Issue link: https://insights.oneneck.com/i/1458399
CHAPTER 2 Security Challenges in Hybrid Clouds 21 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Many cloud security offerings are merely virtualized versions of port- and protocol-based security appliances, delivering the same inadequacies as their physical counterparts. Major business requirements for cloud security include: » Preventing threats » Scalability and automation » Keeping pace with the business Preventing threats has become more difficult in the past several years. Basic attacks on infrastructure have given way to multi- vector, application-borne, sophisticated attacks that are stealthy, profit-driven, unwittingly aided by enterprise users, and in many cases, polymorphic. The level of organization associated with the development of these threats is also unprecedented. Regulatory and compliance requirements — such as the Pay- ment Card Industry's (PCI) Data Security Standards (DSS), U.S. healthcare mandates like the Health Insurance Portability and Accountability Act (HIPAA), and privacy regulations like the European Union (EU) General Data Protection Regulation (GDPR), Australian Privacy Principles, and the California Consumer Pri- vacy Act (CCPA) — are pushing network segmentation deeper into organizations generally, and into data centers and cloud environ- ments specifically. Finally, needless complexity can introduce integration issues, outages, and latency. Keeping the data center and hybrid cloud design and architecture as consistent as possible is essential to improving performance, availability, manageability, and security. The Dynamic Nature of Modern Threats The modern threat landscape is constantly evolving, and many sophisticated new threats have emerged in recent years. Email and web browsers are still the main attack vectors today, with malicious content either attached or downloaded as an execut- able or macro-based file. The malicious use of remote access applications is another significant attack vector. Threats that directly target applications can pass right through the major- ity of enterprise defenses, which have historically been built to