SlideShare a Scribd company logo
Simplicity in Hybrid IT Environments:
A Security Oxymoron?
Scott Crawford – Research Director, Information Security
Some hybrids are successful…
2
Others,
not so
much
Momentum favors the
cloud
“How would you generally
categorize your organization’s
information security view of
hosted cloud computing
solutions (Hosted Private Cloud,
IaaS, or PaaS) in terms of your
organization’s tolerance for
information security risk?”
3
Source: 451 Research Quarterly Advisory
Report: Budgets and Outlook – Information
Security 2016
But legacy /
on-premises
investments aren’t
going anywhere soon
“Approximately how is your
organization’s total information
security spending on vendor-
based security tools currently
distributed across the following
locations?”
4
Source: 451 Research Quarterly Advisory
Report: Budgets and Outlook – Information
Security 2016
Why maintain the investment?
• Realizing its full value
• Dependencies
• Maturity
• Of the technology
• Of operations &
expertise
• The cloud is different…
• Regulatory requirements
• Ownership & control
5
“The” cloud?
6
Different
implementations
Different
services
Different
approaches to
management
So what’s the problem?
One set of techniques for legacy/
on-premises
One (or more) set(s) of techniques for
the cloud
7
So simplify!
8
Hint: What are common objectives?
• Consistency of control,
across both legacy and
“new IT”
• Assurance of enterprise
responsibilities
• Demonstrations of
adherence to enterprise
requirements
9
Security/Compliance Concern Score
Encryption 4.33
Identity Management/Authorization/Access
Control Tools
4.26
Assumption of Liability for Security Breaches or
Outages
4.23
Explicit Contractual Responsibilities for
Security Between the Cloud Provider and
Customer
4.17
Explicit SLAs 4.12
Data Leakage Prevention (DLP) 4.00
Providing Regular Results of Security Audits
from Known Security Testing Companies
3.99
Proven Compliance with Industry Standards 3.92
Auditability 3.91
“Rate the importance of each of the following in addressing
organizational concerns around security and compliance with hosted
cloud solutions:”
Source: 451 Research Quarterly Advisory Report: Budgets and Outlook – Information
Security 2016
Finding common ground
• Consistent application of
policy
• Essential for assuring
enterprise compliance
obligations, no matter
where
• Consistent execution of tasks
• Completeness of coverage
across hybrid environments
• Consistent data gathering
• For determining priorities
for the entire investment
10
But one size does not fit all
“Most things that we've encountered require a different approach for the
cloud-based solutions, than they do for the on-premises solutions. And
they almost always run into, ‘Oh, yes. But I can't support that’ …
“[For example], ‘we have the best […] security management tool in the
industry,’ ‘Do you support SAP HANA?,’ ‘What's SAP HANA?’…
“Or, ‘We support Amazon Web Services for cloud-based packet inspection.’
‘Does the same system work with my on-premises solution, and put it in
the same console?’ ‘Oh no, you have to have two separate accounts.’
Those are the kinds of conversations that I have all the time…”
-Mid-level management, $1-5bn retailer
11
From recent interviews with enterprise practitioners:
Source: 451 Research Information Security Narratives -: Budgets and Outlook 2016
Implementations can be very different
Legacy/on-premises infrastructure
• Accuracy/depth/breadth of asset
discovery
• Across a variety of physical assets
(hosts, networks, applications)
• Balance of speed and accuracy
• Policy constraints
• Tools often purpose-built
Cloud techniques
• API-based - ASK the cloud for
whatever you want to know
• ec2-describe-images --filter
“tag-value=prod”
• DescribeInstances
• DescribeVpnGateways
• DescribeFlowLogs
• Tools must be able to interact
with APIs, automation at scale
12
Example: Asset inventory
How well do your preferred tools
adapt?
A small application? No problem.
13
That escalated quickly…
14
The long view:
Infrastructure’s
disappearing act
15
2000s: On-prem
virtualization
Rise of IaaS,
PaaS, growth in
SaaS
Containers,
microservices
“Serverless”
If you think hybrid IT is diverse today…
16
Centralized Distributed
IoT
“Data centers on wheels”
17
• Up to 100 ECUs in some
vehicles1
…or with
arms
…or
wings
…or
legs
1 https://techcrunch.com/2016/08/25/the-biggest-threat-
facing-connected-autonomous-vehicles-is-cybersecurity/
Not just “smart” endpoints
• Sophisticated compute near the edge
• Data volume, thin pipes, latency
• Real-time action & response
• Functionality offload for constrained endpoints
18
Will you be
ready?
19
Thank you!
Scott Crawford
Research Director, Information Security
Twitter: @s_crawford
Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?
FOUNDATIONAL CONTROLS
FOR THE HYBRID ENTERPRISE
Simplicity in Hybrid IT Environments – A Security Oxymoron?
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
UNIFIED MANAGEMENT
Elastic monitoring
Cloud policies
& platforms
Containerization
To learn more, download the
TRIPWIRE FOUNDATIONAL CONTROLS FOR THE HYBRID CLOUD
executive brief from the resource widget
tripwire.com | @TripwireInc

