Skip to main content

Securing a hybrid cloud architecture: What are the customer's duties?

by Eamon McCarthy Earls
Assistant Editor, MSDynamicsWorld.com

For many organizations, hybrid cloud is an essential part of the IT picture, providing a way to harness the growing resources of public cloud while keeping sensitive data and fragile processes protected from the uncertainties of operating in the "cloud" at-large. Hybrid cloud implementations often vary substantially based on internal factors and the systems being linked together. This means added security uncertainties and a heightened need for careful, proactive steps. But what's involved in securing a hybrid cloud architecture? MSDW reached out to cloud security pros for perspectives on how to maintain uptime while shutting out would-be attackers.

The ingredients of weak security

All too often, security vulnerabilities creep into hybrid cloud deployments from far upstream. Depending on the organization, developers may not have subjected code to a secure software supply chain. At every step, poor compliance, a lack of encryption or lackluster data redundancy can inject new vulnerabilities. StratusPointIT information security consultant Mihai Corbuleac told MSDW:

With hybrid cloud, organizations have the opportunity to keep some types of sensitive data, such as personally identifiable information (PII) on-premises while still embracing the enormous scaling potential of public clouds. Microsoft invests a lot in improving hybrid cloud security, with Azure Active Directory alerting you to stolen credentials or simultaneous logins to managed devices and applications from different locations; with services like Clutter and Delve for prioritizing documents, Power BI providing historical business intelligence and real-time analysis of data from cloud services and your own SQL Server apps or the Operations Management Suite that analyzes your server setup and warns admins about potential attacks etc.

Umesh Padval, a partner at Silicon Valley-based cloud infrastructure venture capital firm Thomvest Venture  argued that organizations need to create a comprehensive plan for implementing hybrid cloud, assess their security posture, and make tough decisions about security and cost relative to on-prem systems and legacy apps. He said:

FREE Membership Required to View Full Content:

Joining MSDynamicsWorld.com gives you free, unlimited access to news, analysis, white papers, case studies, product brochures, and more. You can also receive periodic email newsletters with the latest relevant articles and content updates.
Learn more about us here

About Eamon McCarthy Earls

As the assistant editor at MSDynamicsWorld.com, Eamon helps to oversee editorial content on the site and supports site management and strategy. He can be reached at eearls@msdynamicsworld.com.

Before joining MSDynamicsWorld.com, Eamon was editor for SearchNetworking.com at TechTarget, where he covered networking technology, IoT, and cybersecurity. He is also the author of multiple books and previously contributed to publications such as the Boston Globe, Milford Daily News, and DefenceWeb.