Cloud computing tools: Improving security through visibility and automation

Current management tools ease (but certainly don't end) cloud security jitters

Many enterprises are reluctant to move critical cloud applications out of their own data centers and into the public cloud due to security concerns. Yet the same automated, consistent provisioning that is essential to managing either public or private clouds (as well as to the process of thinking through a cloud deployment) can also offer the fringe benefit of improving security.

Of course, not all cloud management tools work equally well with all cloud providers, nor do they all allow customers to manage their internal and external clouds as a single unit. Infrastructure-as-a-service (IaaS) providers such as Amazon, for example, typically don't allow customers to tweak the network and storage infrastructure beneath the operating system, forcing customers to trust that level of security to the vendor.

And while some customers will trust outside certifications, such as Amazon Web Services' Level 1 compliance with PCI DSS, others will choose to stick with a private cloud within their own firewalls, or create cloud environments at an external site using their own networks and keeping storage under their control.

[Also read SaaS, PaaS and IaaS: A security checklist for clouds]

Furthermore, compared to internal IT infrastructures, the public cloud requires more attention to components such as network firewalls, load balancers and network address translation to hide the public IP addresses most cloud providers assign to servers. But whatever the model, the automated, consistent processes required for large-scale cloud deployments not only increase the efficiency, reliability and performance of these environments, but also improve security.

Benefits of Thinking It Through

With physical servers, staging and setup is a manual, one-off job; however, with virtual machines (VMs), creating templates or policies for various types of servers forces organizations to "think about it more and plan for it," says Matt Conway, CTO of online backup vendor Backupify. "If you need to recreate [a type of server] quickly, you must script it and automate it."

And while conventional servers often run multiple types of software to provide different services, organizations often give VMs in cloud environments much more specialized personalities to perform specific tasks, says Patrick Kerpan, president and CTO of cloud management vendor CohesiveFT.

Standardizing these templates, he says, "is a security bonus because, to the average enterprise, anything that causes a change control ticket is a security risk."

Going through the process of deciding whether to host a particular application or service in the cloud and, if so, in what type of cloud, forces organizations to assess the value of an application or service. The resulting deployment decisions can improve those systems' reliability, uptime and efficiency, as well as their security, says Lilac Schoenbeck, a senior manager in cloud computing marketing at management software vendor BMC.

Much More on Cloud Security

However, "security [staff are] often not invited to the cloud architecture discussion soon enough," she says, out of fear that their caution will block cloud adoption.

Organizations that use internal service catalogs or identity-management systems to control which users can access which applications can reuse much of that work to secure the cloud, says Andi Mann, vice president of strategy at software vendor CA. Enabling an end user to access cloud services, he says, requires some level of understanding of who they are and what they are allowed to do. Without a service catalog, "you're doing a lot of manual processing" to understand which cloud applications employees are using.

1 2 Page 1
Page 1 of 2
SUBSCRIBE! Get the best of CSO delivered to your email inbox.