5+4 = The New Cloud Security Stack

Eli Arkush
image 4 Min read
Your Innovation Feed

Infrastructures, threat, and security are all under a quick, constant evolution. Once every few year there comes a tipping point which forces us to rethink our technology posture. 2020 was that tipping point.

The cloud surge has peaked during the Pandemic, as remote work became the new normal for most office-based businesses. This has introduced insider threats at an unprecedented scale, forcing companies to rethink fundamental concepts like user identities, permissions, and secure access.

In parallel, we saw a widespread adoption of Open Source code as part of the software development cycle – introducing the threat of undiscovered vulnerabilities and dependencies to almost any product out there.

Lastly, InfoSec compliance standards (like anything accounting, really) become increasingly complex as they evolve, and and apply to more companies than ever before.

Happening pretty much all at once, these trends now require a new approach to innovation adoption in general, and to cloud security architecture in particular. Having said that, we don’t want security to slow down the business as it has done so far. On today’s global, hypercompetitive business landscape, where everyone just seeks to scale as quickly as possible, security is often an afterthought – and this is a dangerous habit. We know that shifting left will only be realized if security stops becoming a nuisance.

Hence we sat down to define the basics of an adequate security stack – the very minimum that can protect the digital business from 2021’s security threats, while allowing core business processes like product development run uninterrupted.

The What: 5 Must-Have Solutions on New Cloud Security Stack

  • Identity & Access Management (IAM) – Integrating MFA (Multi-Factor Authentication) and SSO (Single Sign-On) in employees’ remote access workflows should be the new standard of interacting with enterprise applications from anywhere, anytime. Automate employee onboarding, offboarding and role change provisioning to enable quick growth. 
  • Zero Trust Access – No one can be trusted these days, as attackers can gain control of legitimate employees’ laptops and gain access to the corporate network. Zero Trust Access solutions can enforce authentication and authorization for employees and limit their access to enterprise resources based on the least privilege principle to minimize the attack surface.
  • Open Source Security – Developers rely heavily on open source packages when building their code more like lego than painting from scratch. Dependencies rely on other dependencies and it takes only one vulnerability in an open-source class to cause potential harm to many corporate products built using this class. Open-source security solutions will continuously monitor and detect all the open-source dependencies in the code and alert on any vulnerabilities.
  • Cloud Workload Protection – In a world where many companies are using public cloud computing, storage and networking services, there are different cybersecurity threats aiming to gain access to sensitive data and exfiltrate it from the cloud. CSPM (Cloud Security Posture Management) and CWPP (Cloud Workload Protection Platforms) solutions can detect and minimize excessive permissions and misconfigurations in the public cloud.
  • End-to-End Compliance – compliance is a necessary evil that’s becoming more relevant than ever. Whether you’re a B2B company and would like to sell your services to large enterprises, financial institutions, healthcare and public sector organizations, or you’re a B2C company and must store and protect your end-user’s private information – you must include end-to-end compliance in your product design process.

The How: 4 Must-Have Traits of Cloud Security Solutions

  • SaaS Consumption Model – No more hardware-based appliances you need to plan and pay for years in advance. The ability to scale your usage up or down and pay for what you use is crucial in today’s rapidly changing reality. Automatic updates to the solution, (ensure a solution is always up-to-date) closing the consumption gap by inheriting the new features of each update.
  • DevOps & Integrations – The ability to integrate with existing tools and components within the company’s IT / DevOps environment: communication & collaboration apps (Slack), centralized monitoring / SIEM (Sumo Logic), API interface to make configuration changes or view reports, Active Directory, GSuite / Office365, HR Systems and other enterprise apps. No more UI-only based solutions you must manage from dedicated interfaces. Born in the cloud and originally designed for cloud environments – not converted. 
  • Noise-Free Alerts & Remediation – The ability to learn the company’s normal patterns and alert / act only on highly suspicious, true positive anomalies. Solutions that have AI or ML capabilities, using big data to determine which activities are malicious and require intervention, and in what priority.
  • Compliance Assistance – Using security solutions that enable compliance with the common security standards such as PCI-DSS, ISO-27001, SOC2, etc. By implementing them, companies can achieve security compliance faster with fewer efforts involved.


Cybersecurity threats grow at a rapid pace as new technologies emerge. CIOs and CISOs are in a constant race to beat the bad actors and deploy the best in class security solutions. Make sure you evaluate new security solutions based on the traits above, consult with cybersecurity partners that deal with these challenges on a daily basis, in order to get you protected, not just covered.

Explore the new security stack further on our Cloud Security universe.



There’s more to see

slider item
Your Innovation Feed

A Real-Life Guide to a Successful Cloud Strategy

Steven Puddephatt 13.01.22

GlobalDots is proud to present the ultimate practical guide to planning your cloud exosystem and achieving Good Cloud Governance – also referred to by AWS as a Well-Architected Framework. Who’s it for? Owners the enterprise’s technology posture, e.g.: CIOs Chiefs of Infrastructure Heads of Digital Strategy etc… What’s it good for? Enterprise use cases can […]

Read more
slider item
Your Innovation Feed

5 Ways to Streamline IT & Security Innovation Adoption in 2022

Shalom Carmel 29.12.21

The New IT is Under Growing Pressure Technology has evolved into a vital instrument in every company, aiding in retaining a competitive advantage in an ever-competitive market. It is also constantly changing, with new features and options appearing by the hour. That is why, amid the ever-increasing complexity of their work environment, IT & Security […]

Read more
slider item
Your Innovation Feed

eBook: Don’t Fortify, Amplify: The New Cloud Security Stack

Steven Puddephatt 25.11.21

2021’s Security leaders deal with everything from cloud-native insider threats to staying one step ahead of the unknown. While the cloud is made to amplify and speed up core business processes, the pressure to fortify cloud-borne assets from possible cyber threats painfully slows things down.  GlobalDots harnessed its 17-year cloud security experience to rethink cloud […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure