delivery, information security, risk and compliance, network security, data management) organization A distinct team or group tasked with hybrid cloud security Part of the information security function Part of the IT operations function Part of the networks function Part of our business operations (outside of IT) Group or team 0% In preliminary investigation 10% 20% 30% 40% 50% 60% Under active evaluation and testing Subset of workloads run exclusively in cloud environments Subset of workloads currently run in hybrid architecture models © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 16 5. Recommendations H Y B R I D C LO U D S EC U R I T Y: I T TA K E S A V I L L A G E The consistent characteristic we have identified among organizations that are further along the hybrid cloud architecture maturity model (based on a specific set of business requirements) is that they have assembled a cross-functional team to define, enforce and monitor the security posture of hybrid cloud environments. This cross-functional team generally includes members from different parts of the IT organization, such as software delivery, information security, risk and compliance, network security and data management. Information security will also generally lead the team. This type of team is critical because hybrid cloud architectures by necessity break down operational silos, and any decisions on acceptable security risks or satisfying compliance mandates should be made in the context of the business need and the operational impact. This cross-functional team generally includes members from different parts of the IT organization, such as software delivery, information security, risk and compliance, network security and data management. Information security will also generally lead the team. S EC U R I T Y I S M O R E O F T H E SA M E , B U T R I S KS A R E N E W The need to maintain control, protect information and ensure visibility to identify threats or security incidents remains the same. And, for many organizations, securing data in a third-party environment is a well-understood challenge. The challenge becomes extending controls across multiple environments in a consistent fashion. In addition, there is a need to manage administrative identities, and to ensure that third-party administrators have the appropriate level of privileges (and that these are enforced). Ideally, customers would be able to monitor and flag changes to configuration files as well as modifications to firewall or DNS settings that could point to the staging of an attack. This is where workload and micro-segmentation comes into play. For those ahead of the adoption curve, workload segmentation (and hypervisor administrative access controls) are foundational security elements, as is federated identity across multiple cloud environments. The challenge is to push your cloud vendors to make the consumption of enterprise security and compliance policies seamless for their environment, and enable micro-segmentation. T H E O R G A N I Z AT I O N T H AT I N T EG R AT E S TO G E T H E R, STAYS TO G E T H E R In our research, the preference from information security and IT operations professionals was overwhelming for an API-driven approach or an overlay that securely exposes onpremises resources through an integration tier. Part of the interest in an integration tier is that, as one IT executive at a global manufacturing company pointed out, “It gets everyone on the same page.” The integration tier serves to compel different IT and information security constituencies to agree on common conventions, as well as data formats and descriptions. For at least a quarter of survey respondents, ease of federation of access and authentication tokens (for machines and services, as well as human identities) was a critical requirement. The integration tier serves to compel different IT and information security constituencies to agree on common conventions, as well as data formats and descriptions I F YO U C A N ’ T LO G I T, I T D O E S N ’ T E X I ST This maxim holds true for security events, compliance logs and system events. Without consolidated visibility across the hybrid cloud environment through aggregated event feeds, information security will inevitably have to contend with blind spots. And if controls are put in place for compliance mandates such as access control or monitoring, attestation is a challenging process. The implication here is that controls should first be in place in order to generate events and logs. As we have noted elsewhere in this report, the same controls that are in place should be duplicated in a hybrid cloud architecture. However, because of the need to maintain segmented networks and ensure that only servers with the appropriate configuration files and associated policies are spun up in hybrid cloud architectures, additional layers of controls are needed at the hypervisor tier. © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 17 C R I T I C A L S E C U R I T Y A N D C O M P L I A N C E C O N S I D E R AT I O N S F O R H Y B R I D C L O U D D E P L O Y M E N T S S H A R E D R E S P O N S I B I L I T Y D O E S N OT M E A N N O R E S P O N S I B I L I T Y A critical first step in migrating to a hybrid cloud architecture is conducting a risk assessment. Ideally, the next step is to perform a security assessment to determine which workloads are appropriate for a hybrid cloud environment. The shared responsibility model that is implicit in cloud computing becomes a more significant consideration the further down the hybrid cloud path that organizations progress. The challenge is to define risk in the context of the shared responsibility – not just between providers, but also internal IT constituencies, so as to establish risk and assign accountability. © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 18 6. Appendix R E S E A R C H M E T H O D O LO GY To produce this report, 451 Research followed a three-phase process. Phase 1 – 451 Research audited existing proprietary and syndicated research for insights into hybrid cloud security practices. This audit, along with input from our analysts, created the basis for our field research in Phases 2 and 3. Phase 2 – A Web-based survey of 250 North American IT executives with purchase authority or purchase influence for cloud security technologies in enterprise (>5,000 employees) businesses. Respondents were sourced from 451 Research’s commentator network of 25,000 IT executives worldwide and other lists. Phase 2 provided the quantitative data cited in this report. Phase 3 – In-depth interviews with 15 North American IT executives. 451 analysts then conducted 15 hour-long interviews with the target audience, in order to validate some of the data collected in Phase 2, and to provide context to the findings and analysis. Phase 3 yielded the in-depth insights, recommendations and verbatim quotes for this report. Fielding of Phases 2 and 3 took place during the months of October and November, 2015. All responses were anonymized, and 20 different vertical markets were represented. © C O PY R I G H T 2 0 1 6 4 5 1 R E S E A R C H . A L L R I G H T S R E S E RV E D. 19
© Copyright 2026 Paperzz