SlideShare a Scribd company logo
2
Most read
5
Most read
STORIES
The benefits of a security-
first approach to cloud
Make
cloud
secure by
design
Copyright © 2022 Accenture. All rights reserved
Secure
by design
Call for change
As we have seen in the last 18 months, cloud
opens the door to organizational agility on an
unprecedented scale. But security is essential to take
advantage of cloud’s potential. Accenture, with our
size, scale and complexity, has experienced first-
hand the power of cloud security.
Six years ago, Accenture initiated the move into the
cloud. While our recent research has identified that
security and compliance risk is seen as one of top
two pain points of cloud adoption, we were clear
from the outset that cloud security would be a critical
component to supporting our business needs.
Moving from on-premise infrastructure where we had
complete control, to collaborating in the cloud with
vendors and needing to rely on their technology and
environment was a big shift. Infrastructure and new
service capabilities in the cloud are different; we couldn’t
simply replicate what we had on-premise directly into the
cloud.
We needed to reimagine the approach to
implementing our security model to harness
the capabilities of cloud native solutions. We
evolved core security guiding principles to meet
the requirements of operating in the cloud. We
redefined our security rules to flex around the
updated cloud-based infrastructure. Today, when we
look at our security approach we think beyond just
infrastructure to an application, data and code level
as well.
From the initial migration, we are now running 95%
of our applications in the cloud. Our strategy was to
be secure from the start, reframing our security in
terms of cloud capabilities, which has helped us to
see how our cloud solutions can support every
element of security needed within the business.
Copyright © 2022 Accenture. All rights reserved
Principles
in practice
When tech meets human ingenuity
Copyright © 2022 Accenture. All rights reserved
Early on in our cloud continuum journey, we
recognized the need to evolve our security
practices to accommodate our core security
values for the cloud. We wanted to be powered by
code, securing our application and infrastructure
code from the start. We infused analytics that
were behavior-driven, using automated artificial
intelligence (AI) behavioral analytics to identify
anomalies faster and with more accuracy when
working across our cloud platforms. It was
important to us to be cloud agnostic, fit for a
multi-cloud environment, so that the security
framework and principles apply to any cloud
vendor with auditability.
What’s more we embedded robust defense,
relying on multiple layers of security at varying
depths: cloud, network, access, data and
endpoints. We centered our strategy on a zero
trust approach, protecting every aspect of the
cloud security journey by treating everything as
untrusted. With the focus on zero trust, we
followed an identity-centric approach, basing all
access on identity where every request is
explicitly verified.
Copyright © 2022 Accenture. All rights reserved
Cloud security is not
a one-size-fits-all; it’s
multi-faceted. By taking
a comprehensive
view across access,
applications, services
and data we’ve created
a truly holistic cloud
security approach.
PENELOPE PRETT
Chief Information Officer, Accenture
When tech meets human ingenuity
Five core functions contributed to a successful cloud security journey:
We shared responsibilities. As we increased our
software as-a-service (SaaS) and platform as-a-
service (PaaS) consumption in the cloud, we
focused on and trusted in a shared responsibility
model with our cloud vendors. Our partnerships with
Microsoft, Amazon and Google cloud services took
advantage of their experience in the market, their
wide security certifications, and the fact that they
value security as much as we do.
We sought out cloud-based solutions. Cloud
providers are investing heavily in their innovation
offerings and security. By using cloud native and
cloud-based policies, controls, processes and
technologies we were able to tap into an inherent
agility and scale when it came to supporting our
own cloud security.
