Skip to main content
banner image
venafi logo

Dynamism in the Cloud Complicates the Task of Securing Machine Communication

Dynamism in the Cloud Complicates the Task of Securing Machine Communication

cloud security
April 10, 2018 | David Bisson

The cloud changes everything for security, especially for organizations accustomed to protecting physical devices. Physical security is evolving to include the influx of mobile and the Internet of Things (IoT) machines. Organizations can build upon their history of assigning unique machine identities to assets like laptops and servers in order to manage and secure mobile and IoT devices and applications. The same cannot be said about organizations' engagement with the cloud.

The cloud offers companies speed, better manageability, reduced maintenance, and improved agility to adjust to ever-evolving business needs. But, the cloud also introduces a new slew of virtual machines that are fundamentally different from physical devices. The average lifecycle of these cloud-based assets is just over three weeks as opposed to 3-5 years for physical machines. This means that the number of cloud machine identities that need to be issued and installed, and later decommissioned, is growing at an extraordinary rate.

Even more importantly, cloud-based resources are oftentimes responsible for creating, updating, and destroying other virtual machines, which makes increasingly difficult to assign a machine identity to every virtual network asset and monitor those identities. In this environment, protecting communication to, from, and within the cloud becomes much more complex. Without secure machine identities, it’s simply not possible to keep cloud communication protected and private.

The challenge of securing machine identities in the cloud won't be going away anytime soon. If anything, it'll grow in complexity over the coming years as organizations increasingly move their IT processing infrastructure to the cloud. Indeed, Gartner forecaststhat cloud data centers will process 92 percent of workloads by 2020. Supporting that expansion, it's estimatedthat public cloud spending will grow nearly seven times faster than traditional IT spending. And Cisco's Global Cloud Index is predictingthat cloud workloads will more than triple in the next few years.

It's important that organizations be able to identify, authenticate, and secure all machines—both physical and virtual—as well as their communication with other machines across the IT environment. However, with the projected growth of the cloud and the corresponding rise of machine-to-machine communication across different network layers, organizations can't hope to manage this process manually. Their only hope is to automate the process of identifying, automating, and remediating the identities of their machines.

The Venafi Platform can help in this regard.

For more information concerning the rise of the cloud and the challenges it poses to machine identity management, click here.

Related blogs

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

man shrugging his shouldders, torso shot, dressed in business attire

Jury Out on Whether Reducing Certificate Lifetimes Would Actually Improve Security

Elizabeth Warren image Corporate Executive Accountability Act

Can Encryption Save Execs from Blame in Breaches? [Ask Infosec Pros]

Why Encryption Should Be the Next Step in Operationalizing GDPR Compliance

Why Encryption Should Be the Next Step in Operationalizing GDPR Compliance

About the author

David Bisson
David Bisson

David is a Contributing Editor at IBM Security Intelligence.David Bisson is a security journalist who works as Contributing Editor for IBM's Security Intelligence, Associate Editor for Tripwire and Contributing Writer for Gemalto, Venafi, Zix, Bora Design and others.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat