• Customer Stories

      • XTREME-D

        Find out how XTREME-D was able to meet its objectives and has positioned itself for further growth by partnering with Digital Realty and leveraging PlatformDIGITAL®.

        Keep Reading
      • Telefónica UK

        See how they leveraged PlatformDIGITAL™ Data Hub to localise data aggregation, staging, analytics, streaming and data management to optimise data exchange and maintain data compliance.

        Keep Reading
      • Criteo

        By partnering with a company like Digital Realty, Criteo has somebody who can work with them to ensure they move a long way towards their sustainability goals

        Keep Reading
      • Join Digital

        With increasing demand for a turnkey experience, Join™ helps their customers brings the built and digital worlds together with the essential Network-as-a-Service and IT-as-a-Service offerings for Smart Buildings and Smart Workplaces.

        Keep Reading
      • AIB

        AIB, Inc., a leading data exchange and management firm serving over 1600 automotive customers, sought to diversify their cloud portfolio to realize reduced latency, increased availability, and harden security posture.

        Keep Reading
    • Global Data Insights Survey

      Read the survey

    • Investor Relations

      Digital Realty owns, acquires, develops and operates data centers. The company is focused on providing data center, colocation and interconnection solutions for domestic and international customers.

    • Investor Relations
    • Leadership
— Blog

4 Critical Practices to Make a Secure Transition to Public Cloud

Brandon Tikalsky, Director, Cloud & Network Architecture
May 16, 2018

After dipping their proverbial toes in the water and experimenting on a selective basis, leading enterprises around the world are now migrating to the public cloud at scale. As IT strategies shift to facilitate the movement of increasing amounts of applications and data into the cloud, business leaders are making it a priority to identify the keys to a smooth transition.

In a recent report, McKinsey outlines some factors related to the increase in public cloud adoption. They identify four practices that CISOs should implement in order to ensure a smooth transition to the public cloud and maintain a consistent, effective approach to cybersecurity. We’ll briefly outline them below.

Develop a cloud-centric cybersecurity model. It’s important that enterprises don’t maintain their on-premise security approach when they move away from on-premise storage solutions. This is because an enterprise won’t be able to maintain the requisite visibility and protection across all of its clouds and workloads. McKinsey recommends looking primarily at two areas when redeveloping cybersecurity processes from a cloud-centric perspective: how the network perimeter is defined and whether application architectures need to be altered for the public cloud.

Redesign the full set of cybersecurity controls for the public cloud. Once CISOs have developed a sound cloud-centric cybersecurity model, they need to redesign their cybersecurity controls. Controls can be categorized into eight areas, which should be thought of in relation to one another. In order to determine how to holistically approach each individual control, organizations can consider their most likely threat scenarios and the levels of security their workloads require. They can also work with CSPs to determine which controls to deploy internally and which to procure from third party providers.

Clarify internal responsibilities for cybersecurity, compared to what providers will do. Enterprises inevitably rely on cloud and other third party providers when moving to the public cloud, but that doesn’t necessarily make it an entirely hands-off approach. Collaboration between enterprises and CSPs is the best recipe for success to implement consistent, effective cybersecurity. Some of the areas identified by McKinsey that are ripe for collaboration are transparency on controls and procedures, regulation and compliance, and integrated operations monitoring and response.

Apply DevOps to cybersecurity. One of the industry’s favorite buzzwords of the past couple years, DevOps is an approach to integrating development and IT operations that supports continuous delivery of new software features. Applying DevOps to cybersecurity can help enterprises be more agile but leaders should be aware that it requires companies to foster a culture in which security is a way of life. In order to make secure DevOps a success, companies need to adapt their IT operating model so that security implementation becomes a part of the cloud development and deployment process.

These four recommendations only scratch the surface of the information found in McKinsey’s report. If you would like to learn more about their recommendations for making a secure transition to the public cloud, click here to read the report in its entirety. If you would like to learn about Digital Realty’s approach to security and compliance, click here.

Architech image02 2021 12 17 134536 Architech image01 2021 12 17 134535 Architech image03 2021 12 17 134537

Future-Proof Your Digital Deployment

Connect with a Digital Realty Cloud Certified Solution Architect to help build your scalable growth strategy and transform your business.

Connect with Us