<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cloud &#8211; A musing Mulcahy</title>
	<atom:link href="https://www.amusingmulcahy.com/category/technology/cloud/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.amusingmulcahy.com</link>
	<description>Management, technology, random thoughts</description>
	<lastBuildDate>Sun, 23 Oct 2022 13:28:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Cloud Security is Simple</title>
		<link>https://www.amusingmulcahy.com/cloud-security-is-simple/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cloud-security-is-simple</link>
					<comments>https://www.amusingmulcahy.com/cloud-security-is-simple/#respond</comments>
		
		<dc:creator><![CDATA[Ger]]></dc:creator>
		<pubDate>Sun, 23 Oct 2022 13:25:39 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[#Cloud #CloudSecurity]]></category>
		<guid isPermaLink="false">https://www.amusingmulcahy.com/?p=1230</guid>

					<description><![CDATA[Cloud Security principles appear simple, but execution becomes incredibly complex at scale.]]></description>
										<content:encoded><![CDATA[
<p>If you are working in Cloud Security in any area (or Cloud assurance or Governance), the title of this post probably caught your attention.  You may have thought to yourself, &#8220;ah, clickbait!&#8221;.  While this is a somewhat attention-grabbing statement, I don&#8217;t intend it to be clickbait. Instead, I hope to spark some discussion about why something simple on its face is simultaneously very difficult to get right.</p>



<span id="more-1230"></span>



<p>I sometimes have conversations with people who don&#8217;t know me well and think I&#8217;m nice (or even &#8220;too nice&#8221;).  Depending on the nature of the conversation, I may correct them.  I intend to be <strong>kind</strong>, which appears as niceness but is fundamentally different.  People sometimes draw a false equivalence between the attributes of kindness and those of niceness.   Someone can be kind but not particularly nice.  As I&#8217;ve written elsewhere, it can be kind to give someone extremely blunt feedback, but it may not feel nice to the person receiving it.  Similarly, something that is simple, or made up of simple components, is not necessarily easy. For example, the idea of climbing a mountain is simple to comprehend but potentially very challenging to execute.</p>



<p>What do I mean when I say Cloud Security is simple?  The principles that drive Cloud Security are really straightforward. First, have a good governance structure.  Ensure that your identity and access management practices are based on least privilege and maintain that stance.  Ensure visibility everywhere in your environment.  Put appropriate controls in place to segment your Cloud platform so that a compromise in one area is contained.  Deploy technology using patterns and maintain your configurations through constant checking and automation.  Detect unusual events quickly and provide actionable information to critical stakeholders promptly.  Automate heavily. These are simple concepts, even for non-technologists.</p>



<p>However, the execution of Cloud Security at scale is anything but easy.  Let&#8217;s take the area of entitlements, for example.  Maintaining a consistent view of all of the entitlements held by every human and machine identity at scale is incredibly challenging.  While the emerging product field of Cloud Identity and Entitlements Management (CIEM) intends to tackle this challenge, the solutions and market are immature.  Microsoft&#8217;s recent acquisition of CloudKnox, now rebranded as part of the Entra product family, is a case in point.  Entra is an interesting product providing information on Role-Based Access Control (RBAC) entitlements for Azure and other Cloud environments.  Still, it does not yet give a view of Azure Active Directory entitlements.  The combination of roles and entitlements between Azure AD and Azure RBAC is a critical view to have to identify potentially undesirable (toxic) combinations.</p>



<p>Without appropriately mature tooling, it is practically impossible for any Cloud Operations or Cloud Security Operations team to understand all entitlements held by any single identity or security principal.  Given the number of breaches caused or facilitated by overprivileged credentials, this area desperately needs improved capability.</p>



<p>So Cloud Security is not easy, even if it is conceptually simple.  An analogy struck me relating to DNA.  The four bases that form DNA are relatively simple components. However, combined in an incredibly variable manner, they can create hugely complex organisms, ranging from a blue whale to a human to a fruit fly.  Similarly, the variability of the underlying services in a Cloud environment and their combinations make securing Cloud solutions at scale incredibly challenging.  Simple components build towards extremely complex &#8220;organic&#8221; ecosystems.  As the line between IaaS and PaaS solutions becomes ever more blurred, the combinations increase in variability and complexity.</p>



<p>In a DNA-driven world, how the bases combine is governed by straightforward principles—Adenine pairs with Thymine, and Cytosine pairs with Guanine.   During DNA replication, enzymes check to ensure that the correct bases have been added to the chain.  If there are errors, they are removed at the source before the DNA is &#8220;written&#8221;.</p>



<p>In Cloud Security, we can keep our organisations focussed on the simple principles that will help us manage complexity at scale.  From a practical perspective, we can ensure that we build environments using Infrastructure as Code (IaC) which is version controlled. We can wrap IaC templates with Policy as Code pre-deployment checks.  We can validate from a post-deployment perspective that what we intended to build is actually running using posture management and workload protection tools.  And we can continue to educate our broader organisations that what appears simple is not easy.  The lure of the Cloud is powerful, and the concepts of it are simple. However, the reality of how to get there safely is highly complex and requires the appropriate preparation, training and tooling to avoid disaster. </p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.amusingmulcahy.com/cloud-security-is-simple/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A May-December Romance &#8211; Public Cloud Providers &#038; Large Enterprises</title>
		<link>https://www.amusingmulcahy.com/a-may-december-romance-public-cloud-providers-large-enterprises/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-may-december-romance-public-cloud-providers-large-enterprises</link>
					<comments>https://www.amusingmulcahy.com/a-may-december-romance-public-cloud-providers-large-enterprises/#respond</comments>
		
