Issue link: https://insights.oneneck.com/i/1458399
CHAPTER 2 Security Challenges in Hybrid Clouds 17 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. » Security deployments are process-oriented; cloud computing environments are dynamic. The creation or modification of your virtual and containerized workloads can often be done in minutes, though the security configu- ration for this workload may take hours, days, or weeks. Security delays aren't designed to be burdensome; they're the result of a process that is designed to maintain a strong security posture. Policy changes need to be approved, the appropriate firewalls must be identified, and the relevant policy updates determined. In contrast, virtualization and DevOps teams operate in a highly dynamic environment, with workloads being added, removed, and changed rapidly and constantly. The result is a disconnect between security policy and virtualized workload deployment leading to a weakened security posture. CLOUD-BASED SAAS APPLICATIONS: I CAN'T SEE CLEARLY NOW Organizations are adopting SaaS-based application services at a breakneck pace. These applications continue to redefine the network perimeter, providing critical functionality and increasing productivity, but at the same time introduce potential new security and data risks if not properly controlled. In most organizations that use SaaS applications, users are provided access to a specific list of services that the organization has deemed acceptable or suitable for business purposes. However, given the large number of unique SaaS applications that are readily available on the Internet, many users likely aren't strictly complying with such usage policies and are instead using unsanctioned SaaS applications at work. This practice further increases the risk of data leakage to organizations due to the lack of visibility from regular logs or notifica- tions from unauthorized SaaS applications, as well as additional risk of intermeshing users' personal and work emails. In these situations, a user's personal email account may be attacked, and the attacker may then be able to steal data or compromise the user's work email account.