Intelligent CIO LATAM Issue 01 | Page 55

FEATURE : CLOUD corresponding to nearly one in five of the data breaches analyzed .
Additional issues may arise due to mishandling of data . The fastest growing innovation to address them is called Confidential Computing . Right now , most cloud providers promise they won ’ t access your data ( they can , of course , be forced to break that promise by court order or other means ). This also means , on the other hand , that threat actors could use that same access for their own nefarious purposes . Confidential Computing ensures that the cloud technology provider is technically unable to access the data , making it equally difficult for cybercriminals to access it .
Understanding how attackers leak into the cloud is also key to the evolution of security protocols . According to an IBM analysis of cloud security incidents , the most common pathway is through cloud-based applications . In fact , remote use of cloud applications accounted for 45 % of cloud-related security incidents that were analyzed by IBM X-Force incident response teams over the past year .
With these challenges in mind , here are some guiding principles to consider to help design security for the hybrid cloud era :
• Unify the strategy . Design a comprehensive cloud security strategy that spans the entire organization , from application developers to IT and security teams . Also , designate clear policies for new and existing cloud resources .
• Choose open architecture . Identify the most sensitive data and ensure that the appropriate privacy controls are in place , even down to the hardware level . Consider technical insurance as in Confidential Computing and keep your own password , this means that not even the cloud provider can access the data .
• Have an open approach . Ensure that security technologies work effectively across hybrid cloud environments ( including on-premises and multiple clouds ). When possible , take advantage of open standards and technologies that enable greater interoperability and can reduce complexity .
• Automate security . Implement Artificial Intelligence and automation for greater speed and accuracy when responding to threats , rather than relying solely on manual reactions . assumptions . A clear picture of security challenges based on policies and types of threats targeting cloud environments will help to shift to this new frontier . When done right , hybrid cloud can make security faster , more scalable and more adaptable . p
Alvaro Santa Maria , IBM Security Director Latinoamérica

UNDERSTANDING HOW ATTACKERS LEAK

INTO THE CLOUD IS ALSO KEY TO THE EVOLUTION OF

SECURITY PROTOCOLS .

Improving security in the cloud for the new normal is possible , but we have to put aside previous
www . intelligentcio . com INTELLIGENTCIO LATAM 55