IBM cloud security expert Kevin Skapinetz describes the unique challenges of securing a cloud environment and how cloud compares to a traditional IT environment. He also discusses considerations for securing private, public, or hybrid cloud environments in various stages of development. Skapinetz emphasizes that cloud computing is transformative to the traditional IT model, so the ways to enable security for a cloud system has to be transformed too; you just can't "bolt" security onto the cloud system after the fact. He outlines the three-pronged method of building security into your cloud:
- Design: At the point the customer is deciding how and when to move to the cloud, you wrap security enablement into the strategic planning for such components as networking and storage.
- Deploy: During the phase when customers are pushing virtual system components to the cloud (like virtual machines and data), you need to apply any security techniques you would if you were moving these parts to another system; for example, encrypting data in motion and data at rest.
- Consume: When customers are interacting with their on-cloud components, you integrate such security methods as policy creation and enablement and application of workload balancing protections.
Learn more about how IBM entangles security and cloud computing. 3:41