Cloud Security, Identity
Why posture alone isn’t enough for cloud security

(Credit: Getty Images)
Posture management tools have drastically improved the way security teams can secure workloads in the cloud.Cloud security posture management (CSPM) vendors put guardrails in place that help ensure their resources are deployed and configured in a compliant manner. Historically, compliance quickly becomes the primary driver as the first wave of security priorities in an environment. However, cloud infrastructure security has largely been looked at through the lens of posture — detecting drift as resources become misconfigured. While it’s helpful, these “point in time” solutions haven't adapted well to the tactics, techniques, and procedures (TTPs) of modern threat actors.Think about protecting the cloud like protecting a home with an alarm and security system. The system gets designed to protect the primary entry paths into the home. It will warn the homeowner if a door is unlocked, if the garage door has been moved up, or if a window has been opened. In many cases it’s enough to adequately deter a burglar from trying to break in. If someone does try to access the inside of the house, an alarm goes off and police are automatically called.But what if the burglar had a key to the front door? They can walk up to the porch, put the key in the lock, open the door and come right in. They open the door, and the system gives them a welcoming ring. The home security system does not only let that burglar into the house, but it's likely going to have no idea what rooms they went into, what they stole or what they broke. CSPMs offer similar security guarantees for cloud environments. They’re going to ensure the organization doesn’t expose S3 buckets to the public and corporate resources aren’t misconfigured. But these point in time snapshots of the environment simply aren’t enough to prevent threat actors from gaining access to an environment. Run-time visibility and detection in the cloud continues to evade most security teams, and the tools and tricks that worked in the on-prem world aren’t as effective in the cloud.Keep a continuous and comprehensive inventory of identities and categorize the risk based on blast radius. Monitor privileges used versus granted for all users (human/machine/vendor) to have a clear delineation between which identities are overprivileged and which are compliant with least privilege. Baseline the activity for identities in the environment. Once the team understands normal behavior, it becomes easier to detect abnormalities when user behavior deviates from that baseline. By focusing on continuous monitoring of identities, organizations can achieve the visibility they’ll need to better secure their networks. Think of CSPM as a good first step, but organizations need a much more comprehensive approach to stay secure.Paul Nguyen, co-founder, co-CEO, Permiso
An In-Depth Guide to Cloud Security
Get essential knowledge and practical strategies to fortify your cloud security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds