EP193 Inherited a Cloud? Now What? How Do I Secure It?
Oct 7, 2024
auto_awesome
Taylor Lehmann, Director at the Office of the CISO, and Luis Urena, Cloud Security Architect at Google Cloud, tackle the complexities of securing inherited cloud environments. They discuss the risks of late security team involvement and the impracticality of drastic measures like 'nuking' the environment. Instead, they offer strategic steps for immediate security improvements, such as managing overly permissive roles. They also evaluate the necessity of compromise assessments and the balance between current priorities and securing new systems.
Inheriting a cloud environment entails addressing unknown risks and establishing control through careful access management rather than drastic measures.
Implementing security measures like multi-factor authentication requires a methodical approach to avoid operational disruptions and ensure user readiness.
Deep dives
Inheriting Cloud Environments and Its Risks
Many organizations face the challenge of implementing security measures in cloud environments that were established without their involvement. This scenario often occurs during mergers and acquisitions, or when teams transition from experimenting with cloud technologies to operating in production. The primary concern is the uncertainty surrounding newly inherited workloads, whose security levels, histories, and access protocols remain unknown. Security teams are left to navigate these complexities, questioning the integrity and trustworthiness of the cloud accounts, while needing to establish effective security measures swiftly.
Market Risks in Rapidly Growing Startups
Startups that prioritize rapid growth to secure product-market fit often neglect necessary security frameworks, leading to market risks as they expand. Even if these companies have not suffered significant security incidents, the pressure to comply with industry requirements can create urgency for establishing security controls. As they approach regulated markets, these organizations realize that previous security lapses may prevent them from progressing. Consequently, engaging security professionals becomes essential to identify and address technical risks, particularly in the area of identity management.
Strategies for Managing Inherited Cloud Environments
When faced with the decision of how to manage an inherited cloud environment, security professionals are often advised against the drastic approach of 'burning it down' and starting anew. Instead, it is critical to assess the risks associated with the existing environment and establish control over it through proper access management. This can involve working with cloud support to gain administrative access, allowing for thorough audits and the identification of high-risk elements. The process should mimic incident response strategies, utilizing established methods to stabilize the environment and prioritize security measures before making any fundamental changes.
The Importance of Phased Security Implementations
Implementing security measures such as multi-factor authentication (MFA) must be approached methodically to avoid operational disruptions. While MFA is essential for enhancing security, a rushed deployment without adequate planning can lock out users who are unprepared. Therefore, a phased implementation, including communication and training strategies, ensures personnel can adapt to the changes safely. This approach not only applies to MFA but to all security controls, emphasizing the importance of aligning technology enhancements with organizational readiness.
Upon hearing this, many experts suggest that “burn the environment with fire” or “nuke it from orbit” are the only feasible approaches? What is your take on that suggestion?
On the opposite side, what if business demands you don't touch anything but “make it secure” regardless?
Could you walk us through some of the first critical steps you do after “inheriting a cloud” and why they are prioritized in this way?
Why not just say “add MFA everywhere”? What may or will blow up?
We also say “address overly permissive users and roles” and this sounds valuable, but also tricky. How do we go about it?
What are the chances that the environment is in fact compromised already? When is Compromise Assessment the right call, it does cost money, right?
How do you balance your team’s current priorities when you’ve just adopted an insecure cloud environment. How do you make tradeoffs among your existing stack and this new one?