The mass remote work trend induced by the global pandemic is rapidly becoming the new normal. As we are on the journey towards normalization, is appears remote work is here to stay, either for the long haul, or maybe for good.
What is important to note here is that this recent mainstreaming of remote work is mainly being supported by Cloud Computing. So, a natural consequence of the current remote work trend is a constantly increasing reliance on cloud infrastructures.
A recent study by IT security company Check Point has revealed interesting insights into cloud security. According to the company’s report, as much as 27% of the respondents cited misconfigurations as the top security challenge in the case of cloud infrastructures.
This is something that has nothing to do with the otherwise robust cyber security mechanisms now being offered by leading Cloud Service Providers (CSP) like dinCloud, an ATSG company. Most CSPs are offering more than adequate cyber security.
According to the report, misconfigured cloud environments are mainly the result of a deficient skillset on the part of enterprises that adopt the Cloud. This is a constraint which just cannot be attributed to cloud service providers.
The report also cited the constant migration of enterprise workloads to cloud computing environments as a reason behind cyber security challenges. By the year 2023, it is estimated that nearly 75% of enterprise workloads will be hosted in the Cloud.
Lastly, the report observed that cyber security was not being baked into the very application development processes. In a bid to roll out enterprise applications within really short timelines, cyber security emerges as the neglected area in most cases.
Towards the end, the Check Point report emphasizes the need for automating the cyber security of cloud environments as a top priority. These automation tools will prove really helpful in multi cloud environments, and also in the case of DevOps.
Some cloud security experts have gone to the extent of declaring DevSecOps as the new default name for cloud application development processes. In this way, cyber security will be embedded within app development, right from scratch.
The conclusion, and consensus view that emerged from this entire study is that enterprises need to accord top priority to automating their cyber security tools and platforms. This in turn will take cloud security to a whole new level, and further increase its adoption rates.