We enabled compliance. Partnering with our
providers, our cloud security strategy anchors to
industry-recognized standards and continuously
adapts to enterprise business needs. We adhere to
industry defined policies, using alerts, following the
zero trust principle and managing security through
code to maintain compliance.
We increased visibility. We took a multi-layered
approach, enhancing security through cloud vendors’
technology and advanced threat detection solutions.
We gained visibility not only for our own actionable
management, but also external auditability.
We baked in trust. We believe identity is the new
firewall. Our identity-centric approach means we have
adopted a zero trust strategy in which we embed
proper and continuous identity validation. Trust is now
fundamentally going to be driven by identity and role.
Copyright © 2022 Accenture. All rights reserved
Evolving
holistic security
A valuable difference
We have taken a comprehensive view across the
various components of operating in the cloud to
create a truly holistic cloud security strategy. As
we implement this transformational approach to
security across a multi-cloud infrastructure, we
can continue to enforce highly effective security
policies, resources and services.
Here are some of our lessons learned around effective
cloud security:
• Design in terms of the cloud: A cloud continuum
journey requires a very different operating model to
any on-premise solution. Reimagine your security
principles, to unlock the power of security in the cloud
and transform your business.
• Make the cultural shift: Bridge the cultural gap to cloud
native services from the top down. Education and
training can help to change mindsets so that people
understand the benefits of cloud and why your
security posture is important.
• Promote partnership: It’s important to build trusted
relationships with your providers and to look at the
ownership of security as shared. Also, keep in mind
that the investments in security made by the major
cloud providers are far in excess of what’s feasible for
most IT organizations—offering an advantage to those
who collaborate more effectively.
Going forward, to secure and manage access controls
across a multi-cloud environment, we have our sights
set on cross-platform alignment so that all identities align
across all platforms and vendors. Using data as the
key driver, our cloud security will continue to be
comprehensive as our cloud capabilities grow
across platforms.
And we want to discover new solutions and augment our
security with AI for threat detection and machine learning
to remediate our code to prevent potential vulnerabilities.
This combined with our Prevent, Protect, Detect,
and Recover strategy can strengthen our zero
trust imperative.
There's some exciting
things on the horizon. As
our AI and machine
learning capabilities
grow, we’ll be able to
detect anomalies in
behavior and make rapid
decisions to act on
security threats in the
cloud. Having a more
highly automated
response is a powerful
proposition and could
reinvent cloud security
as we know it.
DON GALZARANO
Managing Director—Global IT,
Enterprise Technology, Intelligent
Cloud & Networks, Accenture
Copyright © 2022 Accenture. All rights reserved
Copyright © 2022 Accenture.
All rights reserved.
Accenture and its logo
are trademarks of Accenture.
About Accenture
Accenture is a global professional services company with leading
capabilities in digital, cloud and security. Combining unmatched
experience and specialized skills across more than 40 industries,
we offer Strategy and Consulting, Interactive, Technology and
Operations services — all powered by the world’s largest network of
Advanced Technology and Intelligent Operations centers. Our
699,000 people deliver on the promise of technology and human
ingenuity every day, serving clients in more than 120 countries. We
embrace the power of change to create value and shared success
for our clients, people, shareholders, partners and communities.
Visit us at www.accenture.com.
Contact
Merim Becirovic
Managing Director
Global IT
Enterprise Technology
Don Galzarano
Managing Director
Global IT
Enterprise Technology, Intelligent
Cloud & Networks
/merim-becirovic
/don-galzarano

