Organization use cloud-native security controls, but they really want central management for cloud security across heterogeneous clouds Credit: Getty Images In a recent research survey, my employer ESG asked a panel of 232 security and IT professionals a series of questions about cloud-native security (i.e. security controls, management, and monitoring options built into cloud infrastructure and offered by cloud service providers). Here are a few of the data points we uncovered:Fifty-seven percent of survey respondents believe that the native security controls provided by cloud service providers (CSPs) are sufficient in some but not all cases. In other words, cloud-native security controls must be supplemented with third-party enhancements occasionally or even regularly. This speak to a need for cloud security managers of managers – especially in enterprise organizations with multi-cloud environments.It appears that survey respondents see a master/slave relationship for cloud services and related cloud security controls. More than half (56%) of cybersecurity and IT professionals believe that security controls provided by a CSP should also support other IaaS/PaaS environments. So, if 75% of my cloud workloads reside on AWS and 25% reside on Azure and GCP, I probably want to control all cloud-resident security controls through an AWS interface rather than control each security domain separately.Not surprisingly, 38% of those surveyed say that the use of multiple CSPs tends to require some third-party security controls for central policy and configuration management of distributed (and heterogeneous) cloud-native security controls. Once again, a manager of managers.When asked to identify areas where cloud-native security controls need improvement, 32% say network intrusion detection/prevention, 32% say data loss prevention, and 31% say data encryption. Yes, many CSPs can provide controls in these areas but security professionals find these offerings limited and tend to opt for third-party controls with superior feature/functionality.My takeaway is that cloud-native security controls are often used as a matter of convenience and probably good enough for organizations betting on a single CSP. This may characterize mid-market organizations, but it is a mismatch for enterprises. Thus, enterprises will continue to anchor cloud security with third-party security management tools for the foreseeable future.One final note on cloud-native security. My esteemed colleague and cloud security guru Doug Cahill and I wanted to put a stake in the ground and find out which of the CSPs is considered the most secure. According to survey respondents, (drumroll please) it’s Microsoft Azure. This may be related to IT history – large organizations have years of experience with Microsoft security infrastructure like Active Directory, and Azure security does a good job of emulating the existing Windows server security model. Hmm, perhaps Bill Gate’s trustworthy computing email (January 2002) could ultimately result in the most trustworthy cloud computing service, giving Microsoft a pretty significant market advantage. Funny how things change. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe