Growing Security and Compliance Challenges in the Cloud
February 21, 2017

Pete Goldin
DEVOPSdigest

The stakes are high for preventing security compromises: 72.7 percent of companies have a custom application that, if it were to experience downtime, would significantly impact the organization’s ability to operate, according to the Custom Applications and IaaS Report 2017 from Skyhigh Networks and the Cloud Security Alliance (CSA).

While respondents forecast rapid IaaS adoption, they at the same time expressed numerous unresolved concerns about the security and compliance of their custom applications in IaaS platforms.

“Custom applications are a core part of how our business operates, and moving these to the cloud provide IT an opportunity to ‘start fresh’ with the right visibility, controls and overall security, without getting in the way of business operations,” said Stephen Ward, CISO, TIAA. “Meeting our security requirements for our applications, as well as our IaaS environment, is absolutely critical to accomplishing our business goals for cloud and overall software programs.”

Some of the key findings from the survey include:

Every Company Is a Software Company

Every company has developers writing custom code to improve engagement with employees, partners and customers. The average enterprise runs 464 custom applications and expects the number to grow 20.5 percent in the next 12 months. Yet IT security is aware of only 38.4 percent – a new and rapidly growing area of shadow computing.

At the Brink of the Cloud Tipping Point

Cloud adoption is accelerating with the growth of software-as-a-service (SaaS) running at 10x the growth rate of IT in general and the growth rate of IaaS at 20x that of IT in general.

In 2017, IaaS adoption will reach a tipping point because for the first time more custom applications will reside in public IaaS platforms than in corporate datacenters.

Slightly more than half – 60.9 percent – of custom applications remain in corporate datacenters today, and this number is expected to decline to 46.2 percent in the next 12 months as enterprises continue to migrate applications to public IaaS platforms.

The two top reasons for moving to the cloud are scale and cost, and a majority (62.9 percent) of respondents believe public IaaS platforms are just as or more secure than their own datacenters.

Apps Vulnerable in the IaaS Wilderness

Despite growing acceptance of public IaaS platforms, IT security departments face a host of new threats and challenges in the move to the cloud. Under cloud’s shared responsibility model, IaaS platforms secure the infrastructure but the enterprise is accountable for securing the corporate data, which includes protecting against compromised login credentials, rogue administrators and regulatory violations. These challenges are made more urgent by the fact that 46 percent of business-critical custom applications are already in the public or hybrid cloud today and by the rapidly approaching deadline for complying with the EU General Data Protection Regulation (GDPR).

C-Suite Jobs on the Line

Companies currently lack the expertise and tools to effectively deploy security for custom applications; 64.0 percent of respondents are moderately or very concerned about the security of custom applications deployed on a public IaaS platform.

Recent high-profile cyber attacks have illustrated that corporate boards ultimately hold c-level executives responsible, and 29.1 percent of respondents believe the CIO and the CISO would lose their jobs in a catastrophic attack on a custom application.

Over half, 50.3 percent, believe the IT security manager responsible for the application would be fired. Application developers are considered the least likely to face termination and only 23.3 are concerned about application security, signaling that IT security must take the initiative for custom application and IaaS security.

“The results of this survey provide an unfiltered view into the challenges companies and their IT security leadership are facing because of the exponential growth in cloud usage,” said Jim Reavis, CEO, CSA. “From custom applications to the infrastructure to the teams tasked with managing it all, we’re seeing a major evolution in how security needs to be more a focal point when it comes to planning for the increasingly complex needs of business.”

The report is based on a broad survey of software development, IT administration, IT security, operations and devops professionals across the Americas, EMEA and Asia Pacific, involved in developing, deploying and securing custom applications.

The Latest

July 16, 2018

The key to mainframe DevOps success is in quickly identifying and removing major bottlenecks in the application delivery lifecycle. Major challenges include collaboration between mainframe and distributed teams, lack of visibility into the impact of software changes, and limited resource flexibility with scaling out necessary testing initiatives. Now let's take a closer look at some of these key challenges and how IT departments can address them ...

July 11, 2018

How much are organizations investing in the shift to cloud native, how much is it getting them? ...

July 10, 2018

In the shift to cloud native, many organizations have adopted a configuration-as-code approach. This helps drive up application deployment velocity by letting developers and DevOps teams reconfigure their deployments as their needs arise. Other organizations, particularly the more regulated ones, still have security people owning these tools, but that creates increased pressure on the security organization to keep up. How much are organizations investing in this process, and how much is it getting them? ...

June 28, 2018

More than a third of companies that use serverless functions are not employing any application security best practices and are not using any tools or standard security methodologies to secure them, according to the State of Serverless Security survey, conducted by PureSec ...

June 27, 2018

The popularity of social media platforms and applications is spurring enterprises to adopt "social business" models to better engage with employees and customers and improve collaboration, according to a new study published by ISG ...

June 25, 2018

The previous chapter in this WhiteHat Security series discussed Codebase as the first step of the Twelve-Factor App and defined a security best practice approach for ensuring a secure source control system. Considering the importance of applying security in a modern DevOps world, this next chapter examines the security component of step two of the Twelve-Factor methodology. Here follows some actionable advice from the WhiteHat Security Addendum Checklist, which developers and ops engineers can follow during the SaaS build and operations stages ...

June 21, 2018

DevSecOps is quickly gaining support and traction, within and beyond information security teams. In fact, 70% of respondents believe their culture can embrace the change needed to fuse Security and DevOps, according to a new survey of 80 security professionals by Aqua Security ...

June 20, 2018

The larger the company size, the higher the proportion of low IT performers, according to the State of DevOps: Market Segmentation Report from Puppet, based on the 2017 State of DevOps Survey data ...

June 18, 2018

An overwhelming 83 percent of respondents have concerns about deploying traditional firewalls in the cloud, according to Firewalls and the Cloud, a survey conducted by Barracuda Networks...

June 14, 2018

Despite the vast majority of cloud management decision-makers believing that DevOps and microservice enablement are important, very few believe that their organizations are capable of delivering them today — a gap that is costing the average enterprise $34 million per year, according to new report from the Ponemon Institute ...

Share this