New research: How to evolve your security for the cloud

Tech News

This week, McKinsey released a report titled “Making a secure transition to the public cloud,” the result of interviews with IT security experts at nearly 100 enterprises around the world. Leveraging the expertise of Google Cloud and McKinsey security experts, the research presents a strategic framework for IT security in cloud and hybrid environments, and provides recommendations on how to migrate to the cloud while keeping security top of mind.

The research shows what many already know: that public cloud adoption is accelerating thanks to increased technical flexibility, simpler scaling, and lower operating costs. What’s exciting is that the research also reveals that many Chief Information Security Officers (CISOs) no longer view security as an inhibitor to adoption but instead an opportunity—“In many cases [CISOs] acknowledge that cloud service providers’ security resources dwarf their own,” the authors write—and now these companies are focused on how to best adopt and configure cloud services for increased security.

When implemented properly, public-cloud adoption can significantly reduce the total cost of ownership (TCO) for IT security.

This requires enterprises, cloud providers, and third-party service providers to work together collaboratively and transparently within a shared security model. Google Cloud has long believed in creating trust through transparency, previously releasing a detailed overview of our infrastructure security, explaining our shared responsibility model, and how we already protect our users and customers at the lower layers of the stack—and we’re thrilled to see McKinsey’s detailed endorsement of the same approach.

Common security approaches, and their tradeoffs.

Every company has different IT needs, but the report found two common security decisions companies take when adopting cloud services: (1) defining the perimeter, and (2) deciding whether to re-architect applications for greater manageability, performance, and security in the cloud (interestingly, only 27% of companies surveyed actually do this—change is hard).

The research identifies three common archetypes for perimeter security: backhauling, cleansheeting, and adopting cloud provider controls by default.

This article was sourced from Google Blog

No Comments

Leave a Reply

Tech News
Sony Xperia XA1 Smartphone Series Starts Receiving Android 8.0 Oreo Update: Reports

Sony has started rolling out Android 8.0 Oreo updates to its Xperia XA1 family of smartphones, comprising the Xperia XA1, Xperia XA1 Plus, and Xperia XA1 Ultra, as per user reports. The update also brings along the February 5 Android security patch – a bit of a disappointment considering the …

Tech News
Former Qualcomm Chairman Jacobs to Exit Board of Directors

Qualcomm Inc on Friday said former executive chairman Paul Jacobs would not be renominated for the US semiconductor company’s board after Jacobs disclosed his intention to pursue a long-shot acquisition of the firm. Jacobs, the former chief executive of the world’s largest mobile chipmaker and the son of its co-founder, …

Tech News
Samsung Galaxy S9+ 256GB Variant Available With 70 Percent Buyback Offer at Reliance Digital, Jio Stores

Samsung Galaxy S9 and Galaxy S9+arrived in India earlier this month with availability starting from Friday, March 16. The 256GB variant of the Galaxy S9+ is available exclusively via Reliance Digital stores, Samsung exclusive stores, and on Samsung Shop – the company’s online store. Reliance Digital on Friday also announced …