Issue link: https://insights.oneneck.com/i/1458399
20 Data Center & Hybrid Cloud Security For Dummies, Palo Alto Networks Special Edition These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. a violation occurs, and real-time threat intelligence and detection on known and unknown threats to prevent new malware inser- tion points. Cloud security is a shared responsibility between the cloud ven- dor and the organization. However, the organization is always responsible for securing its own data. Here are some key requirements for securing a hybrid cloud environment: » Consistent security in physical and virtualized form factors. The same levels of application control and threat prevention should be used to protect both your cloud computing environment and your physical network. First, you need to be able to confirm the identity of your applica- tions, validating their identity and forcing them to use only their standard ports. You also need to be able to block the use of rogue applications while simultaneously looking for and blocking misconfigured applications. Finally, application- specific threat prevention policies should be applied to block both known and unknown malware from moving into and across your network and cloud environment. » Segment your business applications using Zero Trust principles. In order to fully maximize the use of computing resources, it's now a relatively common practice to mix application workload trust levels on the same compute resource. Although efficient in practice, mixed levels of trust introduce new security risks in the event of a compromise. Your cloud security solution needs to be able to implement security policies to create trust zones based on the concept of Zero Trust, as a means of controlling traffic between workloads while preventing lateral movement of threats. » Centrally manage security deployments; streamline policy updates. Physical network security hardware is still deployed in almost every data center, so it's critical that you have the ability to manage both hardware and virtual form factor deployments from a centralized location using the same management infrastructure and interface. In order to ensure that security keeps pace with the speed of change your workflows may exhibit, your security solution should include automation features that will allow you to lessen, and in some cases, eliminate the manual processes that security policy updates often require.