CyberTalk

Your cloud security posture management questions answered

Tony Sabaj, Check Point Software

Anthony (Tony) Sabaj is currently the Director of Channel Security Engineering for North America at Check Point, with over 25 years of experience in the Cyber/Information/Network security. Tony has been at Check Point since 2002 in a variety of sales and technical roles. Prior to joining Check Point, Tony was a Senior Product Manager at Telenisus, a startup MSSP/VAR in Chicago. In 2001 the MSSP business of Telenisus was sold to Verisign to start their MSSP business and the VAR business was sold to Forsythe to start their Security Practice. Tony joined Forsythe shortly after that acquisition as a Security Consultant and Certified Check Point trainer. Tony started his career with Arthur Andersen/Andersen Consulting, building their worldwide IP network, designing the security controls for the firm and helping build their external Security Consulting Practice.

In this two part interview series, Tony Sabaj discusses Cloud Security Posture Management (CSPM). From making CSPM a top priority to the opportunities and challenges that come with implementing CSPM solutions, this interview provides premium cyber security insights.

What questions should CISOs ask themselves or their teams to determine whether or not cloud security tools need upgrades?

One of the first questions CISOs need to ask is ‘Does the organization have visibility into its cloud environments?’ Many organizations have moved rapidly to adopt cloud technologies and infrastructures. One of the major benefits of the cloud is the agility and speed to bring applications and services to bear.  This agility requires security tools to be able to operate at the “speed of the cloud”; they need to automated and operate in real-time.  Another, equally important, question that CISOs need to ask is ‘Are teams applying consistent security across a multitude of cloud providers?’

Over 75% of organizations will be adopting a multi-cloud or hybrid cloud strategy.  Organizations will be utilizing services from multiple public cloud providers, such as Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), Oracle Cloud Infrastructure (OCI) or Alibaba to name a few of the larger players. Even hybrid cloud solutions like Azure Stack, AWS outposts, VMware NSX or Cisco ACI, need consistent security enforcement and monitoring.

Is Cloud Security Posture management a top cyber security priority or should it be?

It should be for any organization with any exposure to public cloud. Any organization that is not implementing continuous compliance of their cloud environment is missing one of the easiest ways to reduce their risk and achieve better visibility of their public cloud infrastructures. According to Check Point Research, misconfiguration of cloud environments ranked highest among organizations, at 68%, for risk in the cloud. CSPM tools offer the best defense to mitigate the risk of misconfiguration.

What is Cloud Security Posture Management and how does it differ from traditional cloud security?

This is a great question. Traditional cloud security will try to mimic security techniques used in physical data centers or on premise networks. Many security tools and organizations took traditional security gateway/firewalls, reverse proxies or some type of intermediary device and virtualized that tool for use in the cloud. These more traditional security techniques very much have their place in cloud security, but CSPM differs in nature because it uses native controls.  Most of the functionality of CSPM tools will use APIs exposed by the cloud providers. The use of APIs allows a CSPM solution to operate with little to no impact on the performance or architecture of the cloud environment. CSPM should not require the installation of agents or virtual machines but should only require the proper credentials to the cloud accounts to access the exposed APIs from the cloud provider.  A properly deployed CSPM tool should be one of the first tools used in a cloud deployment or cloud migration.

What are the benefits of CSPM solutions and why do they matter?

CSPM has many benefits. The benefits may differ from organization to organization based on industry, regulatory/compliance requirements and the maturity of the organization’s cloud transformation. A few of the universal benefits of CSPM include:

Stay tuned for part two of this interview series. Also, discover more cyber security insights and analysis when you sign up for the Cyber Talk newsletter.

Exit mobile version