More Related Content

PDF
Get the most from your cloud journey
PDF
The Rise of Forerunners | Accenture
PDF
The Industrialist: Trends & Innovations - November 2022
PDF
The Industrialist: Trends & Innovations - July 2022
PDF
Engineering Services: con gli ingegneri per creare valore sostenibile
PDF
Value Untangled Slideshare
PDF
Biopharma's search for sustainable growth
PDF
Retail’s Responsible Reset | Accenture
Get the most from your cloud journey
The Rise of Forerunners | Accenture
The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - July 2022
Engineering Services: con gli ingegneri per creare valore sostenibile
Value Untangled Slideshare
Biopharma's search for sustainable growth
Retail’s Responsible Reset | Accenture

What's hot (20)

PDF
Accenture Tech Vision 2020 - Trend 2
PDF
Reinventing the client journey
PDF
How enterprise networks can boost Cloud Continuum experience
PPTX
Reinventing Enterprise Operations
PDF
Technology Trends 2021 | Tech Vision | Accenture
PPTX
CSPs' Critical Role in the Race to Net Zero Emissions
PDF
Digitaizing Business Services
PDF
More deals, less money: the Black founder funding journey
PDF
Transforming the Industry That Transformed the World
PDF
Growth-Driving Enterprise Innovation Model | Accenture
PDF
Research and Development Solutions | Accenture
PDF
Reinventing the Last Mile: Win the Race to the Top (AU)
PDF
Accenture Communications Industry 2021 - Connectivity Optimizer
PDF
Pathways to Profitability for the Communications Industry
PDF
Digital Supply Chain Workforce Future | Accenture
PDF
New Value in Sustainability
PPTX
Health Experience: The difference between loyalty & leaving
PDF
Digitizing Business Services
PPTX
Accenture Media & Entertainment Industry 2021 - The Lifestyle Media Platform ...
PDF
Accenture Tech Vision 2020 - Trend 5
Accenture Tech Vision 2020 - Trend 2
Reinventing the client journey
How enterprise networks can boost Cloud Continuum experience
Reinventing Enterprise Operations
Technology Trends 2021 | Tech Vision | Accenture
CSPs' Critical Role in the Race to Net Zero Emissions
Digitaizing Business Services
More deals, less money: the Black founder funding journey
Transforming the Industry That Transformed the World
Growth-Driving Enterprise Innovation Model | Accenture
Research and Development Solutions | Accenture
Reinventing the Last Mile: Win the Race to the Top (AU)
Accenture Communications Industry 2021 - Connectivity Optimizer
Pathways to Profitability for the Communications Industry
Digital Supply Chain Workforce Future | Accenture
New Value in Sustainability
Health Experience: The difference between loyalty & leaving
Digitizing Business Services
Accenture Media & Entertainment Industry 2021 - The Lifestyle Media Platform ...
Accenture Tech Vision 2020 - Trend 5
Ad

Similar to Zero trust strategy: cloud security by design (20)

PDF
Resetting Your Security Thinking for the Public Cloud
PPTX
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
PDF
Security Considerations When Using Cloud Infrastructure Services.pdf
PDF
How Secure Is Cloud
PDF
Keys to success and security in the cloud
PDF
Keys-to-Success-and-Security-in-the-Cloud
PDF
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
PPT
J Tobolski Cloud Computing
PDF
Whitepaper: Security of the Cloud
PDF
Security of the Cloud
PDF
Avoiding Limitations of Traditional Approaches to Security
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PDF
Cybersecurity in the Cloud: Safer Than You Think
DOCX
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
PDF
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
PDF
Top 5 Cloud Security Threats in 2025 and Ways to Avoid Them
PDF
Cloud security: Accelerating cloud adoption
PPTX
Isaca cloud security presentation duncan unwin 16 jul13
PPTX
cloud computer security fundamentals Unit-5.pptx
PDF
How We Protect Our Business in the Cloud (The Smart Way)
Resetting Your Security Thinking for the Public Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
Security Considerations When Using Cloud Infrastructure Services.pdf
How Secure Is Cloud
Keys to success and security in the cloud
Keys-to-Success-and-Security-in-the-Cloud
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
J Tobolski Cloud Computing
Whitepaper: Security of the Cloud
Security of the Cloud
Avoiding Limitations of Traditional Approaches to Security
Effectively and Securely Using the Cloud Computing Paradigm
Cybersecurity in the Cloud: Safer Than You Think
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top 5 Cloud Security Threats in 2025 and Ways to Avoid Them
Cloud security: Accelerating cloud adoption
Isaca cloud security presentation duncan unwin 16 jul13
cloud computer security fundamentals Unit-5.pptx
How We Protect Our Business in the Cloud (The Smart Way)
Ad

More from accenture (20)

