Growing Security and Compliance Challenges in the Cloud
February 21, 2017

Pete Goldin
DEVOPSdigest

The stakes are high for preventing security compromises: 72.7 percent of companies have a custom application that, if it were to experience downtime, would significantly impact the organization’s ability to operate, according to the Custom Applications and IaaS Report 2017 from Skyhigh Networks and the Cloud Security Alliance (CSA).

While respondents forecast rapid IaaS adoption, they at the same time expressed numerous unresolved concerns about the security and compliance of their custom applications in IaaS platforms.

“Custom applications are a core part of how our business operates, and moving these to the cloud provide IT an opportunity to ‘start fresh’ with the right visibility, controls and overall security, without getting in the way of business operations,” said Stephen Ward, CISO, TIAA. “Meeting our security requirements for our applications, as well as our IaaS environment, is absolutely critical to accomplishing our business goals for cloud and overall software programs.”

Some of the key findings from the survey include:

Every Company Is a Software Company

Every company has developers writing custom code to improve engagement with employees, partners and customers. The average enterprise runs 464 custom applications and expects the number to grow 20.5 percent in the next 12 months. Yet IT security is aware of only 38.4 percent – a new and rapidly growing area of shadow computing.

At the Brink of the Cloud Tipping Point

Cloud adoption is accelerating with the growth of software-as-a-service (SaaS) running at 10x the growth rate of IT in general and the growth rate of IaaS at 20x that of IT in general.

In 2017, IaaS adoption will reach a tipping point because for the first time more custom applications will reside in public IaaS platforms than in corporate datacenters.

Slightly more than half – 60.9 percent – of custom applications remain in corporate datacenters today, and this number is expected to decline to 46.2 percent in the next 12 months as enterprises continue to migrate applications to public IaaS platforms.

The two top reasons for moving to the cloud are scale and cost, and a majority (62.9 percent) of respondents believe public IaaS platforms are just as or more secure than their own datacenters.

Apps Vulnerable in the IaaS Wilderness

Despite growing acceptance of public IaaS platforms, IT security departments face a host of new threats and challenges in the move to the cloud. Under cloud’s shared responsibility model, IaaS platforms secure the infrastructure but the enterprise is accountable for securing the corporate data, which includes protecting against compromised login credentials, rogue administrators and regulatory violations. These challenges are made more urgent by the fact that 46 percent of business-critical custom applications are already in the public or hybrid cloud today and by the rapidly approaching deadline for complying with the EU General Data Protection Regulation (GDPR).

C-Suite Jobs on the Line

Companies currently lack the expertise and tools to effectively deploy security for custom applications; 64.0 percent of respondents are moderately or very concerned about the security of custom applications deployed on a public IaaS platform.

Recent high-profile cyber attacks have illustrated that corporate boards ultimately hold c-level executives responsible, and 29.1 percent of respondents believe the CIO and the CISO would lose their jobs in a catastrophic attack on a custom application.

Over half, 50.3 percent, believe the IT security manager responsible for the application would be fired. Application developers are considered the least likely to face termination and only 23.3 are concerned about application security, signaling that IT security must take the initiative for custom application and IaaS security.

“The results of this survey provide an unfiltered view into the challenges companies and their IT security leadership are facing because of the exponential growth in cloud usage,” said Jim Reavis, CEO, CSA. “From custom applications to the infrastructure to the teams tasked with managing it all, we’re seeing a major evolution in how security needs to be more a focal point when it comes to planning for the increasingly complex needs of business.”

The report is based on a broad survey of software development, IT administration, IT security, operations and devops professionals across the Americas, EMEA and Asia Pacific, involved in developing, deploying and securing custom applications.

The Latest

September 21, 2017

There are many options when it comes to container orchestration platforms and services. Figuring out which one is best for a particular organization’s needs and applications can be a challenge. Which platform for containerization you choose can significantly influence your business success, so the selection process should be carefully considered ...

September 20, 2017

A powerful tool for simplifying DevOps is containerization, which delivers a convenient form of application packaging, combined with the opportunity to automate certain IT provisioning processes. With containerization, DevOps teams can focus on their priorities — the Ops team preparing containers with all needed dependencies and configurations; and the Dev team focusing on efficient coding of an application that can be easily deployed ...

September 18, 2017

Web development and web design are intertwined in such a way that there is not one without the other — not anymore at least. The following outlines 5 benefits of collaboration ...

September 14, 2017

Mastering modern software development by building a "Modern Software Factory" is at the heart of business success in the digital economy, according to the results of a survey of over 1,200 IT leaders released today by CA Technologies ...

September 13, 2017

IT-Business convergence is needed to deliver continuous change, but many of the current tools add complexity and fail to merge the two, according to the Panaya 2017 State of Functional Testing Report ...

September 11, 2017

Application Program Interfaces (API’s) represent an effective way to build and manage mobile services. By using APIs — a set of routines, protocols and tools for building software applications — application developers no longer have to buy technology software or hardware. Instead, they can simply plug into a growing open ecosystem of API-driven services. It is simple to integrate, and saves time and money for new developers ...

September 07, 2017

More than a quarter of enterprises globally have not built, customized or virtualized any mobile apps in the last 12 months, according to the latest mobile app survey by Gartner ...

September 06, 2017

The number of malware breaches (to use a generic term) are rising in near exponential numbers and, unless there are radical changes, this is set to continue unabated. Most pundits agree with this forecast ...

September 01, 2017

DevOps encourages communication and collaboration between development and operations teams. Achieving greater synergies between the Dev and Ops teams doesn't happen overnight, but it is possible to fast track the process with the right technologies in place. One such technology is IT automation ...

August 29, 2017

Newly released data shows that distributed denial of service (DDoS) and web application attacks are on the rise once again, according to the Second Quarter, 2017 State of the Internet / Security Report released by Akamai Technologies ...

Share this