Everything you ever wanted to know about security policy management, and much more.
If you have ever asked for directions while driving in Boston, then you have undoubtedly been told “you can’t get there from here”. It sounds silly, but after driving around in circles you become convinced the saying is true. But of course most of you do eventually work your way out of the maze and get where you’re going.
I think of this when talking with security professionals responsible for protecting the business while critical data center applications are migrated to the cloud. It seems like no matter what route to the cloud IT chooses to improve the business, security and compliance teams are there to raise objections and point out why unresolved security issues means “they can’t get there from here”. The result is that the business gets there anyway, and security hustles after being left behind to do the best they can securing what they can. I’m sure each of you has lived this.
Business incentives to get to the cloud are steadily increasing for you, so the sooner you get ready the better off you will be. For instance, in some cases your business will push applications to the cloud to save operating expenses by having fewer data centers, enhance performance by pushing key components of an application closer to your users, or improve global availability by leveraging your cloud provider’s distributed infrastructure. Whatever the rationale, you’ll have to deal with complex applications (web servers, data bases, computation engines, network security policies) and you’ll have to respond quickly when IT is ready to move.
Fortunately, there are some approaches that are working better than others. Here are three that I suggest you consider in being sure you can get your data center applications securely to the cloud.
There is no hybrid approach to security when migrating applications to the cloud – responsibility stays totally with you. It is up to you to deploy network security policies that can apply to new cloud environments at the speed of business. Start now with these steps to favorably position to help IT “get there from here”. And that’s a good place for security to be!
Receive notifications of new posts by email.