PDF
The Industrialist: Trends & Innovations - January 2024
PDF
The Industrialist: Trends & Innovations - September 2023
PPTX
Accenture Technology Vision - How the trends apply to higher education
PDF
The Industrialist: Trends & Innovations - July 2023
PDF
Accenture Technology Vision - How the trends apply to higher education
PDF
Digital Euro: Implications for the Financial System
PDF
The Industrialist: Trends & Innovations - June 2023
PPTX
Semiconductor Gender Parity Study
PDF
The Industrialist: Trends & Innovations - March 2023
PDF
Nonprofit reinvention in a time of unprecedented change
PPTX
Free to be 100% me
PDF
The Industrialist: Trends & Innovations - February 2023
PDF
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
PDF
The Industrialist: Trends & Innovations - January 2023
PDF
Reimagining the Agenda | Accenture
PDF
Climate Leadership Eleventh Hour | Accenture
PDF
Sustainable Value Chain
PDF
Chemical Companies in the Metaverse
PPTX
Sustainable Value Chain
PDF
The Reinvention Reset | Accenture
The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - September 2023
Accenture Technology Vision - How the trends apply to higher education
The Industrialist: Trends & Innovations - July 2023
Accenture Technology Vision - How the trends apply to higher education
Digital Euro: Implications for the Financial System
The Industrialist: Trends & Innovations - June 2023
Semiconductor Gender Parity Study
The Industrialist: Trends & Innovations - March 2023
Nonprofit reinvention in a time of unprecedented change
Free to be 100% me
The Industrialist: Trends & Innovations - February 2023
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
The Industrialist: Trends & Innovations - January 2023
Reimagining the Agenda | Accenture
Climate Leadership Eleventh Hour | Accenture
Sustainable Value Chain
Chemical Companies in the Metaverse
Sustainable Value Chain
The Reinvention Reset | Accenture

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Big Data Technologies - Introduction.pptx
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Electronic commerce courselecture one. Pdf
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Unlocking AI with Model Context Protocol (MCP)
Big Data Technologies - Introduction.pptx
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Understanding_Digital_Forensics_Presentation.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Mobile App Security Testing_ A Comprehensive Guide.pdf
Network Security Unit 5.pdf for BCA BBA.
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Machine learning based COVID-19 study performance prediction
NewMind AI Monthly Chronicles - July 2025
Advanced methodologies resolving dimensionality complications for autism neur...
Electronic commerce courselecture one. Pdf
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
The Rise and Fall of 3GPP – Time for a Sabbatical?
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Diabetes mellitus diagnosis method based random forest with bat algorithm

