Securing Multi-Cloud Environments

So you’ve decided to adopt a multi-cloud architecture. Good for you. Multi-cloud strategies can deliver a range of benefits, such as being able to negotiate better vendor terms and, increasingly, application availability.

If you haven’t also developed a plan for securing your multi-cloud applications and infrastructure, however, you’re at risk of undercutting your investment in a multi-cloud architecture.

To understand why, keep reading for tips on the special security challenges that arise in a multi-cloud environment and how to address them.

What Makes Multi-Cloud Security Difficult

A multi-cloud architecture, as the term implies, is any type of IT infrastructure that combines multiple clouds together. Such an architecture could entail combining private cloud with a public cloud, but it could also involve using multiple public clouds at once. (The latter definition tends to be what most people mean when they talk about multi-cloud architectures today, but it’s not the only way to do it.)

By its nature, a multi-cloud architecture creates security challenges that would not exist if you were using just one cloud. They include:

  • The inability to rely on one cloud vendor’s security tools. If you used only one cloud—such as only AWS or only Azure—that cloud provider’s built-in monitoring and security auditing tools would support all of your infrastructure. But with multi-cloud, that obviously doesn’t work. AWS’ monitoring tools don’t support Azure and vice versa.
  • Multiple access-control configurations. The access-control tools provided by one cloud vendor also don’t work on another cloud vendor’s platform. This means that a multi-cloud strategy requires you to maintain and enforce multiple access-control configurations, one for each cloud.
  • Complicated shared-responsibility requirements. Most public cloud vendors define shared-responsibility models that detail which management and security responsibilities they expect to handle and which ones are the job of customers. Unfortunately, the shared-responsibility models of different cloud vendors are not identical. As a result, your responsibilities as an end-user on one cloud might be different from those on another cloud you use.
  • More infrastructure “cracks.” Having more clouds means you also have a higher potential for “cracks” to open up in your infrastructure. By cracks, I mean things such as hidden security vulnerabilities or unsecured resources that you overlook. Avoiding cracks is difficult enough for a sizeable organization if it only has one cloud. When you add more clouds, the cracks become even more difficult to find and address.
  • More to manage. When you have multiple clouds, you have more to monitor and manage. In this sense, the trend toward multi-cloud architectures is similar to the rise of microservices and containers, which also involve many more “moving parts” than earlier infrastructure technologies. The trade-off for this added complexity is greater reliability and agility, of course, so it’s well worth the trouble for most organizations. Still, the fact remains that managing more clouds—from both an IT Ops and a security perspective—is more difficult than managing only one cloud.

Multi-Cloud Security Best Practices

What’s an organization to do when facing these multi-cloud security challenges? The answer is obviously not to avoid such an architecture; that would mean depriving yourself of the distinct cost-saving and reliability advantages that multi-cloud architectures can deliver.

Instead, IT teams who manage multi-cloud architectures must design and adopt practices that can help them to keep their clouds secure to protect their investments. These practices include:

  • Embracing multi-cloud security tools. While the security monitoring and access-control tools that your cloud provider offers to you may be useful in some circumstances, a cloud-native architecture means that you will typically need to make greater use of third-party, cloud-agnostic security tools that can support whichever combination of clouds you use.
  • Automate, automate, automate. The more you automate, the more you decrease your chances of letting something fall through the cracks due to human oversight. Automation is a powerful tool for any modern IT workload, but it’s especially crucial for avoiding security mistakes when you have a complex multi-cloud architecture.
  • Least privilege access control by default. The safest approach to access control is to lock down access to the bare minimum by default on each cloud that you use, and work up from there by granting additional permissions only to the accounts that need them. Combine this with SSO so users have a single, strongly protected identity to use to across your cloud deployments.
  • Consider security foremost when choosing which clouds to use. While all cloud platforms, public and private, have security risks, some clouds may be more secure than others for the specific types of workloads you want to deploy. When you are choosing which clouds to use, evaluate how secure the candidates are for your needs. Then, weigh that assessment alongside other factors (such as cost and reliability) as you decide which clouds to adopt.
  • Don’t be afraid to switch clouds. Keep in mind, too, that you can always swap out one cloud with another one if it offers better security. Part of the advantage of a multi-cloud architecture is that it helps free you from being locked into a particular cloud vendor. Leverage this freedom to bolster cloud security when appropriate.

Conclusion

Multi-cloud architectures can be a great resource for helping to build cost-efficient, agile infrastructures. But no multi-cloud strategy is complete if it does not address the special security challenges that multi-cloud brings. The challenges are eminently addressable, but only if you factor them into your strategy from the start and keep them constantly in mind as you update your architecture.

John Morello

Avatar photo

John Morello

John Morello is the Co-Founder and CTO of Gutsy. Previously, he was the CTO of Twistlock and helped take the company to over 400 customers, including 45% of the Fortune 100, and a $.5B exit to Palo Alto Networks where he served as VP of Product for Prisma Cloud. John holds multiple cybersecurity patents and is an author of NIST SP 800-190, the Container Security Guide. Prior to Twistlock, he was the CISO of an S&P 500 global chemical company. Before that, he spent 14 years at Microsoft where he worked on security technologies in Windows and Azure and consulted on security projects across the DoD, intelligence community, and at the White House. John graduated summa cum laude from LSU and lives in Baton Rouge with his wife and two sons. A lifelong outdoorsman and NAUI Master Diver and Rescue Diver, he's the former board chair of the Coalition to Restore Coastal Louisiana and current board member of the Coastal Conservation Association.

john-morello has 4 posts and counting.See all posts by john-morello

Secure Guardrails