eBooks/eGuides

Data Center and Hybrid Cloud for Dummies

Issue link: https://insights.oneneck.com/i/1458399

Contents of this Issue

Navigation

Page 26 of 82

CHAPTER 2 Security Challenges in Hybrid Clouds 21 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Many cloud security offerings are merely virtualized versions of port- and protocol-based security appliances, delivering the same inadequacies as their physical counterparts. Major business requirements for cloud security include: » Preventing threats » Scalability and automation » Keeping pace with the business Preventing threats has become more difficult in the past several years. Basic attacks on infrastructure have given way to multi- vector, application-borne, sophisticated attacks that are stealthy, profit-driven, unwittingly aided by enterprise users, and in many cases, polymorphic. The level of organization associated with the development of these threats is also unprecedented. Regulatory and compliance requirements — such as the Pay- ment Card Industry's (PCI) Data Security Standards (DSS), U.S. healthcare mandates like the Health Insurance Portability and Accountability Act (HIPAA), and privacy regulations like the European Union (EU) General Data Protection Regulation (GDPR), Australian Privacy Principles, and the California Consumer Pri- vacy Act (CCPA) — are pushing network segmentation deeper into organizations generally, and into data centers and cloud environ- ments specifically. Finally, needless complexity can introduce integration issues, outages, and latency. Keeping the data center and hybrid cloud design and architecture as consistent as possible is essential to improving performance, availability, manageability, and security. The Dynamic Nature of Modern Threats The modern threat landscape is constantly evolving, and many sophisticated new threats have emerged in recent years. Email and web browsers are still the main attack vectors today, with malicious content either attached or downloaded as an execut- able or macro-based file. The malicious use of remote access applications is another significant attack vector. Threats that directly target applications can pass right through the major- ity of enterprise defenses, which have historically been built to

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Data Center and Hybrid Cloud for Dummies