For a while it seemed like the public cloud was going to win. Everything would end up in the public cloud.
Such services would be offered in a similar way utilities do for power, water, and gas. And with that, choices would be limited to one monopoly or a select few providers. But then the tide turned.
5 Top Private Cloud Trends
1. Private Cloud Revival
Private clouds have made a comeback.
Many enterprises are now moving at least some data and some applications back in house due to a number of factors.
“Businesses are moving workloads away from public cloud into private clouds as they offer more tailored services and are seen as less risky and providing more performance than public clouds,” said Steve Wallo, CTO of Vcinity.
2. Moving to Private Cloud to Avoid Vendor Lock-in
Many cloud users have been unpleasantly surprised by how their cloud bills have spiraled out of control.
Once the capacity is there to easily ship endless amounts of data to the cloud, business units across the enterprise soon take advantage. All of a sudden, the volume of data gets out of control – along with costs.
Those that then decide to rein in things and move a large amount of data back in house often had a rude awakening. Egress rates from the cloud were very high, and the pace was snail-like.
Thus, many companies are deciding to move off an addiction to public cloud services provided by AWS, Google Cloud, Microsoft Azure, and others.
“The private cloud allows for more flexibility, less chance of vendor lock-in (stranded or isolated data), and a business model more tailored to individual requirements,” Wallo said.
3. Private Clouds Offer Control Over Security and Compliance
As well as cost and vendor lock-in, the need for security looms large in the preference for the private cloud.
Many trusted their data to the public cloud and then found that it didn’t absolve them of their own responsibility for their data and apps.
“Many thought that cloud security was not needed, because cloud resources are inherently secured by the cloud service provider,” said Jackie Castelli, product and technical director of Duo Security at Cisco.
IT and security vendors, therefore, have been quick to respond to the needs of the enterprise by providing products to secure private clouds and give IT full control of security administration.
Cisco Duo, for example, has several private cloud offerings: it helps prevent use of compromised credentials; protects application access; delivers a consistent cloud access experience; offers IT visibility into users and devices running within a private cloud; blocks access to unhealthy or insecure devices; maintains network and infrastructure access security; and fulfills compliance requirements.
4. Maintenance of Least Privilege
Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud environment.
This goal is more complex and requires deeper analysis than most people realize. When public clouds and private clouds get mixed up, it becomes even more of a challenge.
It’s difficult enough for enterprise IT teams to determine if security vendors effectively discover, classify, and protect their crown-jewel data with least privilege. It is vital to be able to easily find all stores and verify rights — not just what is accessing it, but everything that can potentially access it. The private cloud makes this much easier.
“The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities,” said Brendan Hannigan, CEO of Sonrai Security.
“One reason why enterprises experience security blunders in the cloud is that they fail to ensure that workloads deployed and developed in the cloud align with the company’s security posture. Cloud services need to be compliant, resilient, and free of misconfigurations — and this requires oversight from security teams.”
5. Masking Data
The DevOps and agile software development movement has created a security problem.
The pace is so fast that some aspects of security are always playing catch up. What can happen is that dev, test, and vendor partners are using actual production data in a hurry to get a new release out on schedule.
“It is vital to protect sensitive data in any non-production environments where realistic and fictitious data is required,” said Aimee Lin, Chief Product Officer at DataMasque.
“For example, to enable development and testing with realistic and non-authentic data.”
DataMasque’s data masking can safeguard sensitive against data breaches and ensure compliance with mandatory information privacy laws and standards as well as overcome data sovereignty challenges by sanitizing data for non-production uses to enable cloud adoption, while compliant to data sovereignty laws.