Pricing Login
Pricing
Support
Demo
Interactive demos

Click through interactive platform demos now.

Live demo, real expert

Schedule a platform demo with a Sumo Logic expert.

Start free trial
Back to blog results

January 25, 2024 By JT Rakitan

Cloud security vs. traditional security

Cloud security vs. traditional security


Data protection principles are the same whether your data sits in a traditional on-premises data center or a cloud environment. However, the way you apply those principles is quite different when it comes to cloud security vs. traditional security. Moving data to the cloud – whether it's a public cloud like AWS, a private cloud or hybrid cloud — introduces new attack surfaces, threats and challenges, so you need to approach security in a new way.

Organizations typically have a mix of traditional IT security and cloud services, so security solutions need to protect both. The security controls in place for the data center may not be suitable for new challenges introduced in the cloud. Big data, the new skills required of security teams, and compliance and regulatory requirements all add to the complexity and cost of a cloud security solution.

The good news is that cloud-based security solutions are available to address challenges around protecting sensitive data, cybersecurity issues and cyber threats, cloud data security, network security and more for comprehensive monitoring of your security posture.

Ideally, you want a solution that minimizes the load on your security team and the training time required to support the solution. It must also address new cloud security threats while protecting traditional systems. Understanding the differences between cloud security vs. traditional security is key to finding the right security solution.

Cloud security threats

Cloud and traditional IT environments need to protect against many of the same threats. Even though the threats may be the same, new solutions are needed to protect resources in the cloud. Cloud security challenges include:

Containers, microservices and serverless computing

Applications in the cloud often run serverless, as microservices, or in containers. Traditional security solutions are not equipped to handle these newer technologies, so some threats can and do go undetected.

Elastic scalability

The cloud is dynamic and elastic in nature. The frequent, sudden, and hyperscale changes seen in the cloud would cripple many traditional security solutions.

Hybrid and multi-cloud

Monitoring and analyzing traffic traversing multiple clouds from different providers is difficult with on-premises security solutions. It makes sense that the best way to address security threats in the cloud is with a cloud-native security solution. These solutions are built in the cloud with the necessary capabilities to handle today’s varied architectures.

Why securing the cloud is different

Cloud-native security solutions, built specifically to protect cloud resources, excel where traditional on-premises security solutions struggle. Here’s a breakdown of how cloud and traditional security solutions address major challenges:

Challenge Cloud Security Traditional Security
Visibility Monitoring of both on-premises and cloud resources. On-premises resources across different locations can be monitored without having additional security appliances at each site. Monitoring of on-premises resources, but only limited monitoring of cloud resources.
Deployment The SaaS model eliminates the need to deploy hardware or software. Saves time on change management, facility, provisioning, etc. Runs on an established platform, so deployment issues are rare. Security appliances must be procured, shipped to each site, installed, and configured. Given the new infrastructure and initial configuration, deployment issues are common. Gartner says that over 50% of SIEM deployments fail.
Time to value Rapid deployment, built-in and updated content, updated use cases and simplified user experience let you get started on security in just a few hours or even 30 minutes. Typical project lifecycle—procure, ship, install, configure, tune—causes slow time to value. Long cycles for updating, managing, running the use cases, etc. Most deployments run over nine months, and you cannot usually see value in the first year.
Maintenance Handled by the cloud service provider (CSP). The vendors update the platform daily and update features and bugs more frequently. It is typical for cloud vendors to have 12 releases a year where software/appliances will be updated once a year. Handled by in-house IT and security teams. This is a big point of failure. We see more customers looking for cloud solutions after they go through a maintenance cycle and stop seeing value.
Total cost of ownership and ROI Opex-based

Consumption model

Subscription-based

No long-term contracts

Easy to replace vendors if there is no fit

Low-risk solutions

Payback is typically 6-9 months

Subscription cost covers almost 70% of the TCO
Capex-based

Big budgetary investments

Long planning and deployment cycles

Multiple groups from security, IT, facilities, ops, DevOps, to LOB, and apps are all involved

Licensing cost is only 9% of the TCO. HW/SW/facilities and other hidden costs are involved.

Tough to predict the pricing for the next quarter/ year
Updates and patches Cloud vendors take care of updates and patches through the shared responsibility model

Low risk of vulnerabilities for unpatched systems
Requires periodic maintenance windows and planned outages

Unpatched systems are a big threat to security
Capacity planning and elasticity No planning for capacity

Elastic scaling takes care of unplanned capacity planning

Seasonality, peaks, and bursts are handled effortlessly
HW, SW, and licensing need to be planned for over-capacity for occasional burstsor peaks

Your TCO is designed on seasonal peaks

Extreme bursts lock you out of tools when you need the most

Cloud security and log management

Logs provide visibility into the health of the application and infrastructure stacks. The lack of log visibility creates operational challenges when modern applications leverage the cloud, the infrastructure they don’t own, and microservices architecture, where three-tier architecture is transformed into n-tier architecture with many-to-many communications between those services.

