TechTarget.com/searchcloudcomputing

https://www.techtarget.com/searchcloudcomputing/tip/9-cloud-migration-security-considerations-and-challenges

Cloud migration security challenges and best practices

By Dave Shackleford

As organizations plan to move workloads and applications into the cloud, they encounter a fundamental problem. The security controls and practices they've built for their on-premises environments aren't quite what they'll need in the cloud, where everything is software-based and deeply integrated.

Cloud migration consists of moving existing assets, typically applications and server workloads, into a cloud environment. In some cases, these migrations are relatively transparent and straightforward -- for example, moving a Microsoft Windows file share from an on-premises virtual machine to a cloud-based Windows file share instance. Other cloud migrations are much more complex and can vary significantly due in part to the use of more cloud-native services, APIs, controls and components not seen in the on-premises world.

How does cloud migration security work?

The cloud presents new opportunities for enterprises but also comes with new risks and other issues as well as strategies to mitigate them. Organizations should approach the security aspects of a cloud migration carefully, from fundamentals of access control and governance to API integrations and continuous monitoring.

They should first examine their existing security requirements and policies as well as controls and processes for regulatory compliance. It's also helpful to ask the following questions:

Security teams involved in a cloud migration will ideally also perform some type of threat modeling exercise to better understand the business case and technology use cases for the workloads being moved, the cloud destination and potential increased risks that need to be mitigated during the migration.

Why security is important during cloud migration

Security is a critical consideration in cloud migration due to the potentially sensitive nature of the data, systems and applications involved. Without a solid security strategy, organizations risk exposing their assets to threats that can lead to data breaches, operational disruptions and compliance failure. Here's more about why security is essential during cloud migration:

Cloud migration security considerations

Important cloud security considerations are numerous, but the following should be the top priorities:

Top security challenges faced during cloud migration

Alongside the plethora of cloud security considerations during cloud migrations, security teams should prepare to encounter and mitigate an array of challenges along the way, including the following:

Best practices to mitigate cloud migration security risks

Organizations can take many steps to successfully prepare for and mitigate cloud migration security challenges.

The most important first step in a cloud migration plan is to establish proper cloud governance. For day-to-day cloud engineering, oversight and administration, including change management, design a governance model with the following breakdown of teams:

To ensure cohesion across teams, form a cloud governance committee with representatives from all these areas, as well as dotted-line representation from legal, compliance, audit and technology leadership. Once a central cloud governance structure is in place, there are still some important steps to take.

1. Establish security standards and baselines

Develop baseline security standards in collaboration with the governance team. At a minimum, the list should include cloud control plane configuration, IaC templates, cloud workload vulnerability posture, and assignment of DevOps and cloud infrastructure privileges.

2. Create a dedicated IAM function

Identities and role or privilege assignment are critical in the cloud, so dedicate an operational focus to this area.

3. Require multifactor authentication for all administrative access

Enable multifactor authentication for any privileged access to the cloud environment. This will help mitigate common brute-force attacks against administrative accounts.

4. Enable cloud-wide logging

All major cloud service providers offer logging services, such as AWS CloudTrail and Azure Monitor. Turn these on and send the logs to a centralized collector or service for analysis. Use logs to develop cloud behavior baselines and detect security events or incidents.

5. Invest in a cloud security posture management service

Organizations should continuously monitor everything from the cloud control plane to the current configurations of assets. As cloud deployments increase in number and complexity, a service that tracks configuration settings across numerous clouds or cloud accounts becomes invaluable to help detect misconfigurations that could cause security issues.

Cloud security vs. on-premises security

There are three significant differences between cloud security and on-premises security: shared responsibility, software and governance.

Shared responsibility

The concept of the shared responsibility model for data protection and cybersecurity has been part of most outsourcing arrangements for many years, but the nature of shared security responsibilities changed with the advent of cloud. Every major cloud provider supports shared responsibility in the cloud, but not all of these models are equal. For example, your IaaS cloud provider agreement should clearly delineate the responsibilities. AWS breaks down its responsibility model into two primary categories:

All cloud providers are wholly responsible for the physical security of their data centers. Additionally, they are responsible for data center disaster recovery planning, business continuity, and legal and personnel requirements that pertain to the security of their operating environments.

Cloud customers still need to plan for their own disaster recovery and continuity processes, particularly in IaaS clouds where they build infrastructure. Customers that want to manage data backups in SaaS and PaaS environments should incorporate these into existing data protection and recovery strategies.

Software

Another major difference between on-premises and cloud security is that everything in the cloud is software-based. This brings unique requirements for controls and processes, and potentially new tools and services to fulfill security objectives. Again, the cloud provider is responsible for managing and securing the hardware that underpins its services.

Governance

Be prepared to restructure governance workflows and alignments. In the cloud, they need to be much more agile and continuous, with representation from diverse groups of stakeholders and technical disciplines. You will need to involve a wider variety of stakeholders to make decisions much more quickly than is typical for on-premises governance practices.

Dave Shackleford is founder and principal consultant at Voodoo Security, as well as a SANS analyst, instructor and course author, and GIAC technical director.

26 Dec 2024

All Rights Reserved, Copyright 2010 - 2025, TechTarget | Read our Privacy Statement