Industry executives and experts share their predictions for 2024. Read them in this 16th annual VMblog.com series exclusive.
2024 Predictions for Cloud Computing: Advancements in Security and Automation
By Tom Bridge, director of product management, devices at JumpCloud
Cloud computing continues to drive the development of all kinds of
new technologies and 2024 will be no different. Gartner predicts that public cloud end-user
spending is going to reach $600 billion in 2023, and there's little reason to
doubt it'll grow well beyond that in 2024. For net-new applications and
workloads, nearly half (47%) of organizations follow a cloud-first strategy, and
the one-in-four organizations that are on-prem-first, (26%) still report
interest in compelling cases to deploy in cloud. As the pace of innovation
accelerates, there are some important emerging trends around securing organization
in a cloud world.
Three trends I see for 2024 are the need to secure Continuous
Integration/Continuous Deployment (CI/CD) pipelines; automation around identity
and access for containerized workflows; and implementing continuous conditional
access for cloud computing.
1. Secure CI/CD Pipelines: Safeguarding Your iOS and macOS
Software in the Cloud
Organizations are increasingly relying on CI/CD pipelines to
streamline the development and deployment of software, including iOS and macOS
applications. However, recent news, such as the CircleCI hack, serves as a stark reminder
of the vulnerability of these pipelines to cyber threats. A breach in a CI/CD
pipeline can lead to a compromised codebase, potentially causing significant
damage to an organization's reputation and financial stability.
These pipelines enable rapid iteration and deployment, letting
engineering teams to deliver highly functional code at high velocity. To
mitigate the risk, start by reviewing dependencies from third parties for CVE
to make sure no vulnerable software is going into production. Use
best-available security measures like encryption of data in transit, code
signing, network segmentation and secure network authentication, SSH key
management, and repeatable user provisioning and deprovisioning process.
Integrating vulnerability scanning and security testing into the
CI/CD process can help identify and remediate potential threats early in the
development cycle. Employing security best practices and keeping the pipeline
infrastructure up-to-date are also important steps in maintaining a secure
CI/CD environment.
2. Identity and Access for Containerized Workflows: The Rising
Significance
Containers offer efficiency and flexibility, but they also
introduce new challenges in terms of identity and access management. As
infrastructure as a service (IaaS) gains traction, organizations are shifting
towards containerized workflows. However, the automation that accompanies
containerization must be coupled with strong authenticated automation to ensure
the security of these environments. It boils down to this: automation is
awesome, but authenticated automation is even better.
Authenticated automation controls access to automated processes
and ensures that only authorized personnel can initiate or modify them. This is
critical for maintaining the integrity of containerized workflows as
unauthorized access can lead to data breaches, service disruptions, and other
security incidents.
Organizations implement authenticated automation by using robust
identity and access management policies, multi-factor authentication (MFA), and
role-based access control (RBAC). These measures can secure container
orchestration platforms like Kubernetes and ensure only authorized users are
granted access. Regularly auditing and monitoring access to containerized
environments can help to identify and mitigate potential threats in a timely
manner.
3. Continuous Conditional Access for Cloud Computing: Elevating
Compliance Efforts
With innovations in cloud computing, developments in AI, and
increased demand for regulatory oversight and standardization, organizations
are rightfully focusing on compliance issues. In this context, continuous
conditional access has emerged as the new "Zero Trust Network Access"
(ZTNA). It enforces strict access controls based on various factors, including
the user's identity, device, location, and the sensitivity of the data or
application being accessed.
Continuous conditional access ensures that access to cloud
resources is always aligned with the organization's security policies, reducing
the risk of unauthorized access and data breaches.
To implement continuous conditional access, leverage advanced IAM
management solutions that provide real-time visibility into user activities and
the ability to set dynamic access policies. This approach helps organizations
remain agile while maintaining strict security controls, elevating compliance
efforts and securing cloud computing environments.
As we head into 2024, securing CI/CD pipelines, managing identity
and access for containerized workflows, and implementing continuous conditional
access are essential steps in safeguarding your organization's digital assets
and maintaining trust with customers and stakeholders.
##
ABOUT THE AUTHOR
Tom Bridge is the director of product management, devices at JumpCloud. He is also the producer of
the Mac Admins Podcast and a co-chair and board
member of the Mac Admins Foundation, whose mission is to foster
connections, share and preserve knowledge, protect the independence of the
community, and maintain broad accessibility to all community resources.
Prior to joining JumpCloud, he was a partner at Technolutionary LLC, where he
managed IT operations for over 15 years.