Forward
Multicloud is a reality for organizations of all sizes. As a result, security leaders need to build capabilities and expertise for any cloud provider that the business chooses. How can security professionals get a handle on this complex world of cloud security?
For the first time, in this book, we have security leaders from the three major cloud providers – Amazon Web Services (AWS), Microsoft Azure, Google Cloud – along with independent technical experts from SANS Institute sharing where cloud security has been, mistakes that have been made along the way, and what the future may hold. The book covers foundational principles and strategies for cyber defense to mitigate risk. A key part of this is understanding the myths, missteps and best practices that arise in cloud migration. As organizations mature, a more comprehensive plan is also required.
This is where Zero Trust provides important architectural principles for modern security capabilities. Looking forward even further artificial intelligence (AI) promises to help improve our cloud security posture and ability respond to threats even more effectively.
As you go through this book I suggest using it as a guide. Know that there will be many twists and turns on your journey but, by leveraging the practices introduced here, you can get a handle on cloud security.
Frank Kim
Fellow and Curriculum Lead
SANS Institute
Introduction
Security has become a top priority for organizations looking to build customer trust, enhance workforce mobility, and unlock digital business opportunities. However, the traditional approach of defined security perimeters that separate “trusted” from “untrusted” network zones has proven to be inadequate. Today’s distributed enterprise requires a new approach to ensuring the right levels of security and accessibility for
systems and data. Increasingly, zero trust is being described as the solution.
Zero trust is a journey that’s different for every organization. For some, the journey is a natural evolution of cybersecurity in general, and defense in depth in particular. For others, it’s driven by policy considerations, and by the growing patchwork of data protection and privacy regulations across the globe.
Regardless of the rationale—and despite the hype that surrounds the term—zero trust can meaningfully improve both technical and business outcomes. However, implementing a zero trust architecture is a process that requires careful consideration. Organizations often find themselves asking, “What exactly is zero trust?,” “How do I get started?,” “How do I make continued progress?,” and “How do I demonstrate return on investment (ROI)?”
This chapter explores these important questions and cuts through the zero trust hype with best practices for designing a successful strategy that supports secure access to resources with a broad range of evaluation factors.
Download & read the complete book below 👇👇👇