If a security incident or operation outage occurs, your DevOps, ITOps and SecOps team(s) don’t have insight that allows them to resolve the issue quickly. This lack of visibility into their stack often creates higher application latency and system outages, resulting in poor customer experience and customer churn.

Knowing where to look to pinpoint problems that cause customer satisfaction issues, applications to slow down, system-wide outages, or security threats is the primary reason for the existence of logs. Each log contains a stream of events and includes a wealth of data about software and related infrastructure performance, availability, user access, and behavior. By analyzing these logs, one can proactively detect and resolve issues that impact the business.

Ideally, you need a centralized log management solution, like Sumo Logic, that centralizes, correlates and analyzes all of these logs to provide meaningful insights into solving application performance and cybersecurity issues.

Why securing the cloud is essential

Cloud environments are constantly changing — by design. Services are spun up and taken down to meet demand and transient events. Traditional security cannot react to these changes in an effective way. Cloud security is designed to understand and react to the dynamic aspects of cloud computing. It can ingest data from containers that traditional security methods would never have known existed. Cloud security is the only way to effectively secure resources from a security risk or active threat in cloud computing environments.

Traditional security solutions do not have the ability to view activity within a container and events across containers and microservices. This leaves you blind to potential threats. Cloud security is aware of containers and microservices being purposefully built to see the threats against them.

To be secure, the cloud needs cloud-native security solutions that meet these criteria:

  • Visibility into containers, microservices, and serverless
  • Ability to monitor and analyze transient and elastic workload data
  • A holistic view of the entire threat surface
  • Software-as-a-service (SaaS) security solutions

Cloud-native security

Many security solutions are delivered from the cloud today, but there is a difference between cloud-native solutions and traditional security solutions that have been moved into the cloud. For example, running firewall software on a virtual machine in the Amazon Web Services cloud is not a cloud-native solution. It is a traditional firewall running on an infrastructure-as-a-service (IaaS) platform.

In contrast, cloud-native security runs on a true SaaS model, wherein the service provider is responsible for the entire service stack, from the hardware through to the application. When we describe a platform or system as cloud-native, we are referring to a method of building and deploying applications that takes advantage of cloud computing as a delivery model. Rather than indicating where applications are run, cloud-native refers to the environment in which applications are built and implemented – they begin their life in the cloud and remain there.

Some cloud-native applications can be characterized by the use of the open-source software stack, with the parts of an app being separated into containers and oriented around microservices. While not a universal element of all SaaS providers, the ability to leverage microservices and the open-source community is endemic to cloud environments.

Cloud security with Sumo Logic

Your changing attack surface needs increased threat visibility and deep security context from use-case-driven queries, dashboards and alerts. Sumo Logic is a cloud-native platform that offers multi-cloud observability, log analytics and management, security information and event management (SIEM) and security orchestration, automation and response (SOAR) solutions.

With Sumo Logic Cloud Infrastructure Security, you can cut through the noise of complex cloud environments, including AWS, to monitor your attack surface with real-time cloud-scale collection, storage and security analytics

Download our ebook to explore how you can also accelerate and secure your software development lifecycle with DevSecOps. 

Complete visibility for DevSecOps

Reduce downtime and move from reactive to proactive monitoring.

Sumo Logic cloud-native SaaS analytics

Build, run, and secure modern applications and cloud infrastructures.

Start free trial
J Rakitan

J Rakitan

JT Rakitan

Product Marketing Manager

Currently a Security Product Marketer at Sumo Logic, JT Rakitan began his marketing journey when he stole his Dad's tape recorder to capture his ideas for made-up advertisements. He has honed his skills in product, content, and multimedia marketing for over 10 years. With expertise across cutting-edge cybersecurity technologies and AI, he has been instrumental in driving product marketing processes at scale and optimizing cross-functional efficacy without playing "buzzword bingo." In other words, he gets @#!& done.

In addition to his professional endeavors, JT is an award-winning filmmaker, published photographer, and avid musician. In his (albeit limited) free time, he enjoys spending time outdoors, preferably by a body of water, with good food, family, and friends.

More posts by JT Rakitan.

More posts by J Rakitan.

People who read this also enjoyed