		<dc:creator><![CDATA[Ger]]></dc:creator>
		<pubDate>Thu, 04 Oct 2018 11:05:57 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://www.amusingmulcahy.com/?p=201</guid>

					<description><![CDATA[It’s to be expected, really.  You want to go out clubbing, and the object of your affections, who is significantly older than you, wants to get an early night because they have a parent-teacher meeting first thing in the morning. Clearly, in this scenario, retail Public Cloud Providers (PCPs) are the younger member of the … <a href="https://www.amusingmulcahy.com/a-may-december-romance-public-cloud-providers-large-enterprises/" class="more-link">Continue reading<span class="screen-reader-text"> "A May-December Romance – Public Cloud Providers & Large Enterprises"</span></a>]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-full wp-image-217" src="https://www.amusingmulcahy.com/wp-content/uploads/2018/10/heart_cloud.png" alt="" width="200" height="139" />It&#8217;s to be expected, really.  You want to go out clubbing, and the object of your affections, who is significantly older than you, wants to get an early night because they have a parent-teacher meeting first thing in the morning.</p>
<p>Clearly, in this scenario, retail Public Cloud Providers (PCPs) are the younger member of the relationship &#8211; looking to move fast and break things, as it were.  Large, regulated Enterprises are the older partner, looking to put their feet up at the end of a complicated and trying day.  They can&#8217;t move as fast as the PCPs, because they have accumulated responsibilities in the form of regulatory and board oversight, and have less agility in their old bones than the more nimble PCPs.<span id="more-201"></span></p>
<p>When PCPs are dating/courting startups, or Small-Medium Enterprises (SMEs) in less regulated spaces, the pace of adoption and engagement in the relationship is often faster and less complicated.  This is because the younger organisations in the partnership may have similar interests, with fewer individual areas of specific concern.   The equation is one of best price and warranty for the service provided, and it often ends there.</p>
<p>Newer organisations tend to be more cloud-ready as well &#8211; they&#8217;ve grown up with modern application methods and technology and are carrying less technical debt.  Many large enterprises have applications that pre-date the foundation of today&#8217;s PCPs &#8211; and the management of these legacy applications can be critical to the day-to-day functioning of the enterprise.</p>
<p>Larger Enterprises also have a significant overhead in the form of regulations that they are accountable to meet, security and compliance controls to adhere to and boards that may be highly risk averse.</p>
<p>Does this &#8220;age-gap&#8221; means that the relationship is doomed?</p>
<p>Not necessarily; it just means that the younger partner needs to be more aware of the specific needs of their older paramour.   Some PCPs are clearly very aware of this.  For example, Microsoft Azure is focussing heavily on providing hybrid cloud services, including Active Directory integration and <a href="https://azure.microsoft.com/en-us/overview/azure-stack/">Azure stack</a> for on-premises use to enable the lines between the enterprise and the PCP to be less of a challenge to adoption.</p>
<p>In their turn, the elder partner needs to be aware that contracts and master services agreements may need to be reassessed while still maintaining the appropriate risk management posture.  Workload selection also has to be carefully managed &#8211; the &#8220;wrong&#8221; workloads migrating to a cloud environment will clearly result in unhappy outcomes.</p>
<p>What else can PCPs do to help?  They can make information readily available to simplify the transition to a cloud environment by making compliance resources available, as AWS did recently with their <a href="https://aws.amazon.com/compliance/">Cloud Compliance center.</a></p>
<p>They can simplify and make more transparent their usage and pricing structures.  For the past few years, articles have been published (e.g. <a href="https://www.technative.io/why-businesses-are-exiting-the-public-cloud/">here</a>, <a href="https://www.sdxcentral.com/articles/contributed/public-cloud-fatigue-why-more-organizations-are-rethinking-their-cloud-strategies/2017/10/">here</a> and <a href="https://www.forbes.com/sites/netapp/2016/03/16/will-companies-born-in-the-cloud-become-trapped-there/#4f222b3e4a5f">here</a>) about businesses pulling workloads back from public cloud environments, in part because of &#8220;sticker shock&#8221;.   (There are other reasons, including availability issues that have been identified as driving the pullback).</p>
<p>In addition, PCPs can put together chains of services that legacy application managers can consume more readily.   For example, AWS Lightsail, Farscape, Beanstalk and Migration Services are a step in the right direction.  These still don&#8217;t remove the overwhelming variety and complexity of sub-services that PCPs offer, but compared to e.g. Google Cloud Platform, they provide a friendlier face to newcomers to public cloud environments.</p>
<p>Is this May-December relationship still worth pursuing?  Absolutely &#8211; because there can be significant value for both parties if approached correctly.  Large Enterprises can use public cloud environments as a catalyst for application modernisation, risk reduction and capital budget weight-loss (although OpEx clearly needs to be very carefully managed).  PSPs can benefit from the steady, predictable income that a well-funded, firmly established partner can provide (and can learn how to further develop offerings that are suitable to these organisations, growing the business).  As with any relationship, the key is to ensure that expectations are set appropriately at the outset, and then met or exceeded.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.amusingmulcahy.com/a-may-december-romance-public-cloud-providers-large-enterprises/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