More Related Content

PPTX
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
PPTX
The Subversive Six: Hidden Risk Points in ICS
PDF
Elastic SIEM (Endpoint Security)
PDF
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
PDF
Limitless xdr meetup
PDF
Building Elastic into security operations
PPTX
Practical DevSecOps Using Security Instrumentation
PDF
Keynote: Elastic Security evolution and vision
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
The Subversive Six: Hidden Risk Points in ICS
Elastic SIEM (Endpoint Security)
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Limitless xdr meetup
Building Elastic into security operations
Practical DevSecOps Using Security Instrumentation
Keynote: Elastic Security evolution and vision

What's hot (20)

PDF
Operationalize with alerting, custom dashboards, and timelines
PDF
Keynote: Elastic Security evolution and vision
PDF
What is the Future of SIEM?
PPTX
Cloud Security for Dummies Webinar — The Identity Edition
PPTX
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
PDF
Cloud Access Security Brokers - What's all the Hype
PPTX
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
PDF
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
PPTX
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
PDF
Elastic Security: Enterprise Protection Built on the Elastic Stack
PPTX
Making Cloud Security Part of Your DNA Webinar Slides
PPTX
Big data in term of security measure
PPTX
5 Highest-Impact CASB Use Cases - Office 365
PDF
October 2020 meetup
PPTX
Reference Architecture for Data Loss Prevention in the Cloud
PDF
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
PDF
Automate threat detections and avoid false positives
PPTX
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
PDF
Elastic Security: Your one-stop OODA loop shop
PPTX
Using m365 defender to protect against solorigate
Operationalize with alerting, custom dashboards, and timelines
Keynote: Elastic Security evolution and vision
What is the Future of SIEM?
Cloud Security for Dummies Webinar — The Identity Edition
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Cloud Access Security Brokers - What's all the Hype
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
Elastic Security: Enterprise Protection Built on the Elastic Stack
Making Cloud Security Part of Your DNA Webinar Slides
Big data in term of security measure
5 Highest-Impact CASB Use Cases - Office 365
October 2020 meetup
Reference Architecture for Data Loss Prevention in the Cloud
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Automate threat detections and avoid false positives
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Elastic Security: Your one-stop OODA loop shop
Using m365 defender to protect against solorigate
Ad

Similar to Simplicity in Hybrid IT Environments – A Security Oxymoron? (20)

