Security News > 2020 > March > Cloud-native security considerations for critical enterprise workloads

"Public clouds are, by and large, homogeneous infrastructures with embedded monitoring capabilities that are ubiquitous and have centralized security administration and threat remediation tools built on top," Konstantas told Help Net Security.
"Automation really is central to effective cloud security. Just take the example of data and consider the volume of data flowing into cloud hosted data bases and data warehouses. Classifying the data, identifying PII, PHI, credit cards etc., flagging overly permissioned access, and requiring additional authorization for data removal - all these things have to be automated. Even the remediation, or prevention of access needs to be automated," she noted.
Without a doubt, the public cloud has proven a worthy alternative to private data centers by offering high resilience to threats and rapid security incident recovery.
What cost savings will be incurred on security spend by adopting built-in cloud security?
"If the CISO is working with a cloud security provider that understands critical enterprise workloads, they will have ample support and guidance in preparing and documenting these answers because enterprise-focused CSPs have deep experience with the specific requirements of global companies, complex enterprise applications and data residency and sovereignty requirements. Enterprise-focused CSPs staff teams ready to share those insights and furnish the proof points customers require," she concluded.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/frslKenMG7c/
Related news
- The ongoing evolution of the CIS Critical Security Controls (source)
- How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal? (source)
- Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution (source)
- Watch Out For These 8 Cloud Security Shifts in 2025 (source)
- Don't Overlook These 6 Critical Okta Security Configurations (source)
- How CISOs can balance security and business agility in the cloud (source)
- Balancing cloud security with performance and availability (source)