• Latest
  • Trending
Protecting Data in the Cloud: A Work in Progress

Protecting Data in the Cloud: A Work in Progress

January 20, 2022
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Thursday, 19 June, 2025
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Protecting Data in the Cloud: A Work in Progress

by ITECHNEWS
January 20, 2022
in Leading Stories, Opinion
0 0
0
Protecting Data in the Cloud: A Work in Progress

YOU MAY ALSO LIKE

ATC Ghana supports Girls-In-ICT Program

Vice President Dr. Bawumia inaugurates ICT Hub

Throughout its history, the tech industry has had to deal with constant change, increasingly complex architectures and security challenges. Security is a particularly deep well of concepts to navigate. One offshoot of this is acronym fatigue, a never-ending, ever-changing mishmash of insider terms that are intended to define markets. The advent of cloud has taken this issue to an entirely new level.

Protect Data and Reduce Risk

Software-as-a-Service (SaaS) took off. Cloud access security broker (CASB) is one of the latest buzzword terms to know. Early CASBs started as shadow IT scans, marketed to help reduce risk and meet compliance requirements. Pretty quickly, CASB products were marketed and promoted because of their ability to protect data and control access to heavily used SaaS environments like Office 365, Google Workspace, Box, Salesforce, etc. They did that by applying another acronym, data loss prevention (DLP), to classify and track sensitive data in these environments. It made sense, after all, as protecting valuable confidential data is the primary reason why organizations need security for these systems.

Pros and Cons of Proxies

The most popular CASB architecture relies on APIs to perform DLP and access control functions because it is not inline and it doesn’t require agents. CASBs control inline access to SaaS by using proxies. There are two types of proxies, each with their own pros and cons: Forward proxy (FP) and reverse proxy (RP). FP offers more protection but requires agents installed on the endpoint. RP doesn’t require agents but also offers more limited security. Needless to say, most organizations choose the options that do not require agents.

Cloud-Native Application Protection Platform

Today, infrastructure-as-a-service (IaaS) is on the rise and cloud-native application protection platform (CNAPP) is the newest popular security category (and buzz-worthy acronym). CNAPP is an integrated architecture for securing the cloud-native application ecosystem intended to replace both cloud security posture management (CSPM) and cloud workload protection platforms (CWPP), among other systems. Got that? CNAPP today looks a bit like early CASB in that it is focused on scanning, risk analysis of vulnerabilities and misconfigurations and reporting findings in the context of compliance. This is great, but it’s not enough.

Security is Missing the Mark

What really matters is delivering better security in cloud-native environments. Unfortunately, security is missing the mark. Cloud-based data breaches dominate the news with breaches like that of Twitch and The Telegraph newspaper in October 2021 and Robinhood in November 2021 reporting significant data losses, for example. IDC reported last year that 80% of organizations in the cloud had experienced a data breach within the preceding 18 months.

Why Does This Keep Happening?

IaaS security products often talk about protecting data, but they don’t really do that directly. This is because the alphabet soup of acronym products applied to protecting applications and data in IaaS environments are not yet connecting the dots to DLP. Runtime controls to block access or control network traffic require agents (which few people want to deal with) instead of using APIs.

What’s the Answer?

IaaS environments with cloud-native applications that contain valuable data require DLP and runtime controls using agentless methods just as SaaS environments do. The question is, will CNAPPs evolve like CASBs did to add agentless DLP and runtime controls? Or will they be replaced with something else—perhaps another acronym—that will solve this still-unsolved problem?

How is it that in 2021, data is floating around in numerous cloud providers, but it feels like most enterprises, even those with great resources, are largely flying blind? SaaS and CASB gave us a model to follow for IaaS and CNAPP. We know what to do—it’s time to do it.

 

Source: Mitthan Meena
Via: Security Boulevard
Tags: Protecting Data in the Cloud
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023

Recent News

  • ATC Ghana supports Girls-In-ICT Program April 25, 2023
  • Vice President Dr. Bawumia inaugurates ICT Hub April 2, 2023
  • Co-Creation Hub’s edtech accelerator puts $15M towards African startups February 20, 2023
  • Data Leak Hits Thousands of NHS Workers February 20, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version