Cloud Migration Security Woes

Anton Chuvakin
Dec 11 · 2 min read

As I hear of organizations dealing with security when migrating to the cloud, I occasionally observe cases of “extreme lift and shift.” I use this label to describe a case when an organization wants to keep every single security technology that they use on-premise after they move to the public cloud. The list can be very long and tedious; it may include such staples as firewalls, anti-malware, SIEM, EDR, NIDS, and even network forensics and NDR.

Let’s ponder this situation without judgement. Two things come to mind first:

  1. Focusing on controls vs control intent
  2. Adapting to threat model changes

First, why are existing controls being replicated verbatim if there are cloud-style controls available from your cloud provider or from a cloud-focused third party vendor? Won’t you be better off if you “deduce” (or: find the documentation for) the intent of the existing controls and then deploy cloud controls that serve the same intent? “Better” here may mean both more effective, less expensive (!) and likely more secure. For example, you may have used a security configuration scanner on-premise, but now you can use the tools your cloud provider has for the same purpose?

Second, why are the same controls even considered if the threat model may be different? Assuming your on-premise controls served your compliance, security and risks perfectly (it IS possible, no?), why do you then assume that your requirements are the same in the cloud? In fact, you have robust evidence that they are not! Here is a trivial example: physical security is well taken care of so some threats are clearly gone from your model. There are in fact both added and removed threats. In theory, you now have a new class of insider threat. And you have a broad range of threats that either become irrelevant or are effectively addressed by the provider.

So.

Mini-conclusions / actions:

  • When migrating to the public cloud, look at how your threats change as a result (this came out as “duh!” advice, but it seems needed nonetheless …)
  • When reviewing your existing security controls before migration, look at their intent and then (if the changed threats above make this intent still relevant) consider cloud-focused/cloud-native controls to address the same intent.
  • To do the above well, you do need to spend a bit of time learning about the cloud-native security controls (example)
  • Don’t just copy/paste security stuff from the data center world to the cloud world!

P.S. Well, this came out more of an incomplete thought (because, frankly, there is a lot more security choices when migrating), but I feel that these two deserve a lot of attention.

Related blog posts:

Anton on Security

A new start for my security blog

Medium is an open platform where 170 million readers come to find insightful and dynamic thinking. Here, expert and undiscovered voices alike dive into the heart of any topic and bring new ideas to the surface. Learn more

Follow the writers, publications, and topics that matter to you, and you’ll see them on your homepage and in your inbox. Explore

If you have a story to tell, knowledge to share, or a perspective to offer — welcome home. It’s easy and free to post your thinking on any topic. Write on Medium

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store