No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Workloads Are the New Atomic Unit on IT Landscape

The Cloud Transformation and the De-Emphasis of Servers

by Robert Clyde
May 22, 2017
in Cybersecurity, Data Privacy
view of server room under dim lights

The Cloud Transformation and the De-Emphasis of Servers

Enterprises’ move to the cloud brings the potential for improved security and reliability, but it also can cause unease for some IT professionals who are accustomed to operating servers. Effective workload security can provide the foundation for successful cloud transformation.

Servers have long been considered the foundational element of IT.

IT pros are used to operating and maintaining servers. In many cases, their professional identity is strongly linked to their server expertise.

As technology evolves, though, it is time for IT professionals who retain a server-hugging mindset to accept and embrace the new reality. To borrow a phrase from Fred Kost of HyTrust, workloads are the new atomic unit of IT. Workloads have the computing, software, data and networking capabilities necessary to perform a desired function.

This cloud-driven evolution can be unsettling for some IT professionals who are much more comfortable knowing where systems are running. While cloud adoption has been rising – the global public cloud market will be US $146 billion in 2017, up from $87 billion in 2015, according to Forrester [1] – that old-school mentality, combined with a variety of privacy and regulatory challenges, has given some organizations pause about retooling their IT infrastructure.

With few exceptions, enterprises with less than 1,000 employees that are not seriously considering moving 100 percent of their operation to public cloud are missing the mark. Major cloud providers are equipped to provide a level of reliability, security and business continuity with which smaller companies are unable to compete.

Workload security is the key element in the cloud transformation. It can eliminate privileged account misuse, halt data breaches, remove costly infrastructure gaps and stop accidental downtime. The privileged user component can have an especially profound impact. Without the proper workload security, privileged users have the ability to move workloads around or even delete thousands of them in one fell swoop. A bank that would not permit an individual admin to write a $100 check could allow that same person to essentially topple the bank’s production systems in a matter of seconds, highlighting the need for sound administrative controls – such as the ones determined by following the COBIT framework – to be in place.

Containers – rapidly becoming the new normal – will be key to how these workloads function. Containerization is becoming popular among developers and data centers as a method to separate an application from the operating system and the physical infrastructure that it uses to connect to the network. Containers have similarities to virtual machines but do not each contain a copy of the operation like a virtual machine does. This means they can be started and stopped much more quickly than virtual machines. Containers often exist for short durations, sometimes seconds, and like virtual machines, they move around.

Once enterprises opt to move to cloud, there are important decisions to make, such as which type of cloud provider – public, private, hybrid, multicloud – best fits the organization’s needs. It may not be easy to migrate an enterprise’s data from one provider to another, so organizations should be careful to avoid becoming locked into a vendor that is not the right fit.

It is also necessary to understand where the service provider’s responsibility ends and the enterprise’s responsibility begins relative to security and reliability. Details such as agreeing on the notification and severity level for incident management and understanding how business continuity and disaster recovery plans align must be clearly defined.

Another critical choice is who controls and manages the encryption keys. At first blush, many would think the company, not the cloud provider, should own the keys. Not so fast. What’s a more likely risk – that a seasoned cloud provider managing the keys will fail to safeguard the data and the keys, or that the enterprise will lose its keys and be unable to access its data? For many small businesses, the better option might be to let the cloud provider manage the keys. Larger organizations with strong key management capabilities are likely to want control over the keys.

Moving to the cloud can improve an enterprise’s IT efficiency and security, but the decision must be made thoughtfully. We’re rapidly moving toward an IT landscape that will be reliant on continuous security monitoring and continuous auditing – and all of that automated. The roles of technology professionals will continue drifting away from maintaining servers and toward ensuring the automation is functioning correctly.

[1] Forrester, Predictions 2017: Customer-Obsessed Enterprises Launch Cloud’s Second Decade, November 2016


Tags: AutomationCloud ComplianceMonitoring
Previous Post

The Case for Compliance Automation

Next Post

Insights from the Global Fraud & Risk Report

Robert Clyde

Robert Clyde

Related Posts

cloud computing security

Cloud Security Isn’t Just on Your Provider; It’s Your Job, Too

by Wolters Kluwer
March 1, 2023

Organizations want to embrace all the benefits the cloud has to offer while still protecting their sensitive data. Engaging a...

data spillage

Instead of Crying Over Spilled Data, Shore up Your Governance Practices

by Rich Hale
October 12, 2022

The reputational damage and compliance failures that result from a data spillage incident are well-known, and as the volume of...

amazon web services

Dark Clouds: Capital One Proves Financial Institutions Can’t Rely on Providers for Security

by Michael Volkov
September 7, 2022

Going by the online handle “erratic,” a former Amazon software engineer conducted an extensive hacking scheme that gave her access...

DOJ increasing monitorships

DOJ Signals Expanded Use of Independent Monitors for Corporate Criminal Enforcement

by Womble Bond Dickinson
June 8, 2022

The DOJ indicates that it will increase the use of monitors in corporate criminal enforcement; what does that mean for...

Next Post
waves of data on black background

Insights from the Global Fraud & Risk Report

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Code of Conduct Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT