Security Archive - Bitwise https://www.bitwiseglobal.com/en-us/blog/tag/security/ Technology Consulting and Data Management Services Tue, 20 Aug 2024 09:39:51 +0000 en-US hourly 1 https://cdn2.bitwiseglobal.com/bwglobalprod-cdn/2022/12/cropped-cropped-bitwise-favicon-32x32.png Security Archive - Bitwise https://www.bitwiseglobal.com/en-us/blog/tag/security/ 32 32 Boost Your Application Security: How to Leverage GCP Cloud Armor for an Extra Layer of Protection https://www.bitwiseglobal.com/en-us/blog/boost-your-application-security-how-to-leverage-gcp-cloud-armor-for-an-extra-layer-of-protection/ https://www.bitwiseglobal.com/en-us/blog/boost-your-application-security-how-to-leverage-gcp-cloud-armor-for-an-extra-layer-of-protection/#respond Fri, 16 Aug 2024 12:13:18 +0000 https://www.bitwiseglobal.com/en-us/?p=48845 What is Cloud Armor? Cloud Armor is a global Web Application Firewall (WAF) and DDoS mitigation service provided by GCP. It can be positioned in front of your internet-facing applications to act as a security shield, filtering malicious traffic before it reaches your backend servers. Cloud Armor provides a multi-layered defense against various risks as ... Read more

The post Boost Your Application Security: How to Leverage GCP Cloud Armor for an Extra Layer of Protection appeared first on Bitwise.

]]>
What is Cloud Armor?

Cloud Armor is a global Web Application Firewall (WAF) and DDoS mitigation service provided by GCP. It can be positioned in front of your internet-facing applications to act as a security shield, filtering malicious traffic before it reaches your backend servers. Cloud Armor provides a multi-layered defense against various risks as given below.

DDoS Attacks: Cloud Armor assures availability of service during traffic surges and safeguards your applications from volumetric (L3/L4) and Layer 7 DDoS attacks. This is how you can use GCP Cloud Armor to protect against DDoS attacks.

Web Application Attacks (WAF): You can mitigate common web vulnerabilities like SQL injection and cross-site scripting (XSS) by pre-configured WAF rules based on OWASP Top 10 risks.

Cloud Armor Benefits

  • Enhanced Security: Cloud Armor safeguards your applications from a broad spectrum of threats and offers a comprehensive security solution.
  • Improved Performance: Cloud Armor reduces the load on your backend servers and enhances application performance by filtering malicious traffic at the edge.
  • Simplified Management: It provides a user-friendly interface for managing security policies and monitoring traffic patterns.
  • Global Scale: Consistent protection across all your GCP regions is assured by globally distributed network ensures.

Reference:

GCP Cloud Armor Architecture Diagram: Illustrates a web application protected by Cloud Armor, including authentication, load balancing, Compute Engine, GKE, and Cloud DNS.

  • Users access your application on the internet.
  • Traffic is routed through Cloud Load Balancing, which can be integrated with Cloud Armor.
  • Cloud Armor’s WAF engine inspects incoming traffic, filtering out malicious requests based on pre-configured rules or custom policies.
  • Legitimate traffic is forwarded to your application servers / backend services.

Sample Policy for reference –

Pros and Cons of using Cloud Armor

Benefits of using GCP Cloud Armor for web application security:

  • Provides web application vulnerabilities and security against DDoS attacks.
  • Better application performance and availability.
  • User-friendly interface and simplified security management.
  • Scalable protection that adapts to your application’s traffic patterns.

Drawbacks of using GCP Cloud Armor:

  • Additional cost associated with Cloud Armor usage.
  • Might need configuration adjustments for existing applications.
  • Might add slight latency because of additional processing at the edge.

Cost Considerations

The charges of configuring GCP Cloud Armor for optimal protection are based on incoming and outgoing request counts. You can leverage GCP’s free tier for limited usage. Pay-as-you-go pricing applies for exceeding the free tier limits. Refer to GCP’s pricing documentation for detailed cost information

https://cloud.google.com/armor/pricing.

Conclusion

GCP Cloud Armor offers a comprehensive security solution for your internet-facing applications on Google Cloud Platform. It safeguards your applications from a wide range of threats, improves performance, simplifies management, and provides global protection. While there are additional costs and potential configuration adjustments, the benefits of enhanced security, improved application health, and user-friendly management outweigh the drawbacks for most organizations. Contact Us to discuss your application security needs with our experts and determine if Cloud Armor aligns to your objectives.

The post Boost Your Application Security: How to Leverage GCP Cloud Armor for an Extra Layer of Protection appeared first on Bitwise.

]]>
https://www.bitwiseglobal.com/en-us/blog/boost-your-application-security-how-to-leverage-gcp-cloud-armor-for-an-extra-layer-of-protection/feed/ 0
3 Imperatives For Rock-Solid Information Security Compliance In The Enterprise https://www.bitwiseglobal.com/en-us/blog/3-imperatives-for-rock-solid-information-security-compliance-in-the-enterprise/ https://www.bitwiseglobal.com/en-us/blog/3-imperatives-for-rock-solid-information-security-compliance-in-the-enterprise/#respond Mon, 24 Aug 2015 12:24:00 +0000 https://www.bitwiseglobal.com/en-us/3-imperatives-for-rock-solid-information-security-compliance-in-the-enterprise/ 1. Opportunities for Improvement As the years are progressing, the volume of data is increasing. Attacks and threats are becoming more sophisticated. The traditional approach was mostly reactive in nature (i.e. when the incident would take place, the appropriate controls will be applied). Organizations should take a proactive approach where the technology environment eliminates the ... Read more

The post 3 Imperatives For Rock-Solid Information Security Compliance In The Enterprise appeared first on Bitwise.

]]>

1. Opportunities for Improvement

As the years are progressing, the volume of data is increasing. Attacks and threats are becoming more sophisticated.

The traditional approach was mostly reactive in nature (i.e. when the incident would take place, the appropriate controls will be applied). Organizations should take a proactive approach where the technology environment eliminates the possibility of an incident. Imagine building an application that has inbuilt security rather than applying separate software to protect the application. On similar lines, I can think of a couple of good examples which I observed during my internal audits at Bitwise. The most important of them was MAC binding of devices on the network. This eliminates the possibility of an unknown or a rogue device getting connected with the network.

Another solution applied to many clients of Bitwise is a combination of solutions that have significantly eliminated the risks related to malicious activity by users. The desktop solution to users is a combination of zero compute thin client and virtualization. This solution has ensured that all compliance requirements of BFSI clients are met. The beauty of this is that there is no possibility of any manual oversights in the policies and no malicious activity is possible at the user end. Apart from security, this solution has also reduced the cost on electricity bills by 60%

These proactive approaches ensure that the information security team focuses not only on known risks but also on unknown risks. Another advantage of this proactive approach is that it significantly decreases internal audit costs as the scope is limited and centralized. Adapting to solutions like preventing data leakage and virtualization are efforts towards this direction. The advent of Big Data will play a significant role in this approach as analysis of information security data will help organizations understand the hidden vulnerabilities and addressing them in a timely fashion.

2. Vision for the Future

Cost plays a vital role in information security solutions. Surveys allude to the fact that there is always a gap between the current level of information security and the necessary level of information security. This gap will depend how closely information security goals are aligned with business goals.

New digital forces like social networking and wireless devices are business priorities for most organizations. The vulnerabilities and risks associated with these forces are best handled when security teams are involved at the conceptualization stage of these initiatives. This way the team is provided a sufficient window to include these risks in their existing plans; working with infrastructure teams to create a roadmap that will set the foundation for safe implementation of these modern-day concepts. Rather than a one-time investment in the security of these apps and tools, the cost is spread across many years and often are “piggybacked” onto other capital investments.

Hardware refresh or upgrade is a very common practice for an IT organization and the decision for the new hardware dictates the future of the environment for at least the next 3-4 years until the next refresh takes place. This standard practice by itself is a good example of how information security can be included in decision-making and future planning. By drawing up the business vision along with the Information security team the associated risks from the envisioned environment can be included in the process of decision making while working with the infrastructure team during hardware refresh policies. The same applies for physical security where business goals like new facilities, data centers can be included while deciding the capacity of new equipment.

3. Innovativeness in the Security Model

With social networking sites and blogs, enough personal and corporate information is moving to the internet to act as fodder for cybercriminals. Standard security features with standard options are implemented to reduce the associated risks. This at times can be the weak link in the cat and mouse race with the bad guys who often tend to observe and exploit vulnerabilities. An organization can allocate certain efforts for security in its innovation center which will allow a certain degree of uniqueness in the security setup of the organization. It could be a simple training or a tweak in the process which will make things more efficient.

For example, while dealing with a unique compliance requirement from a client who did not want RSA tokens to move outside Bitwise premises there was a lengthy workflow associated to keep a track of a single key. The innovation center suggested attaching a wooden block to each RSA stub and label it. The size of the block was in itself a discouragement for people to carry the RSA token with them. Moreover, even if they carry it outside the floor area, there were CCTV cameras can clearly capture the event.

In another training initiative, the information security team conducted an event on security incidents where users of social networking sites were impacted. This resulted in wide acceptance of locking down these sites on certain sensitive terminals. The effect was so prominent that the security team received responses coming back from employees on terminals where these sites were not blocked and were missed.

Conclusion

A proactive approach towards information security with a vision for the future will ensure that an organization is capable of meeting the security requirements associated with emerging and future technologies. A breach in security can cause the reputation of the entire company to be at stake. Small innovations can go a long way in making security processes effective and streamlined. Bitwise provides innovative solutions to clients in meeting their information security compliance requirements. The solutions are tailored to ensure clients information assets are secured in the Bitwise environment.

The post 3 Imperatives For Rock-Solid Information Security Compliance In The Enterprise appeared first on Bitwise.

]]>
https://www.bitwiseglobal.com/en-us/blog/3-imperatives-for-rock-solid-information-security-compliance-in-the-enterprise/feed/ 0