This post was originally published here by jeffb.
You probably don’t associate the 2001 smash hit Shrek with cloud security, but consider the below quote:
“Onions have layers. Ogres have layers. You get it? We both have layers.” – Shrek
“Oh, you both have layers. Oh you know, not everybody likes onions. Cake! Everybody loves cake! Cakes have layers!” – Donkey
That’s right, the cloud has reached such broad adoption it’s clearly the IT equivalent of cake. But when it comes to cloud security, the amount of layers involved has led many security teams to view it more like Shrek’s onion.
Effective cloud security has enough layers that even experienced security professionals at times have trouble keeping up with the multiple components of a robust cloud security strategy – and it does require a strategy.
Unfortunately, we repeatedly see organizations with approaches that are strong in the areas they cover themselves, but miss one (or multiple) layers that expose organizations to serious threats. Owing to this, we’ve laid out a diagram that highlights the primary layers and vendors in the cloud security landscape. These range from well-known components like antivirus and firewalls – to critical new solutions such as cloud infrastructure security posture assessment (CISPA) tools – effective cloud security strategies:
- Adopt the shared security model detailed by the major IaaS providers
- Ensure every layer is accounted for
As the maker of Halo, the only fully SaaS based security automation platform focused on the cloud workload layer across containers, VM’s, bare metal, public and private cloud, we’re pleased to provide this interactive overview of the layers that make up a “fully baked” cloud security stack (“cake”?).
Check out the diagram on our website to see an expanded version including different vendors, or below to make sure that you aren’t missing any key layers!