Hybrid multi-cloud deployments have become commonplace in the enterprise, resulting in data becoming more dispersed than ever. Not only do organizations have to consider which services should be run in on-premises, public cloud, private cloud or hybrid cloud environments; they must also determine how data security will be applied to protect and secure such dynamic workloads.

According to IDC’s “2018 Global CloudView Survey” of more than 5,700 firms, 81 percent of companies currently use or plan to use public clouds, and 86 percent of companies currently use or plan to use private clouds. This amounts to an overall increase of more than 30 percent from the previous year’s results.

By 2020, more than 90 percent of global organizations will have a multi-cloud strategy in place. Most organizations using public clouds will also deploy on private cloud platforms and leverage a hybrid cloud strategy.

This trend is reflected in the way organizations are consuming database management solutions. Common patterns include:

  • Deploying database management solutions on-premises or in private data centers (the heritage model). This remains a dominating pattern as organizations progress toward modernizing their workloads based on criticality and business impact.
  • Deploying traditional database management solutions on public cloud infrastructure–as-a-service (IaaS) models. For example, deploying Oracle database server on Amazon EC2.
  • Consuming database-as-a-service (DBaaS) solutions that are hosted and fully managed by a cloud provider. For example, a firm might subscribe to Amazon RDS for MySQL or Azure SQL Database.
  • Deploying database management solutions using cloud native architectures. This includes running databases like MongoDB within containerized environments such as Docker.
  • Combinations of all of the above.

Take Advantage of the Cloud With Visibility and Control

Security and IT organizations are working to keep up with the fast-paced innovation delivered through cloud service providers. At the same time, they are working to keep their data secure in accordance with evolving compliance mandates. As a result, taking a hybrid multi-cloud approach to data security is quickly becoming a critical requirement for organizations of all sizes. While it may seem like too daunting of a task at first, if the new practice is implemented correctly, it can become a source of positive differentiation for any business.

With regard to database management patterns, the fundamental drivers and use cases for data protection remain intact during the shift toward hybrid cloud architectures. Compliance, privacy and data security analytics are still the most compelling drivers. With that said, scaling data security solutions and best practices across a hybrid mix of on-premises, private and cloud deployment models introduces additional layers of complexity that must be addressed.

The widest cloud data security gaps are around visibility and control. While cloud deployment models improve IT speed and business agility and allow organizations to take advantage of the cloud’s elasticity and scalability, they also invoke new data security challenges due to the lack of fine-grained visibility and control. This is because cloud architectures work on a shared responsibility model between the cloud provider and the consumer.

For instance, with an IaaS model, the cloud consumer has the ability to implement data security measures similar to those which they would deploy on-premises. The user can then exercise tight controls through actionable policies. On the other hand, with a software-as-a-service (SaaS) model, cloud consumers often have limited visibility and control over the management of data running through that service — or none at all. They must rely on the limited, one-size-fits-all options offered by the cloud provider. This can greatly limit a company’s ability to exercise the granular controls needed to protect and secure their sensitive data.

Likewise, it is ultimately the customer’s responsibly to ensure proper data protection measures are in place, regardless of the chosen architecture.

Security Must Follow Data to the Hybrid Cloud and Back

A hybrid cloud data protection strategy must address these constraints by providing the means to augment and implement flexible and purpose-built data security measures based on industry best practices and regulatory standards. Specifically, it should fulfill requirements for:

  1. Visibility — The right level of visibility and granularity on data source activities is necessary to take purposeful action.
  2. Control — All normalized visibility must be centralized to make near-real-time, efficient and effective decisions, satisfy compliance demands, and identify data security risks.
  3. Flexibility — The strategy must be able to pivot and adapt to the changing cloud and IT landscape. To avoid cloud vendor lock-in, organizations should select cloud services and data security solutions that have the flexibility to evolve with changing technology and business needs.

When it is implemented correctly, hybrid multi-cloud data protection can help to address the aforementioned challenges and enable organizations to protect critical data across their choice of on-premises, public and/or private cloud services.

Learn more about Guardium multi-cloud data protection

More from Cloud Security

What is data security posture management?

3 min read - Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across multiple types of environments. If you have any doubt, your enterprise should consider acquiring a data security posture management (DSPM) solution. With the global average…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

The importance of Infrastructure as Code (IaC) when Securing cloud environments

4 min read - According to the 2023 Thales Data Threat Report, 55% of organizations experiencing a data breach have reported “human error” as the primary cause. This is further compounded by organizations now facing attacks from increasingly sophisticated cyber criminals with a wide range of automated tools. As organizations move more of their operations to the cloud, they must also become increasingly aware of the security risks and threats that come with it. It’s not enough anymore to simply have a set of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today