In simple terms, when your applications are running in the cloud, all your software applications, data storage and services run on infrastructure provided by your cloud provider. In most cases the cloud provider will have made significant investments securing that service from cyber-attack; far more investment than all but the very largest organisations make. Microsoft, for example, invest over $1 billion annually in security and employ 3,500 cyber security experts.
So, by running your applications in the cloud, you inherit the investment that your cloud provider continues to make, keeping it secure against the ever-changing cyber security threat landscape. These investments typically include:
• Sophisticated multi-layer cyber security architecture and tooling used to prevent, detect, and respond to cyber-attack more efficiently than ever.
• 24x7x365 monitoring and response capability, so they can react no matter when an attack is launched.
• Embedded processes to ensure that security is maintained against all the latest identified security vulnerabilities.
• Teams of highly trained specialists, with scarce and valuable (read expensive!) skills.
• Industry standard certifications, including ISO27001, providing external validation that their cyber security capabilities are operating effectively.
On its own this bundle of capabilities looks attractive; particularly as ensuring the operability of your systems and security of the data held on them is non-negotiable. The increase in business transacted online, a trend accelerated by COVID, means this has never been truer than it is today. When you remember all that is on top of the other benefits that moving your business to the cloud can offer then the case for cloud, and the security you inherit with it, makes even more sense:
• Speed of deployment.
• Scalability of compute and storage.
• Reliability and availability of applications.
• Reduced management overhead and less external tooling requirements.
• Accessibility, over the internet anytime, anywhere, on any device.
• Disaster recovery, and the ability to backup and restore data with ease.