The Doppler Quarterly Fall 2019 | Page 13

something great on-premises, please, please, please, do not bring that challenge to the cloud. Cloud is your moment to rethink the following processes: • Image management • Configuration management • Change management • Patch management • Identity and access management • And much much more We hesitate mentioning automation, but in each one of these areas, automation is a key component. If you are not using automation in the cloud, you will not be able to scale securely. It is that simple. What is All This About a 'Hidden Opportunity' Scoping out security in the cloud shows you what is possible on-premises. The “hidden opportunity” lies in the premise that if organizations can prove security effectiveness and efficiency in a public cloud environment, they can translate those good habits on-premises. You have abstracted your security approach and applied it to the cloud. You have shown that you can achieve automation, secure deployment pipelines, immutable infrastruc- tures, continuous compliance and consistent protection of data, all in the cloud. Now, by applying these security approaches on-premises, you will upgrade your overall security ecosystem, your team will no longer be overworked and understaffed – and as security professionals, you can move from being “back on your heels,” to “ready to sprint.” This ultimately is your organization’s “hidden opportunity” to turn the tables on its security attackers, bringing the fight to them. FALL 2019 | THE DOPPLER | 11