PPTX
CyberSecurity Portfolio Management
PPTX
Cloud security for banks - the central bank of Israel regulations for cloud s...
PPTX
Virtual Gov Day - Security Breakout - Deloitte
PDF
System Security on Cloud
PDF
Splunk in the Cisco Unified Computing System (UCS)
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
PPTX
SplunkLive! Customer Presentation - SSA
PDF
13 Tips for Cloud Security
PDF
MBT Webinar: Does the security of your business data keep you up at night?
PPTX
SplunkLive! Austin Customer Presentation - Baylor
PDF
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
PPTX
GRC Dynamics in Securing Cloud
PPTX
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
PPTX
The most trusted, proven enterprise-class Cloud:Closer than you think
PDF
Thin Air or Solid Ground? Practical Cloud Security
PPTX
SplunkLive! Customer Presentation – Covance Inc"
PPT
Cloud Computing and Enterprise Architecture
PPTX
Getting Started with Splunk Enterprise
PPTX
Splunk for Enterprise Security featuring UBA Breakout Session
PPTX
Observability in serverless solutions
CyberSecurity Portfolio Management
Cloud security for banks - the central bank of Israel regulations for cloud s...
Virtual Gov Day - Security Breakout - Deloitte
System Security on Cloud
Splunk in the Cisco Unified Computing System (UCS)
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
SplunkLive! Customer Presentation - SSA
13 Tips for Cloud Security
MBT Webinar: Does the security of your business data keep you up at night?
SplunkLive! Austin Customer Presentation - Baylor
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
GRC Dynamics in Securing Cloud
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
The most trusted, proven enterprise-class Cloud:Closer than you think
Thin Air or Solid Ground? Practical Cloud Security
SplunkLive! Customer Presentation – Covance Inc"
Cloud Computing and Enterprise Architecture
Getting Started with Splunk Enterprise
Splunk for Enterprise Security featuring UBA Breakout Session
Observability in serverless solutions
Ad

More from Tripwire (20)

PDF
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
PDF
Data Privacy Day 2022: Tips to Ensure Data Privacy
PDF
Key Challenges Facing IT/OT: Hear From The Experts
PPTX
Tripwire Energy Working Group: TIV Demo
PPTX
Tripwire Energy Working Group Session w/Dale Peterson
PPTX
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
PPTX
Tripwire Energy Working Group: Customer Session with Chase Cole
PPTX
Tripwire Energy Working Group: Keynote w/Patrick Miller
PDF
World Book Day: Cybersecurity’s Quietest Celebration
PDF
Tripwire Retail Security 2020 Survey: Key Findings
PDF
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
PDF
The Adventures of Captain Tripwire: Coloring Book!
PDF
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
PDF
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
PDF
Tripwire 2019 Skills Gap Survey: Key Findings
PDF
A Look Back at 2018: The Most Memorable Cyber Moments
PPTX
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
PDF
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
PPTX
Defend Your Data Now with the MITRE ATT&CK Framework
PPTX
Defending Critical Infrastructure Against Cyber Attacks
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Data Privacy Day 2022: Tips to Ensure Data Privacy
Key Challenges Facing IT/OT: Hear From The Experts
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Keynote w/Patrick Miller
World Book Day: Cybersecurity’s Quietest Celebration
Tripwire Retail Security 2020 Survey: Key Findings
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
The Adventures of Captain Tripwire: Coloring Book!
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
Tripwire 2019 Skills Gap Survey: Key Findings
A Look Back at 2018: The Most Memorable Cyber Moments
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Defend Your Data Now with the MITRE ATT&CK Framework
Defending Critical Infrastructure Against Cyber Attacks

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Cloud computing and distributed systems.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
MIND Revenue Release Quarter 2 2025 Press Release
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
KodekX | Application Modernization Development
NewMind AI Weekly Chronicles - August'25 Week I
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Unlocking AI with Model Context Protocol (MCP)
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Cloud computing and distributed systems.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MIND Revenue Release Quarter 2 2025 Press Release

Simplicity in Hybrid IT Environments – A Security Oxymoron?

  • 1. Simplicity in Hybrid IT Environments: A Security Oxymoron? Scott Crawford – Research Director, Information Security
  • 2. Some hybrids are successful… 2 Others, not so much
  • 3. Momentum favors the cloud “How would you generally categorize your organization’s information security view of hosted cloud computing solutions (Hosted Private Cloud, IaaS, or PaaS) in terms of your organization’s tolerance for information security risk?” 3 Source: 451 Research Quarterly Advisory Report: Budgets and Outlook – Information Security 2016
  • 4. But legacy / on-premises investments aren’t going anywhere soon “Approximately how is your organization’s total information security spending on vendor- based security tools currently distributed across the following locations?” 4 Source: 451 Research Quarterly Advisory Report: Budgets and Outlook – Information Security 2016
  • 5. Why maintain the investment? • Realizing its full value • Dependencies • Maturity • Of the technology • Of operations & expertise • The cloud is different… • Regulatory requirements • Ownership & control 5
  • 7. So what’s the problem? One set of techniques for legacy/ on-premises One (or more) set(s) of techniques for the cloud 7
  • 9. Hint: What are common objectives? • Consistency of control, across both legacy and “new IT” • Assurance of enterprise responsibilities • Demonstrations of adherence to enterprise requirements 9 Security/Compliance Concern Score Encryption 4.33 Identity Management/Authorization/Access Control Tools 4.26 Assumption of Liability for Security Breaches or Outages 4.23 Explicit Contractual Responsibilities for Security Between the Cloud Provider and Customer 4.17 Explicit SLAs 4.12 Data Leakage Prevention (DLP) 4.00 Providing Regular Results of Security Audits from Known Security Testing Companies 3.99 Proven Compliance with Industry Standards 3.92 Auditability 3.91 “Rate the importance of each of the following in addressing organizational concerns around security and compliance with hosted cloud solutions:” Source: 451 Research Quarterly Advisory Report: Budgets and Outlook – Information Security 2016
  • 10. Finding common ground • Consistent application of policy • Essential for assuring enterprise compliance obligations, no matter where • Consistent execution of tasks • Completeness of coverage across hybrid environments • Consistent data gathering • For determining priorities for the entire investment 10
  • 11. But one size does not fit all “Most things that we've encountered require a different approach for the cloud-based solutions, than they do for the on-premises solutions. And they almost always run into, ‘Oh, yes. But I can't support that’ … “[For example], ‘we have the best […] security management tool in the industry,’ ‘Do you support SAP HANA?,’ ‘What's SAP HANA?’… “Or, ‘We support Amazon Web Services for cloud-based packet inspection.’ ‘Does the same system work with my on-premises solution, and put it in the same console?’ ‘Oh no, you have to have two separate accounts.’ Those are the kinds of conversations that I have all the time…” -Mid-level management, $1-5bn retailer 11 From recent interviews with enterprise practitioners: Source: 451 Research Information Security Narratives -: Budgets and Outlook 2016
  • 12. Implementations can be very different Legacy/on-premises infrastructure • Accuracy/depth/breadth of asset discovery • Across a variety of physical assets (hosts, networks, applications) • Balance of speed and accuracy • Policy constraints • Tools often purpose-built Cloud techniques • API-based - ASK the cloud for whatever you want to know • ec2-describe-images --filter “tag-value=prod” • DescribeInstances • DescribeVpnGateways • DescribeFlowLogs • Tools must be able to interact with APIs, automation at scale 12 Example: Asset inventory How well do your preferred tools adapt?
  • 13. A small application? No problem. 13
  • 15. The long view: Infrastructure’s disappearing act 15 2000s: On-prem virtualization Rise of IaaS, PaaS, growth in SaaS Containers, microservices “Serverless”
  • 16. If you think hybrid IT is diverse today… 16 Centralized Distributed IoT
  • 17. “Data centers on wheels” 17 • Up to 100 ECUs in some vehicles1 …or with arms …or wings …or legs 1 https://techcrunch.com/2016/08/25/the-biggest-threat- facing-connected-autonomous-vehicles-is-cybersecurity/
  • 18. Not just “smart” endpoints • Sophisticated compute near the edge • Data volume, thin pipes, latency • Real-time action & response • Functionality offload for constrained endpoints 18
  • 20. Thank you! Scott Crawford Research Director, Information Security Twitter: @s_crawford
  • 26. FOUNDATIONAL CONTROLS FOR THE HYBRID ENTERPRISE
  • 30. UNIFIED MANAGEMENT Elastic monitoring Cloud policies & platforms Containerization
  • 31. To learn more, download the TRIPWIRE FOUNDATIONAL CONTROLS FOR THE HYBRID CLOUD executive brief from the resource widget