Cloud Computing & SaaS

Fortinet Maps out Key Strategies to Secure Cloud Migration

Comprehensive hybrid cloud security strategy critical to strengthening security posture

Cloud computing adoption in Asia Pacific markets has been growing at an unprecedented pace over the past decade, driven by businesses which demand speed and flexibility in delivering applications and services.

Rajesh Maurya, Fortinet’s Regional Director for India & SAARC said, “As local businesses require more speed and flexibility in delivering applications and services, cloud computing has emerged as the model best aligned to meet the needs of many organizations in India. Data centers are evolving especially rapidly into both private and public clouds, along with customer demands for fast and secure cloud infrastructure and services.

Fortinet, global leader in high-performance cybersecurity solutions, has outlined 4 key strategies to help organizations in Asia Pacific protect their businesses while migrating to private and public clouds:

1. Maintain a Strong Security Posture

Organizations need to maintain a strong security posture in private and public clouds. With the IT efficiencies gained by pooling compute, storage, and network resources through virtualization, SDN, and other technologies, private and public clouds have become increasingly aggregated environments, where not just servers but entire data centers have been consolidated into fewer but more efficient cloud environments.

All of this means it is more critical than ever to isolate business units from applications. Organizations must also segment east-west traffic to minimize the impact of a hacker or advanced threat that manages to breach the cloud perimeter via a single weak or vulnerable application.

2. Segregate & Secure Applications in Hybrid Clouds

Many organizations are starting to employ hybrid cloud strategies, where public clouds are used to host more exposed public-facing workloads with less sensitive data. Public clouds with persistent VPN connections should be segmented from private clouds that need to be more secured.

Conversely, some organizations may use the public cloud to host some sensitive data, such as credit card data subject to
PCI compliance, in order to alleviate strict industry compliance and regulations on the private cloud. Segmentation between the public and private portions of the hybrid cloud are equally important in this approach.

3. Employ end-to-end segmentation strategy

Organizations need to employ an end-to-end segmentation strategy, starting with micro-segmentation within the software-defined data center, and complementing that with internal segmentation firewalling within and across the physical network layers of data centers, campuses, and branch offices. Within the private cloud, advances in network virtualization and orchestration mean organizations should consider a fine-grained micro-segmentation strategy that can uniquely firewall and secure workloads irrespective of physical network topology, even down to a single virtual machine or workload.

4. Activate Data Leakage Protection (DLP) and Monitoring

Besides firewalling and intrusion prevention, data leakage protection (DLP) and monitoring are equally important in either or both directions, to ensure that sensitive data does not cross cloud boundaries. This is to limit the damage or loss of a breach in a single-cloud environment.

“Having a comprehensive security strategy for the hybrid cloud, including a single pane-of-glass view of security management and policy across both private and public clouds, is essential in establishing a consistent security posture for an organization, regardless of whether a given workload is running in an internal software-defined data center or on provider-hosted multi-tenant infrastructure,” added Rajesh Maurya.

Related posts

Qlik Eliminates Barriers to Enterprise AI Adoption


Latest Release of IFS Cloud brings Industrial AI Capabilities


IBM expands software availability to 92 countries in AWS Marketplace