Identify and protect sensitive data anywhere on Hybrid IT , improving compliance and enhancing digital sovereignty.
Simplify data security with platforms that reduce the complexity of multi-cloud deployments and give you control.
Increase speed of Dev-Ops by adding data security from the start Operate in secure clouds & deliver new, trusted digital services.
There are many reasons that could be pushing enterprises into expanding their portfolio of cloud providers. An interest in additional functionality, a move to diversify operations for greater resilience, partnerships, service availability and especially mergers and acquisitions are all possible causes that may be behind the increasing numbers, but the study results are clear – multicloud use continues to grow. Average number of cloud infrastructure providers (IaaS and PaaS) is up 35% over two years (from 1.68 to 2.26). With each additional cloud provider, there are new security controls and data protection models to understand and implement. Cloud users have to extend their existing operating processes further, while understanding the constraints of the new environment.
Of the following cloud Infrastructure as a Service (IaaS) providers, which does your organization use or plan to use in a production capacity?
With the increasing use of cloud-based resources, it’s important to understand perceptions of the threat landscape and the experiences that respondents have had in defending cloud resources. The study asked respondents to rank a set of attack targets by likelihood of attack. Garnering the most votes, more than a third (38%) of respondents say SaaS apps are the top target for cyberattacks, with 36% identifying cloud storage. It’s an indication of the level of concern that exists for cloud-based resources. And it’s not a concern that is unfounded.
Organizations identify the potential exposure of applications and data stored in the cloud as a risk. In fact, about half (46%) say they have experienced a data breach in their cloud environment. The number experiencing a data breach in the last year is up 4 percentage points (from 35% to 39%) from last year’s report. As attackers target cloud-based resources, there’s a greater need for organizations to improve their security posture. As the data indicates, that task is all the more difficult when there are more cloud providers to secure, which could be contributing to the reported increase in successful attacks.
With a larger number of platforms to secure, the opportunity for operational errors grows, increasing the attack surface with each error. Organizations either have to dedicate separate teams to specialize in each platform or expect their security teams to become well-versed in multiple platforms at the same time. Respondents say that human error is the leading cause of cloud data breaches, which might be an indication that the strategy they’re using for platform management is not working well enough.
As organizations are embracing cloud, the attacker community is increasing its presence and skill level in those same environments. That means that the threat landscape in the cloud will continue to become more hostile and require increasing effort to secure. This pressure, combined with increasing cloud environments, puts a greater emphasis on the ability of security teams to become more efficient insecurity operations.
The study results confirm that there are more workloads and data residing in the cloud, with those with 60% or more of their workloads and data in the cloud increasing from 23% to 27% in the last year. That mirrors larger industry trends as cloud becomes a more common path for new applications. There is a bigger story around sensitive data.
The study looked both at the amount of an organization’s sensitive data that is stored in the cloud and the amount of data in the cloud that is sensitive. There is a notable increase in both areas. There has been a dramatic increase in the amount of an organization’s sensitive data in the cloud. In 2022, 52% of respondents reported that more than 40% of their sensitive data was in the cloud. This year, this amount dramatically increased to 64%. That’s most likely due to larger numbers of core applications running in the cloud, applications that are bringing the critical data that they handle with them.
The number of respondents saying that 40% or more of their data in the cloud is sensitive increased in a similar fashion – moving from 49% in 2021 up to 75% in 2023. That increase of more than 50%, combined with an increase in the number of cloud platforms, could be another factor leading to challenges in managing cloud data security. Point data protection controls alone cannot keep up with the volume and diversity of sensitive data growth.
Even though more data is in the cloud and more of that data is considered sensitive, there is still much that is not encrypted. More sensitive data is being encrypted, but levels are still low. Only 22% of respondents report that more than 60% of their sensitive data in the cloud is encrypted, with the average being 45% of data being encrypted. This is a marked improvement from previous years. In 2021, only 17% reported that more than 50% of sensitive data was encrypted. This year, that number is 40%. Only 2% report 100% encryption of sensitive data in the cloud this year.
There are clearly many factors at work that limit the use of encryption to these levels, but it raises serious questions about approaches to data security when such significant volumes of data identified as sensitive aren’t encrypted. A lack of understanding of specific cloud encryption operations might be a contributor because cloud environments typically operate differently than traditional on-premises systems. Concerns about limiting developer productivity might weigh on some organizations. It could also be that organizations are carrying the traditional practice of relying on application-based data protection into clouds, where it is clearly not sufficient to address third-party risk. Whatever the cause, organizations need to do more, especially in light of regulatory requirements that are taking on a larger role in data protection.
