Wednesday, June 19, 2024
Education Sabha
Education Sabha
Education Sabha
Education Sabha
HomeNewsCyber SecuritySecuring public cloud in the age of remote working

Securing public cloud in the age of remote working

Follow Tech Observer on Google News
Google News

Working remotely is todays  new normal in order to stay safe and maintain business continuity due to the pandemic. While shifting to remote work allows organizations to carry on, there is a downside: Remote employees are not protected by security controls that are typically available when working in the enterprise network. Indeed, the probability of stolen credentials, public exposures, and compliance breaches increases significantly when working remotely.

Organizations need an automated mechanism to ensure business continuity, by securing their cloud environment and aligning with cloud security best practices.

Why Is It Harder to Secure Environments These Days?

As more and more employees , the possibility of public cloud breaches increases, due to:

Increased probability of compromised credentials. Home networks are less secure than corporate ones, which can lead to a compromise. For example, there may be multiple devices on any given home network and if one is infected, or the router is insecure, chances of compromised credentials increase. This is compounded by increased internet usage by other family members, who may not adhere to proper security protocols.

Increased probability of exposed assets. Dev and DevOps teams might take shortcuts to allow access to different assets, such as machines and databases, and inadvertently expose them to the internet. Human error plays a large role here; for example, if access was supposed to be granted to an employee's home network but was instead granted to a much wider network or to the whole internet.

Excessive permissions. Similarly, excessive permissions – which are the #1 cloud threat – can be given to different entities in the cloud, which can cause a larger breach if those credentials are misused by the user or stolen.

Also Read | Top 3 business verticals most targeted by bad bots

Lack of visibility. In light of the massive shift in the way people are now working, it's more important than ever to gain better visibility of security posture, public exposure, compliance breach and misconfigurations.

5 Best Practices for Cloud Security for Remote Workers

Despite these challenges, not all hope is lost. There are several ways in which organizations can help enable remote workers to do their tasks in the cloud – securely:

  • Enable multi-factor authentication for users with Console access and for the root user
  • Make sure no inactive users are available, and that you follow the least privileges principle by revoking permissions for users with IAM policies that allow full *:* administrative privileges
  • Enable relevant cloud logs (e.g., CloudTrail/Activity logs) in all regions of the account
  • Make sure you're aware of all assets exposed to the public (machines/storage/databases)
  • Make sure you're aware of security groups which allow ingress from

Also Read | Excessive permissions biggest threat to cloud security

The right cloud protection is critical in these exceptional times. For example, with 's Cloud Workload Protection service, you can get a detailed report which will allow you to get visibility into your cloud configuration and:

  • Strengthen your users' authentication
  • Prevent and detect public exposure of different cloud assets
  • Reduce attack surface by detecting users and roles with excessive IAM permissions
  • Ensure your logging configuration is correct to get a better visibility of your public cloud
  • Detect network and cloud native attacks

The author is Managing Director-India, SAARC & Middle East at Radware. Views are personal.

Get the day's headlines from Tech Observer straight in your inbox

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
Nikhil Taneja
Nikhil Taneja
Nikhil Taneja is managing director - India, SAARC & Middle East at Radware
- Advertisement -
Education Sabha
Education Sabha
Education Sabha
Education Sabha
- Advertisement -Education Sabha
- Advertisement -EmpowerFest 2024
- Advertisement -
- Advertisement -ESDS SAP Hana

Subscribe to our Newsletter

83000+ Industry Leaders read it everyday

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
- Advertisement -

AI surge to boost adoption of conversational analytics: Chetan Alsisaria, Polestar

"The way we interact with data is changing, thanks to large language models. Earlier bots were rule-based and limited, but now, AI allows for more natural, conversational interactions," said Chetan Alsisaria, CEO and Co-Founder, Polestar Solutions.