Built-in CSP security tools and are they enough?

Chinnababu Gudapati
4 min readDec 28, 2020

The Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure are the three leading cloud service providers in the industry. They provide the best security tools for their customers for all kinds of Cloud Security situations. But sometimes, there arises a question: can these security tools safeguard your cloud infrastructure, including the APIs and other applications?

In this article, a brief survey portrays the security tools that are offered by these major CSPs. An in-depth discussion sheds light on the things they are and aren’t capable of doing, the procedures they offer in giving that complete security mechanism.

The Chief Three

AWS, GCP, and Azure’s security tools possess differences in their working mechanism and look similar in many ways. Each CSP has its unique type of protection mechanism. A complex infrastructure security solution called a Web Application Firewall (WAF) is used by AWS to protect its environment. Simultaneously, the GCP uses its version of firewalls, the Cloud Armor, and the Command Centre for its security purposes. Microsoft owns azure security services to combat cyber threats, and they are two-fold. For managing the applications, the Azure Security Centre is used to filter the malicious traffic Azure uses its Web Application Firewall.

Apart from the WAFs, these Cloud Service Providers also offer DDoS security. For this purpose, Microsoft uses Azure DDoS protection, Google uses Cloud Armor, and AWS implies AWS shield.

Their Positives

The tool mentioned above works perfectly in blocking all the malicious traffic and hostile requests. The more effective one is that it is built as a native product and into the cloud infrastructure, making it very simple to deploy. One can also combine these tools with other services like reporting and logging offered by the specific Cloud Service Providers.

Another major plus is the pricing it has been offered. Some of the tools are even free of cost. These tools have already existing or pre-designed security protocols. Google Cloud Armor’s WAF is using many pre-existing rules. They offer high-grade protection against Code attacks, file inclusion, SQL injection, and Cross-site scripting mechanism.

Their Negatives

These tools and security services lack in a significant way by not providing complete protection. Beyond layer 4, the DDoS attack prevention methods do not work. Within the configured rules and set of scopes, the WAF products work smoothly and not beyond that. The contents are minimal, and the set rules only cover a few usual threats.

Also, whenever needed, the admin can create added security policies. The admins’ skillset must be high to formulate and design the best, practical, and good rulesets. If the policies created are incomplete or not ideal, then it would lead to a new issue of creating security gaps in your cloud environment. Apart from all these, ongoing maintenance is also another essential factor. As the dark web is simultaneously evolving, the Cloud Service Provider’s security services must also remain updated with the existing technology equal to cyber threats. The process of security services must involve the complete monitoring processes of CVE datasets, Checking the feeds of risk advisories, etc.

These processes demand adequate efforts and time; if not done correctly, the cost of failure is too high. The major CSPs do not charge any money for the use of essential security tools. AWS offers its customers the AWS Shield to use it for free (the standard version). Like rate-based rules and elastic load balancing, some of the advanced features are only available in the advanced version, which is a paid service. Azure and GCP have several similar features too.

But are these tools enough?

It is NOT! Often, these security services and tools’ portrayal may look exciting and useful, but they are not. The free tools provided by the CSPs have only minimal scope compared to the paid means’ range.

How to achieve complete security?

We need to remember that a partial protection mechanism among the evolving threat environment is no protection and all. One would need a complete and effective solution to combat all security threats.

The employment of advanced and next-generation WAF, total API security, preventing the account from taking over, managing bots, and Multiple layer DDoS protection must ensure a complete protection mechanism to your cloud environment.

A native Security mechanism that is integrated with the CSPs and provides built-in security services must be preferred. In AWS, you can turn the Shield into an autonomous system that can identify and dodge every cyberattack type within seconds. The same process works for GCP as well. In Azure, one can improve the Azure Security center by adding tracking live traffic data and comprehensive web security by enhancing the WAF.

The Cloud environment can be put to better use and render more benefits if all-around protection is provided.

--

--