Zero trust strategy: cloud security by design

  • 1. STORIES The benefits of a security- first approach to cloud Make cloud secure by design
  • 2. Copyright © 2022 Accenture. All rights reserved Secure by design Call for change As we have seen in the last 18 months, cloud opens the door to organizational agility on an unprecedented scale. But security is essential to take advantage of cloud’s potential. Accenture, with our size, scale and complexity, has experienced first- hand the power of cloud security. Six years ago, Accenture initiated the move into the cloud. While our recent research has identified that security and compliance risk is seen as one of top two pain points of cloud adoption, we were clear from the outset that cloud security would be a critical component to supporting our business needs. Moving from on-premise infrastructure where we had complete control, to collaborating in the cloud with vendors and needing to rely on their technology and environment was a big shift. Infrastructure and new service capabilities in the cloud are different; we couldn’t simply replicate what we had on-premise directly into the cloud. We needed to reimagine the approach to implementing our security model to harness the capabilities of cloud native solutions. We evolved core security guiding principles to meet the requirements of operating in the cloud. We redefined our security rules to flex around the updated cloud-based infrastructure. Today, when we look at our security approach we think beyond just infrastructure to an application, data and code level as well. From the initial migration, we are now running 95% of our applications in the cloud. Our strategy was to be secure from the start, reframing our security in terms of cloud capabilities, which has helped us to see how our cloud solutions can support every element of security needed within the business.
  • 3. Copyright © 2022 Accenture. All rights reserved Principles in practice When tech meets human ingenuity Copyright © 2022 Accenture. All rights reserved Early on in our cloud continuum journey, we recognized the need to evolve our security practices to accommodate our core security values for the cloud. We wanted to be powered by code, securing our application and infrastructure code from the start. We infused analytics that were behavior-driven, using automated artificial intelligence (AI) behavioral analytics to identify anomalies faster and with more accuracy when working across our cloud platforms. It was important to us to be cloud agnostic, fit for a multi-cloud environment, so that the security framework and principles apply to any cloud vendor with auditability. What’s more we embedded robust defense, relying on multiple layers of security at varying depths: cloud, network, access, data and endpoints. We centered our strategy on a zero trust approach, protecting every aspect of the cloud security journey by treating everything as untrusted. With the focus on zero trust, we followed an identity-centric approach, basing all access on identity where every request is explicitly verified.
  • 4. Copyright © 2022 Accenture. All rights reserved Cloud security is not a one-size-fits-all; it’s multi-faceted. By taking a comprehensive view across access, applications, services and data we’ve created a truly holistic cloud security approach. PENELOPE PRETT Chief Information Officer, Accenture When tech meets human ingenuity Five core functions contributed to a successful cloud security journey: We shared responsibilities. As we increased our software as-a-service (SaaS) and platform as-a- service (PaaS) consumption in the cloud, we focused on and trusted in a shared responsibility model with our cloud vendors. Our partnerships with Microsoft, Amazon and Google cloud services took advantage of their experience in the market, their wide security certifications, and the fact that they value security as much as we do. We sought out cloud-based solutions. Cloud providers are investing heavily in their innovation offerings and security. By using cloud native and cloud-based policies, controls, processes and technologies we were able to tap into an inherent agility and scale when it came to supporting our own cloud security. We enabled compliance. Partnering with our providers, our cloud security strategy anchors to industry-recognized standards and continuously adapts to enterprise business needs. We adhere to industry defined policies, using alerts, following the zero trust principle and managing security through code to maintain compliance. We increased visibility. We took a multi-layered approach, enhancing security through cloud vendors’ technology and advanced threat detection solutions. We gained visibility not only for our own actionable management, but also external auditability. We baked in trust. We believe identity is the new firewall. Our identity-centric approach means we have adopted a zero trust strategy in which we embed proper and continuous identity validation. Trust is now fundamentally going to be driven by identity and role.
  • 5. Copyright © 2022 Accenture. All rights reserved Evolving holistic security A valuable difference We have taken a comprehensive view across the various components of operating in the cloud to create a truly holistic cloud security strategy. As we implement this transformational approach to security across a multi-cloud infrastructure, we can continue to enforce highly effective security policies, resources and services. Here are some of our lessons learned around effective cloud security: • Design in terms of the cloud: A cloud continuum journey requires a very different operating model to any on-premise solution. Reimagine your security principles, to unlock the power of security in the cloud and transform your business. • Make the cultural shift: Bridge the cultural gap to cloud native services from the top down. Education and training can help to change mindsets so that people understand the benefits of cloud and why your security posture is important. • Promote partnership: It’s important to build trusted relationships with your providers and to look at the ownership of security as shared. Also, keep in mind that the investments in security made by the major cloud providers are far in excess of what’s feasible for most IT organizations—offering an advantage to those who collaborate more effectively. Going forward, to secure and manage access controls across a multi-cloud environment, we have our sights set on cross-platform alignment so that all identities align across all platforms and vendors. Using data as the key driver, our cloud security will continue to be comprehensive as our cloud capabilities grow across platforms. And we want to discover new solutions and augment our security with AI for threat detection and machine learning to remediate our code to prevent potential vulnerabilities. This combined with our Prevent, Protect, Detect, and Recover strategy can strengthen our zero trust imperative. There's some exciting things on the horizon. As our AI and machine learning capabilities grow, we’ll be able to detect anomalies in behavior and make rapid decisions to act on security threats in the cloud. Having a more highly automated response is a powerful proposition and could reinvent cloud security as we know it. DON GALZARANO Managing Director—Global IT, Enterprise Technology, Intelligent Cloud & Networks, Accenture
  • 6. Copyright © 2022 Accenture. All rights reserved Copyright © 2022 Accenture. All rights reserved. Accenture and its logo are trademarks of Accenture. About Accenture Accenture is a global professional services company with leading capabilities in digital, cloud and security. Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Interactive, Technology and Operations services — all powered by the world’s largest network of Advanced Technology and Intelligent Operations centers. Our 699,000 people deliver on the promise of technology and human ingenuity every day, serving clients in more than 120 countries. We embrace the power of change to create value and shared success for our clients, people, shareholders, partners and communities. Visit us at www.accenture.com. Contact Merim Becirovic Managing Director Global IT Enterprise Technology Don Galzarano Managing Director Global IT Enterprise Technology, Intelligent Cloud & Networks /merim-becirovic /don-galzarano