
Moving Cybersecurity to Cloud Infrastructures
11/10/2023Organizations are turning to cloud technologies to reduce costs and increase flexibility and agility. It is reported that the biggest challenge in transitioning to cloud storage technologies is the adoption of cloud capabilities and the difficulty of integrating them with existing information technology environments. Allocating cloud security is now considered part of regular operations. Since 2020, the number of cyberattacks has been steadily increasing, and phishing attacks, in particular, are among the most common incidents. Organizations are allocating more of their cybersecurity budgets to cloud security, with the main reason being that data breaches and attacks have become more costly due to unplanned expenses to address security vulnerabilities.
The survey found that the top two goals of cloud adoption are to reduce costs and improve security. Supporting remote workers ranked third, which indicates that the pandemic may have accelerated cloud adoption, but cost-efficiency and security are the most significant drivers. On average, organizations report that 41% of their workloads are already in the cloud, and they expect that share to increase to 54% by the end of 2023.

According to the Digital Transformation Office Cloud Storage Technology and Regulations report, based on the responses of 43 out of 57 institutions, highlights several important findings:
When evaluating cloud migration options for selected strategic applications:
From the recommendations:

According to the Cloud Security report published by ISC2 in 2022, here are some global statistics on cloud technologies and adoption:
In the report, it's observed that 93% of the IT executives from companies surveyed in the ISC2 study are concerned about a significant skill shortage among qualified cybersecurity experts.
Furthermore:
Barikat’s The Secure Information Technology Unit can provide the following contributions:
1. Creating Awareness through Education:*A Gartner study indicates that 70% of global business operations have adopted general cloud technologies, and 50% of businesses plan to embrace multi-cloud technologies by 2025. Therefore, it becomes crucial to create awareness through educational programs such as webinars, effective product usage training, and consultancy services.
The Secure Information Technology Unit, can organize training programs, webinars, product usage workshops, and consultancy services to raise awareness within the organization about cloud technologies.
2. Identifying Business Needs for Cloud Migration/Modernization: It's essential to determine the specific business requirements related to scenarios for transitioning to cloud technologies. This includes identifying needs for change management, go-live processes, problem management, software development, backup/archiving processes, and monitoring the dependencies of the digital infrastructure.
This helps clarify which applications and processes will move to the cloud.
3. Automation, modernization and Software Development Support: Recognizing that cloud environments can be configured much like code, the unit can encourage automation and ensure that software development environments possess this capability. This accelerates the transformation and plays a crucial role in evaluating vulnerabilities and addressing issues through analysis and mitigation.
4. Alignment with Cloud Technology Models Despite statistics showing a different picture, there is a significant trend toward modernizing and moving applications to cloud service providers, especially for applications with lower security sensitivity and cost-effective solutions. The unit can help organizations align with cloud technology models such as SaaS, PaaS, or others, based on their specific needs.
5. Promotion of Collaborative Work Methods: The preference for implementing effective cloud usage in software development processes is evident, with 86% advocating for the application of collaborative methods like DevOps, DevSecOps (combining software development, security, and operations teams). This emphasizes the need for effectively positioning services like Secure Information Technology Consulting, Code Security, and SAST/DAST SCA Analysis in the software development lifecycle.
In summary, the Secure Information Technology Unit can add value by enhancing awareness, determining business needs, supporting automation and software development, aligning with cloud technology models, and promoting collaborative work methods to facilitate a successful transition to cloud technologies.
The Secure Information Technology Unit can assist in managing the transition to cloud technologies successfully and securely, helping businesses carry out this transformation effectively.
When we look at the reality of cloud environments, it can be shaped like a configuration file for all network and system infrastructure, just as software is code. Errors can be minimized through manual intervention when necessary. Furthermore, having software development environments with this capability accelerates transformation. Independent product management and, especially, automation support are crucial for evaluating vulnerabilities and conducting analysis work, followed by problem mitigation.
Despite statistics showing a different picture, there is a significant trend where 25% of applications are adopting the SaaS model, and the %12 of applications PaaS model is also preferred by a percentage. Moreover, unless applications have high security sensitivity and are cost-effective, there is a strong inclination, around 81.5%, towards modernizing and transitioning all applications to cloud service providers.
When asked which cloud technology model they would prefer, the majority, around 86%, opt for applying collaborative work methods such as DevOps and DevSecOps in software development processes. This highlights the importance of effective positioning of services like Secure Information Technology Consulting, Code Security, and SAST/DAST SCA Analysis in the software development lifecycle.
In companies, security teams that ensure or audit data and information security are prevalent, making up a significant proportion at 93%.
Therefore, the definition of Secure IT should involve engaging with these teams, and their requirements can be outlined as follows:
In the transition and operational processes of cloud services:
These steps are crucial for maintaining security and compliance in cloud service adoption and operation.




References:
Author
Mehmet Emre ATEŞ
Secure Information Technologies Unit Manager