TheJakartaPost

Please Update your browser

Your browser is out of date, and may not be compatible with our website. A list of the most popular web browsers can be found below.
Just click on the icons to get to the download page.

Jakarta Post

Preparing secure cloud environment in the digital new norm

From the bottom up, the architecture should include security modules of different layers, so that companies can build trustworthy data security solutions on the cloud layer by layer.

Eggy Tanuwijaya
Jakarta
Thu, August 18, 2022

Share This Article

Change Size

Preparing secure cloud environment in the digital new norm cloud computing illustration (Shutterstock/Blackboard)

A

s hybrid or remote working is being adopted by many companies globally and becoming the “new norm” for millions of workers, cyberattacks meanwhile continue unabated.

Based on the Cybersecurity Exposure Index (ICE) survey in 2020, the cybercrime index in Indonesia is currently at 0.62, which is higher than the global average of 0.54. Noted from the National Cybersecurity Index (NCSI), Indonesia's cybersecurity is ranked sixth among 10 countries in ASEAN and ranked 83rd out of 160 countries globally.

Building a secure and reliable information technology environment has therefore become an increasingly important priority for many businesses who are exploring the opportunities in the global digital economy. While moving to the cloud and using cloud-based security features is a good way to challenge cyber risks, it’s important to delve deeper into how best to construct a secure and reliable cloud environment that can fend-off even the most determined attacker.

In today’s digital environment, discussions about cybersecurity’s best practices have never been more important. I would like to share some thoughts on how to create a secure cloud environment - from building the architecture, to adopting cutting-edge security technologies and putting in place important security management practices – to inspire more thorough conversations on this subject.

A resilient and robust security architecture is essential for creating a cloud environment capable of assuring an organization about the availability, confidentiality and integrity of its systems and data.

From the bottom up, the architecture should include security modules of different layers, so that companies can build trustworthy data security solutions on the cloud layer by layer – from the infrastructure security, data security, application security to business security layers.

Viewpoint

Every Thursday

Whether you're looking to broaden your horizons or stay informed on the latest developments, "Viewpoint" is the perfect source for anyone seeking to engage with the issues that matter most.

By registering, you agree with The Jakarta Post's

Thank You

for signing up our newsletter!

Please check your email for your newsletter subscription.

View More Newsletter

In addition to the security modules of all of the layers, there are a variety of automated data protection tools that enable companies to perform data encryption, visualization, leakage prevention, operation log management and access control in a secure computing environment.

Enterprises can also leverage cloud-based IT governance solutions for custom designs of cloud security systems to meet compliance requirements from network security, data security to operation auditing and configuration auditing. This ensures the full-lifecycle data security on cloud, with controllable and compliant data security solutions in place.

Another consideration is to build a multi-tenant environment, abiding by the principle of least privilege and adopting consistent management and control standards to protect user data from unauthorized access. In addition, establishing strict rules for data ownership and operations on data, such as data access, retention and deletion, is also pivotal in creating a safe environment.

Moreover, enterprises can embrace the zero-trust security architecture and build a zero-trust practice by design to protect the most sensitive systems. The architecture requires everything (including users, devices and nodes) requesting access to internal systems to be authenticated and authorized using identity access protocols.

As such, the zero-trust security architecture cuts down on automatic trust, or trust without continuous verification, addressing modern challenges in securing remote working environments, hybrid cloud settings and increasingly aggressive cyber threats.

Cutting-edge security technologies such as comprehensive data encryption, confidential computing and many more emerging tech solutions, can be leveraged to ensure we stay on top of the trends in cybersecurity.

Comprehensive data encryption provides advanced data encryption capabilities on transmission links (i.e., data-in-motion), compute nodes (i.e., data-in-use), and storage nodes (i.e., data-at-rest). Key management service and data encryption service help users securely manage their keys and use a variety of encryption algorithms to perform encryption operations.

Another emerging technology to safeguard the cloud environment is confidential computing. Confidential computing is dedicated to secure data in use while it is being processed, protecting users’ most sensitive workloads. Confidential computing based on trusted execution environments (TEEs), ensures data security, integrity and confidentiality while simplifying the development and delivery of trusted or confidential applications at lower costs.

At our company, we apply confidential computing to the hardware layer, virtualization layer, container layer, and application layer, so that data can be protected in the most comprehensive way.

It is equally important to adopt proper security management practices and mechanism to maximize the security protection of one’s critical system and important data.

One essential mechanism to protect the cloud environment is to develop a comprehensive disaster recovery system, which enables businesses to configure emergency plans for data centers based on factors such as power, temperature and disasters, and establish redundant systems for basic services such as cloud computing, network and storage. It helps companies to deploy their business across regions and zones and build disaster recovery systems that support multiple recovery models.

Setting the effective reviewing and response mechanism for your cloud security issues is imperative.

First, having vulnerability scanning and testing in place is important to assess the security status of systems. Second, it is vital to use cloud-native monitoring tools to detect any anomalous behavior or insider threats.

Furthermore, establishing proper procedures and responsibility models to quickly and accurately assess where vulnerabilities exist and their severity, will help ensure that quick remedy actions can be taken when security problems emerge.  

In the future, developing the security architecture, technologies, management and response mechanism will no longer be perceived as a cost-center burden for companies, but rather, critical capabilities to safeguard the performance and security of daily business operations.

Crafting a comprehensive cloud security plan, adopting the best industrial practices, and choosing a professional cloud service provider with strong security credentials to work with, should be an imperative subject in a chief experience officer’s agenda.

 ***

The writer is head of solution architect at Alibaba Cloud Indonesia.

 

Your Opinion Matters

Share your experiences, suggestions, and any issues you've encountered on The Jakarta Post. We're here to listen.

Enter at least 30 characters
0 / 30

Thank You

Thank you for sharing your thoughts. We appreciate your feedback.