What percentage of your organization’s sensitive data in the cloud is encrypted?
Digital sovereignty is a global strategic initiative, and privacy compliance represents opportunities for enterprises to mature their data management capabilities. It’s a critical functionality because concerns about digital sovereignty can hinder digital transformation if organizations can’t effectively manage the data that fuels their businesses. It can present challenges with requirements to control and manage where data is stored and used and who has access to it. When asked about digital sovereignty, 83% of respondents worldwide say they are “somewhat” or ”very” concerned about impacts on cloud deployments.
The foundation of digital sovereignty is not the cloud provider but the data management capability of the infrastructure that supports the workloads and applications under the data custodian’s control. The use of cloud-based resources introduces a third party that legacy data management strategies may not have addressed. Those leveraging cloud need to ensure not only that the data being secured is protected from disclosure but also that it is delivered only to those environments where it should be used. Multicloud environments can help address digital sovereignty requirements as organizations leverage different cloud environments for regional coverage. However, that potential benefit could add complexity if organizations aren’t able to simplify the way they manage the various clouds that make up their infrastructure.
Regarding expectations for meeting digital sovereignty requirements, 96% of respondents believe that designating or changing the location and jurisdiction or the use of full data encryption are acceptable measures to achieve various levels of digital sovereignty. Only the remaining 4% are not concerned about the location of data with respect to sovereignty mandates. More than a third (35%) believe that location is important for all workloads. This reflects both the concern about regulations that use the physical location of data as a means of protection and the growing interest in cryptographic protections as a sufficient means of protection. With the latter, data encryption provides the isolation required and ensures that no matter where the data is located, it is protected from disclosure to unauthorized parties. It’s an approach that has many advantages and is under active exploration by a number of regulatory bodies.
Organizations need to understand that the core elements of digital sovereignty will become a requirement for all. While it may seem that those operating within a single region could remain exempt, providing highly available digital customer experiences will eventually require the same level of data protection. By building in better data protection capabilities today, they’ll be prepared for whatever requirements regulators, either local or global, put forward in the future.
A further confirmation of the complexity in data protection management comes from a question on the number of key management systems in use. Almost two-thirds (62%) say they have five or more key management systems in place across their operational infrastructure. That means that there are independent realms in which data protection must be managed. More than a quarter of respondents (27%) say their cloud provider controls all of their keys. As with other aspects of multicloud security management, organizations will either have to have dedicated teams for each cloud or expect their teams to be skilled in key management operations for all of their providers at the same time. With this situation, it’s not surprising that respondents report human error as the leading cause of cloud data breaches (55%), well ahead of the second cause, exploitation of vulnerabilities (21%). Complex operational environments are all too susceptible to human failings. This is another area where organizations have to simplify their security management to become more effective.
It’s also an improvement that can address the leading cause of cloud data breaches: human error. Making security operations more efficient can make them more effective. Building security management systems that can leverage automation and span the full range of an organization’s infrastructure is a critical goal.
Improving operational architectures is another area to improve security posture. Getting to a zero-trust footing in the cloud can build a better foundation for operational security. Only 41% have zero-trust controls on cloud infrastructure, and even fewer (38%) use zero-trust controls in cloud networks.
The study results point to a set of challenges that organizations are facing in securing data in the cloud environments. They’re living in a multi-cloud world and need to be able to secure it effectively and efficiently. They need to overcome the complexity that working across cloud infrastructure and SaaS environments presents. Data protection in the cloud must become simpler to manage to over come issues with human error and misconfiguration. The results of the study indicate specific areas that need improvement.
Key management environments need to be consolidated. Doing so can deliver the operational control that’s needed to scale up the use of encryption in ways existing security teams can handle. At the same time, organizations need to take advantage of the force-multiplying power of automation. It is underutilized in security, more so than in other technological disciplines, and is another tool to reduce the risk of human error alongside the efficiency gains it provides. These improvements can also bolster digital sovereignty compliance efforts with the necessary controls to ensure data is where it needs to be and is well protected.
The most effective way to improve cloud data security is to ensure that cloud environments can be treated as an extension of existing infrastructure, not a special case. That’s a mandate for technologies that can span the multiple environments that organizations find themselves in with a common security management environment. It’s a pathway to making all of an organization’s data protections more effective and efficient.
Versatile and compact, entry-level 10 Mbps-1 Gbps network encryptors provide security without comprising network performance.
Provides optical Ethernet interface encryption in a versatile, compact platform for a range of Fibre to the x (FTTx) configurations up to 1 Gbps.