Gartner security pdf download
From a security perspective , this requires a total reboot of policies and tools to better mitigate risks. A new market is emerging to help organizations validate their security posture. It also offers specialized assessments and highlights the risks to high-value assets like confidential data. BAS provides training to enable security organizations to mature. This technology is rapidly transforming from academic research to real projects delivering real value, enabling new forms of computing and sharing with reduced risk of data breaches.
Join your peers for the unveiling of the latest insights at Gartner conferences. Top Security and Risk Management Trends November 15, Contributor: Kasey Panetta. Explore the latest: Top Strategic Technology Trends As cybersecurity and regulatory compliance become the top two biggest concerns of corporate boards , some are adding cybersecurity experts specifically to scrutinize security and risk issues.
Trend No. Experience Information Technology conferences Join your peers for the unveiling of the latest insights at Gartner conferences. View Conferences. Subscribe to the Latest Insight. Work Email Person Type. Subscribe for the Latest Insight.
Subscribe Back. Thanks for submitting the form. Error submitting the form. Ultimately, Avalon is the connective, collaborative tissue to make client relationships stronger. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation.
Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. This should be modifiable by the customer. In addition to scheduled scans, on-demand scans should be directly driven by events. For example, the creation of a new storage object would trigger an automatic assessment of the object for risk and compliance. Like any vulnerability data, CSPM assessment data is extremely sensitive.
The cloud configuration and risk information provides a roadmap for attackers if disclosed. Some IaaS regions for example, in China and. CSPM offerings that depend on cross-account visibility may not function without engineering work to get visibility in these clouds. Very few CSPM vendors provide this, as many enterprises have solutions already in place for their own data centers.
There is significant interest and uptake of Linux containers in public and private clouds. These environments are cloud platforms in and of themselves, and need to be assessed as such for example, assessing Docker and Kubernetes configurations according to industry standards for secure configuration.
Network, storage and compute are the core building blocks of IaaS, but there are dozens of PaaS services in use by most enterprises that must also be assessed. For example, message queuing, data analytics, data warehouses, relational database services, serverless PaaS and so on.
All of these need continuous assessment for risk and compliance. This is an area where CASB vendors fall short, as they typically focus first on the core services.
CASB vendors have an edge here. However, conceptually, the issues of identifying excessive permissions, misconfiguration, exposed sensitive data and malware are the same in SaaS services such as OneDrive, Box, DropBox and so on as they are in IaaS. Based on historical API and service usage patterns, some CSPM offerings can suggest authorization policies to be implemented and trimmed to implement least privilege.
User accounts within cloud services should be monitored for behaviors indicative of a compromised account or insider threat. Also, assessments against best practices from vendors and third parties such as the Center for Internet Security should be supported. Ideally, the CSPM offering provides built-in standard reports for common compliance requirements to demonstrate continuous compliance to auditors.
Most enterprises have their own policies for secure cloud configuration. For some extremely risky situations, automated remediation should be an option for example, removing storage buckets from being shared on the public internet and removing workloads instantiated without tags.
Does the CSPM offering use its own scripting language? Is this customizable? Again, are these modifiable by the customer? Is there a community to share common response actions? This ability helps to prioritize risk. How are sensitive data policies defined? Can DLP policies developed for on-premises sensitive data identification be used or imported? What common dictionaries are provided by the vendor?
There is a risk that cloud storage repositories become conduits for the spread of malware, especially if unmanaged machines and external users are sharing data. Security vendors with malware detection capabilities typically using a combination of signature, machine learning and sandboxing techniques will have an advantage or require CSPM offerings to partner for these capabilities.
Proper network segmentation is foundational to cloud security, and visualization capabilities are imperative to be able to understand cloud service connectivity, flows, and patterns within a cloud and across clouds. Advanced offerings can allow analysis, visualization and control of network segmentation policies across multiple cloud providers, and a few can extend this to on-premises network policies as well.
Issues identified should be resolved before placing the workloads and services into production. Some CSPM offerings that support scanning in development can scan and assess development artifacts directly for embedded cloud risk. Risky or noncompliant configurations can be identified early on and the results provided directly to the developer in its own environment such as via Slack, JIRA or the developer dashboard.
Consider the creation of a new storage object. Cloud administrators and developers need to correctly configure the dozens of settings for a storage object to be considered compliant and secure. Alternatively, why not have the person request the storage object and have it securely created for them? In this way, developers can use cloud services and capabilities that are preconfigured for security, empowering self-service but setting guardrails. Ultimately, the cloud security architect or CISO may want to get a snapshot view of cloud risk.
CSPM offerings should not require the use of the console to set policies and perform security posture assessments. Every activity in the console should be available via documented APIs.
This helps with integration into cloud automation efforts both in development and for production visibility, monitoring and response. The tool should be able to provide forensics-like investigation and incident response capabilities, offering a view of all cloud security posture changes over time and an ability to see exact configuration at points in the past.
The output of a CSPM offering should be linked to an enterprise SIEM and risks surfaced through an enterprise governance risk and compliance tool where relevant. A comprehensive view of cloud risk should also extend to the security posture of the workloads themselves. For example, are they patched and configured correctly? The CSPM tool should be able to import this data from a workload vulnerability assessment offering see Note 3 and overlay it onto its view cloud network topology, or it may provide vulnerability and configuration scanning capabilities directly or as a separately priced module.
A comprehensive view of cloud risk would extend to monitoring the runtime behaviors of cloud workloads.
0コメント