Who’s afraid of the Big Bad Cloud? Part 2 Cloud & Security
The Cloud is becoming increasingly important to companies. It offers the promise of greater agility and a significantly shortened Time To Market. In an increasingly competitive world where Time to Market is a key success factor, it is mainly this perspective that motivates decision-makers to move towards the Cloud.
However, to take full advantage of the benefits of the Cloud and achieve a genuinely increased agility, transforming infrastructure management processes and project organisation is essential.
Indeed, it is not the technologies but the processes that are essentially responsible for the lack of agility and in particular the separation between the design teams in charge of application development and the production teams responsible for infrastructure provision and management.
Hence, to render projects more agile and shorten cycles, it is necessary to increase the autonomy of project teams and allow them to create and manage the infrastructures of their environments (Development, Integration, Validation).
For real agility, project environments must therefore be managed by development teams, which allows the genuine implementation of a DevOps approach. We must therefore switch from a ‘Request/Response’ mode to a ’Do it yourself’ mode.
Likewise, prototyping or ephemeral environments can be directly created as part of initiatives managed at the level of business teams (Marketing Campaign, Modelling, etc.), thus promoting innovation.
The distribution of infrastructure management responsibilities across all development teams has a strong impact on the implementation of safety. Indeed, it becomes necessary to compartmentalise the environments of each project strongly to prevent a team from impacting the resources of another team by mistake or deliberately.
In concrete terms, this need for strong compartmentalisation leads to the creation of different Cloud accounts per environment and per project, and in particular to the separation of production and non-production accounts, rapidly leading to the creation of tens or even hundreds of Cloud accounts in the case of large organisations.
In the first part of this article, I referred to the need for controlling and supervising the security measures implemented in Cloud infrastructures to detect and eliminate non-compliance as early as possible and ensure that security and compliance rules are respected.
The large-scale deployment of Cloud environments across hundreds of accounts makes it necessary to automate these controls and apply them in real time.
To achieve this, a Continuous Compliance approach based on the following principles should be used:
- Implementation of security policies defining authorised actions for each profile: definition of authorisations for each role (developer, integrator, tester, Data Scientist, administrator, etc.) with a least privilege principle.
- Event-based deployment of control rules activated in real time during the creation, modification, deletion of a resource.
- Periodic analysis of the configurations to detect deviations from the defined rules.
- Traceability: collection and centralisation of all logs generated by API calls from the Cloud platform.
- Network security
- Identity and access management
- Data protection
- Data leakage prevention
- Traceability and auditing
- Level 1 – Public data: no special protection measures are required
- Level 2 – Internal data: this data must be accessible only to authorised persons
- Level 3 – Sensitive data: this data must be subject to enhanced protection measures. It is generally encrypted and access to it is systematically traced
- Level 4 – Secret data: This data is systematically encrypted and accessible only by a very limited number of people within the company. They are usually stored in separate areas with marked access and enhanced security measures.