Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Firewalls, you’re fired

Even in progressive organizations, network-based security practices still linger and they can lead to a dangerously flawed cloud strategy.

By Eric Kedrosky
firewalls-freepik
August 9, 2021

The old model of relying on firewalls to protect the network is no longer relevant in today’s cloud-centric IT environment. While the old on-premise model made sense earlier on, the rapidly expanding suite of cloud providers, along with their infinite combinations of settings and services, now requires security teams to re-think their entire security strategy. According to Gartner, by 2023, 75% of security failures will result from inadequate management of identities, access, and privileges, up from 50% in 2020.” 

In the traditional data center, the network provided a secure organizational boundary. The network was carved up into zones, and trusts were established within and between zones and largely involved monitoring traffic and enforcing controls where the zones met. But in the cloud, this approach is less effective and, in some cases, irrelevant. Attackers seek access to people and non-people identities, then pivot between resources, discovering credentials and other identities, then greater access to your critical data. Make no mistake – the new perimeter is all about identities – both people and non-people. 

Identifying the Risks of the Cloud. Identity, resource and service misconfigurations are vital challenges that have led to significant data breaches. As we’ve seen, even the most sophisticated and well-funded organizations have had issues. Organizations can minimize risk by first identifying the risks leading to unauthorized identities and excessive privileges. It is essential for data owners and cloud operations, security, and audit teams to recognize these risks to maximize their control management, security, and governance of data within their public cloud environments.

Identity Issues. It has become effortless to create identities, both person and non-person, within the cloud. These identities may be provisioned with, or gain, access rights by accident or in ways that were not originally intended. They also may remain invisible and untrackable to data owners. These roles often contain special administrative privileges, such as the ability to enumerate and extract data (as was the case with many of the more well-known data breaches), which leads to the exposure of your data. 

Data Exposures are Inadequate Indicators. Transparent cloud data storage alone is insufficient. While data owners may trust their DevOps teams to manage the storage of data objects, this does not reveal the accessibility and privileges of external parties. Cloud users must remain privy to the micro-movements in their data channels to ensure foolproof security. It is critical to know where their data exists, which Identities have access to it, how it is being accessed and where it might be moving to or from.

Monitor for Drift. One of the most basic mistakes an organization can make in cloud security is not continuously monitoring data and identities. As a starting point, you need to set the baseline and establish and implement a set of cloud security controls. From there, you must continuously monitor the baseline and alert on any deviations. It is these deviations that will be your downfall.

Coordination Issues. The outdated paradigm of sending security alerts to a single team to triage and manage simply isn’t feasible. In the cloud operating model, the environment is simultaneously being used by disparate groups, which include audit, DevOps, cloud and security staff. The solution is to get the issues to the team(s) that created them, as they are in the best position to address them as soon as possible. This solution ensures that problems are addressed in both an appropriate and timely manner. Or, as I like to say, at the speed and scale of the cloud.

Fix the Employee Skills Gap. Many developers are not inherently security experts, so they should be trained in cybersecurity best practices. Organizations that do not want to assign these duties to existing Dev teams may need a new type of operations person that combines operations with security (DevSecOps). With a widening skills gap haunting CISOs, companies cannot afford to keep putting off their employee’s professional development programs. Failure to upskill staff means they don’t have the skills and knowledge necessary to secure their organization. 

 

Things you can do today to improve your enterprise strategy

Since the cloud involves multiple accounts, trust relationships, and permission inheritances, it is highly challenging for data owners to keep close tabs on it. Here are four areas you can use to improve your strategy.

Get to and maintain Least Privilege. Get a solution with advanced analytics to continuously monitor every identity to determine its effective permissions, what it can do, and what data it can access. Through this, detailed graphs can be created and continuously updated to visualize all the identity to data relationships, resulting in a highly systematic structure for easy identification and management of common data threats such as separation of duties, toxic combinations, and privilege escalations. The continuous audit ensures that the least privileged state is maintained and any deviation is immediately alerted.

Continuously Monitor Your Data. Most organizations do not know where all their data is in the cloud. You need to find, classify, and de-risk the most valuable data in your environment. The “blast radiuses” of potential security concerns are reduced by eliminating excessive data access rights. Look for a solution that can lock down precious data and continuously monitor it with a built-in alarm system that triggers in the event of sudden and unexpected activity.

Integrate Security and DevOps. Data owners need to establish an effective system from the get-go. Configure alerts according to their given context and deliver them to the respective teams to respond swiftly using intelligent workflows.

Prevent and Remediate Security Issues. Address data risks before they become incidents and cause damage by leveraging intelligent workflows and automation bots in your cloud. This results in a high-performance compliance structure for your public cloud. Put prevention rules in place across your cloud and make sure the rules are continuously met. Fix risks that are found in the environment before they become incidents. 

An enterprise that doesn’t fully understand its role in securing its identities and data in the public cloud is taking unnecessary risks with outdated strategies that, as we see every week, leads to disastrous consequences.

KEYWORDS: cyber security firewall protections information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Eric kedrosky 1

Eric Kedrosky is the Director of Cloud Security Research and CISO for Sonrai Security. Eric has spent his career gathering a wealth of experience that has allowed him to become an expert in cloud security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cloud-security-fp1170x658v05.jpg

    3 ways to fight cloud sprawl

    See More
  • The Cloud Is NOT a Product

    How to avoid becoming another Azure misconfiguration statistic

    See More
  • cloud security

    Overcoming 4 enterprise cloud security challenges

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing