It has been said that the “hero of a successful digital transformation is GRC.” The ISACA website states, “to successfully manage the risk in digital transformation you need a modern approach to governance, risk and regulatory compliance.” For GRC program development, it is important to understand the health information technology resources and tools available to enable long term success.
What is GRC and why it important?
According to the HIPAA Journal, the average cost of a healthcare data breach is now $9.42 million. In the first half of 2021, 351 significant data breaches were reported, affecting nearly 28 million individuals. The needs have never been more acute among healthcare providers, insurers, biotechnology and health research companies for effective information security and controls. Protecting sensitive data and establishing a firm security posture is essential. Improving health care and reducing cost relies on structured approaches and thoughtful implementation of available technologies to help govern data and mitigate risk across the enterprise.
Effective and efficient management of governance, risk, and compliance, or GRC, is fast becoming a business priority across industries. Leaders at hospitals and health systems of all sizes are looking for ways to build operating strategies that harmonize and enhance efforts for GRC. Essential to that mission are effective data governance, risk management, regulatory compliance, business continuity management, project governance, and security. But rather than stand-alone or siloed security or compliance efforts, a cohesive program coupled with GRC solutions allow for organizational leaders to address the multitude of challenges more effectively and efficiently.
What are the goals for I.T. GRC?
For GRC efforts, leaders are looking to:
Safeguard Protected Healthcare Data
Meet and Maintain Compliance to Evolving Regulatory Mandates and Standards
Identify, Mitigate and Prevent Risk
Reduce operational friction
Build in and utilize best practices
Managing governance, risk, and compliance in healthcare enterprises is a daunting task. GRC implementation for healthcare risk managers can be difficult, especially during this time of rapid digital and cloud transformation. But relying on internal legacy methods and tools leads to the same issues that have been seen on-premises, stifling innovation and improvement. As organizations adapt to cloud environments as a key element of digital transformation and integrated health care, leaders are realizing that now is the time to leverage the technology to implement GRC frameworks that accelerate their progress toward positive outcomes. What’s needed is expertise and a clear roadmap to success.
Cloud Automation of GRC
The road to success starts with a framework, aligned to business objectives, that provides cloud automation of Governance, Risk, and Compliance. Breaking this into three distinct phases, ideally this would involve:
Building a Solid Foundation – within the cloud environment, ensuring infrastructure and applications are secured before they are deployed.
Image/Operation System hardening automation pipelines.
Infrastructure Deployment Automation Pipelines including Policy as Code to meet governance requirements.
CI/CD Pipelines including Code Quality and Code Security.
Disaster Recovery as a Service (DRaaS) meeting the organization’s Business Continuity Planning requirements.
Configuration Management to allow automatic remediation of your applications and operating systems.
Cost Management strategies with showback and chargeback implementation.
Automatic deployment and enforcement of standard security tools including FIM, IDS/IPS, AV and Malware tooling.
IAM integration for authorization and authentication with platforms such as Active Directory, Okta, and PingFederate, allowing for more granular control over users and elevated privileges in the clouds.
Reference Architectures created for the majority of the organization’s needs that are pre-approved, security baked-in to be used in the infrastructure pipelines.
Self-service CMDB integration with tools such ServiceNow, remedy and Jira ServiceDesk allowing business units to provision their own infrastructure while providing the proper governance guardrails.
Resilient Architecture designs
Proper Configuration and Maintenance – Infrastructure misconfiguration is the leading cause of data breaches in the cloud, and a big reason misconfiguration happens is infrastructure configuration “drift,” or change that occurs in a cloud environment post-provisioning. Using automation to monitor and self-remediate the environment will ensure the cloud environment stays in the proper configuration eliminating the largest cause of incidents. Since workloads will live most of their life in this phase, it is important to ensure there isn’t any drift from the original secure deployment. An effective program will need:
Cloud Integrity Monitoring using cloud native tooling.
Log Management and Monitoring with centralized logging, critical in a well-designed environment.
Managed Services including patching to resolve issues.
SLAs to address incidents and quickly get them resolved.
Cost Management to ensure that budgets are met and there are no runaway costs.
Perimeter security utilizing cloud native and 3rd party security appliance and services.
Use of Industry Leading Tools – for risk assessment, reporting, verification and remediation. Thwart future problems and provide evidence to stakeholders that the cloud environment is rock solid. Tools and verification components would include:
Risk Registry integration into tools
Future attestations (BAAs)
Audit evidence generation
Where do you go from here?
Your organization needs to innovate faster and drive value with the confidence of remaining in compliance. You need to get to a proactive state instead of being reactive. Consider an assessment to help you evaluate your organization’s place in the cloud journey and how the disparate forms of data in the organization are collected, controlled, processed, stored, and protected.
Start with an assessment that includes:
Identification of security gaps
Identification of foundational gaps
Managed service provider onboarding plan
A Phase Two (Foundational/Remediation) proposal and Statement of Work
About 2nd Watch
2nd Watch is a trusted and proven partner, providing deep skills and advisory to leading organizations for over a decade. We earned a client Net Promoter Score of 85, a good way of telling you that our customers nearly always recommend us to others. We can help your organization with cloud native solutions. We offer skills in the following areas:
Developing cloud first strategies
Migration of workloads to the cloud
Implementing automation for governance and security guardrails
Implementing compliance controls and processes
Pipelines for data, infrastructure and application deployment
Cloud adoption throughout all industries has become incredibly pervasive in recent years. With cloud management as a relatively newer concept, business organizations may struggle to understand each aspect that is required to effectively run a cloud environment. One aspect that should be involved at every layer of the cloud is security, yet many organizations fail to implement a strong security system in their cloud until an attack happens and it is too late.
A cloud environment and the controls necessary to orchestrate a robust security and governance platform is not the same as your traditional on-premises environment.
The State of Cloud Security Today
As beneficial as the public cloud is for companies globally today, lack of security in the cloud can be a major issue. A report from Sophos indicated that iMost of these attacks are simply from misconfigurations of these organizations’ cloud security. Thus, the attacks can be prevented if configured and managed properly. Orca Security’s 2020 State of Public Cloud Security Report revealed that 80.7% of organizations have at least one neglected, internet-facing workload – meaning the OS is unsupported or unpatched. Attackers can use one small vulnerability as leverage to move across an organization, which is how most data breaches occur.
Managed cloud security services help lay a strong foundation for security in the cloud that is automated and continuous with 24/7 management. With constant management, threats and attacks are detected before they occur, and your business avoids the repercussions that come with security misconfigurations.
What are managed cloud security services?
Managed cloud security services provide security configurations, automation, 24/7 management, and reporting from an external cloud security provider. If an attack should occur, the result is downtime and the loss of money and data. Additionally, the lack of a well-rounded security system can lead to regulatory compliance challenges.
Monitoring and maintaining strong security requires continuous attention to be effective. Employing a managed security service gives businesses the protection they need while simultaneously providing IT departments with additional time to focus on other business concerns. Redirecting cybersecurity efforts to an external provider not only provides IT departments with flexibility, but also reduces costs compared to handling cybersecurity in house. Managing cybersecurity independently creates costs such as staffing, software licensing, hardware, implementation costs, and management costs. All the costs and management required for effective security can be overwhelming and managed security services takes the weight of maintaining the security of your data off your shoulders.
What are the benefits of using cloud security services?
Implementing strong cloud security may seem like an obvious choice for a business to make, but many businesses may not want to devote the time, resources, or money to building and maintaining a strong cybersecurity system. Investing your resources into cloud security is imperative for your business and pays off in the long run.
Five different benefits resulting from a strong cloud security system include:
Automation: Once your configurations have been set up, there is reduced reliance on human intervention. This minimizes time spent managing security while also reducing the risk for error.
Efficiency: Cloud services improve the security of your data and maintain regulatory compliance through timely patching and automated updates with less downtime.
Safety: Data is well-protected with cloud security due to 24/7 monitoring and real-time threat detection.
Proactive Defense: Threats are identified quickly and treated proactively in the cloud should an incident occur.
Cost-effective: The cloud requires a unique approach to security. While managed cloud security services can seem costly upfront, they prove to be worthwhile in the long run by utilizing expertise that may not be available in-house. Additionally, cloud security services will ensure the safety of your workloads and data, and prevent the costs associated with a data breach.
2nd Watch Managed Cloud Security
At 2nd Watch, we understand cloud security is important at every step of your cloud journey. 2nd Watch has a dedicated Managed Security Team that monitors your cloud environments 24/7/365, remediating vulnerabilities quickly. Rather than putting security on the backburner, we believe security is a pillar of business, and building it into the foundation of a company is important to meet evolving compliance needs in a cost-effective manner.
Companies just getting started in the cloud can rely on 2nd Watch to get security right for them the first time. Even for companies already established in the cloud, we can take an in-depth look at security and compliance maturity, existing capabilities, and growth trajectory to provide a prescriptive security roadmap. No matter where you are in your cloud journey, we ensure your security is well-integrated into your cloud environments.
At 2nd Watch we are with you from beginning to end, monitoring your security even after implementation. At a glance, our end-to-end services include:
Security Review: Ensures the proper safeguards are utilized for your multi-cloud environments with a single point of contact for your security needs. Our security assessment and remediation offering can reveal how your cloud security posture stacks up to industry standards such as CIS, GDPR, CCPA, HIPAA, NIST, PCI DSS, and SOC 2.
Environment Monitoring: 24/7/365 multi-cloud monitoring protects against the most recent vulnerabilities.
Threat Analysis: Managed Reliability Operations Center (ROC) proactively analyzes and remediates potential threats.
Issue Resolution: Identified issues are quickly resolved providing enterprise class and proactive defense.
Other solutions we provide include:
Security should be integrated into every layer of your public cloud infrastructure. We can help you achieve that through our comprehensive suite of security services and a team of experts that cares about your success in the cloud. To learn more about our managed cloud security services, visit our Cloud, Compliance, Security, & Business Continuity page or talk to someone directly through our Contact Us page.
The Advantages of Cloud Computing for Media & Entertainment
We are living in a revolutionary era of digital content and media consumption. As such, media companies are reckoning with the new challenges that come with new times. One of the biggest changes in the industry is consumer demand and behavior. To adapt, M&E brands need to digitally transform their production, distribution, and monetization processes. Cloud solutions are a crucial tool for this evolution, and M&E organizations should prioritize cloud strategy as a core pillar of their business models to address industry-wide shifts and stay relevant in today’s ultra-competitive landscape.
The Challenge: Addressing Greater Audience Expectations and Volatility
Viewing behavior and media distribution has greatly impacted the M&E industry. Entertainment content consumption is at an all-time high, and audiences are finding new and more ways to watch media. Today, linear television is considered old-school, and consumers are favoring platforms that give them the power of choice and freedom. Why would you tune in to your cable television at a specific time to watch your favorite show when you can watch that same show anytime, anywhere, on any device or platform?
With new non-linear television services, media companies have less control over their audiences’ viewing experience. Before, viewers were constrained by broadcasting schedules and immobile, unconnected TVs. Now, audiences have taken viewership into their own hands, and M&E brands must discover ways to retain their viewers’ attention and loyalty in the era of endless options of content creators and streaming platforms.
The Cloud Has the Flexibility and Scalability to Handle Complex Workflows
OTT streaming services are the most popular alternative to linear television broadcasting. It is a solution that meets the audience’s expectation of access to content of their choosing whenever and wherever they want. However, OTT platforms require formatting multiple video files to be delivered to any device with varying connection speeds. As such, OTT streaming services need advanced video streaming workflows that encode and transcode, protect content, and possess storage capacities that continuously grow.
Because OTT broadcasting has complicated workflows and intense infrastructure needs, M&E companies need to consider scalability. OTT streaming that utilizes on-premises data centers will stymie growth for media organizations because legacy applications and software are resource and labor intensive. When OTT services are set up with on-premises streaming, it requires a group of configured live encoding and streaming services to deliver content to audiences.
The in-house services then need to have the computing capacity and capabilities in order to deliver content without interruptions. On top of that, technical staff are necessary to maintain the proprietary hardware, ensure its security, and continuously upgrade it as audiences grow. If companies opt for on-premises OTT streaming, they will not be able to achieve the scalability and quality of experience that they need to keep up with audience expectations.
A cloud-based infrastructure solves all of these issues. To reiterate, on-premises OTT platforms are very resource-intensive with complex ongoing maintenance and high upfront costs. Using cloud services for OTT streaming addresses the downfalls of on-premises streaming by leveraging a network for services dedicated to delivering video files. The benefits of cloud computing for OTT workflows immensely impact streaming latency and distribution, leading to a better end user experience. Cloud infrastructures have the following advantages to on-premises infrastructure:
Geography: Unlike in-house data centers, cloud servers can be located around the world, and content can be delivered to audiences via the closest data center, thereby reducing streaming latency.
Encoding and transcoding: Cloud services have the ability and capacity to host rendered files and ensure they are ready for quick delivery.
Flexible scalability: Providers can easily scale services up or down based on audience demands by simply adding more cloud resources, rather than having to purchase more infrastructure.
Cost optimization: Cloud cost is based on only the resources a business uses with none of the maintenance and upkeep costs, and the price adjusts up or down depending on how much is consumed. on-premises costs include server hardware, power consumption, and space. Furthermore, on-premises is inflexible based on actual consumption.
The Cloud Can Help You Better Understand Your Audiences to Increase Revenue
Another buzzword we hear often these days is “big data.” As audiences grow and demonstrate complex behaviors, it’s important to capture those insights to better understand what will increase engagement and loyalty. Cloud computing is able to ingest and manage big data in a way that is actionable: it is one thing to collect data, but it is another thing to process and do something with it. For M&E organizations, utilizing this data helps improve user experiences, optimize supply chains, and monetize content better.
Big data involves manipulating petabytes of data, and the scalable nature of a cloud environment makes it possible to deploy data-intensive applications that power business analytics. The cloud also simplifies connectivity and collaboration within an organization, which gives teams access to relevant and real time analytics and streamlines data sharing. Furthermore, most public cloud providers offer machine learning tools, which makes processing big data even more efficient.
From a data standpoint, a cloud platform is an advantageous option for those who are handling big data and want to make data-driven decisions. The compelling benefits of cloud computing for data are as follows:
Faster scalability: Large volumes of both structured and unstructured data requires increased processing power, storage, and more. The cloud provides not only readily-available infrastructure, but also the ability to scale this infrastructure very rapidly to manage large spikes in traffic or usage.
Better analytic tools: The cloud offers a number of instant, on demand analytic tools that enable extract, transform, and loading (ETL) of massive datasets to provide meaningful insights quickly.
Lowers cost of analytics: Mining big data in the cloud has made the analytics process less costly. In addition to the reduction of on-premises infrastructure, companies are reducing costs related to system maintenance and upgrades, energy consumption, facility management, and more when switching to a cloud infrastructure. Moreover, the cloud’s pay-as-you-go model is more cost-efficient, with little waste of resources.
Better resiliency: In cases of cyber-attacks, power outages or equipment failure, traditional data recovery strategies are slow, complex, and risky. The task of replicating a data center (with duplicate storage, servers, networking equipment, and other infrastructure) in preparation for a disaster is tedious, difficult, and expensive. On top of that, legacy systems often take very long to back up and restore, and this is especially true in the era of big data and large digital content libraries, when data stores are so immense and expansive. Having the data stored in cloud infrastructure will allow your organization to recover from disasters faster, thus ensuring continued access to information and vital big data insights.
The Cloud is Secure
There is a misconception that the public cloud is less secure than traditional data centers. Of course, these are valid concerns: media companies must protect sensitive data, such as customers’ personally identifiable information. As a result, security and compliance is crucial for an M&E business’s migration to the cloud.
We have read about cloud security breaches in news headlines. In most cases, these articles fail to accurately point out where the problem occurred. Usually, these breaches occur not due to the security of the cloud itself, but due to the policies and technologies for security and control of the technology. In nearly all cases, it is the user, not the cloud provider, who fails to manage the controls used to protect an organization’s data. The question for M&E business should not be “Is the cloud secure?” but rather “Am I using the cloud securely?”
Whether M&E organizations use a public cloud, private cloud, or hybrid cloud, they can be confident in the security of their data and content. Here is how the cloud is as secure, if not more secure, than in-house data centers:
Cloud architecture is homogenous: In building their data centers, cloud providers used the same blueprint and built-in security capabilities throughout their fabrics. The net effect is a reduced attack footprint and fewer holes to exploit since the application of security is ubiquitous.
Public cloud providers invest heavily in security measures: The protection of both the infrastructure and the cloud services is priority one and receives commensurate investment. Public cloud providers collectively invest billions in security research, innovation, and protection.
Patching and security management is consistent: Enterprises experience security breaches most often because of errors in configuration and unpatched vulnerabilities. Public cloud providers are responsible for the security of the cloud, which includes patching of infrastructure and managed services.
-Anthony Torabi, Strategic Account Executive, Media & Entertainment
You migrated your applications to the cloud for a reason. Now that you’re there, what’s next? How do you take advantage of your applications and data that reside in the cloud? What should you be thinking about in terms of security and compliance? In this first episode of a 5-part series, we discuss 5 strategies you should consider to maximize the value of being on the cloud. Listen now on Spotify, iTunes, iHeart Radio, Stitcher, or wherever you get your podcasts.
We’d love to hear from you! Email us at CloudCrunch@2ndwatch.com with comments, questions and ideas.
Now that you’ve migrated your applications to AWS, how can you take the value of being on the cloud to the next level? To provide guidance on next steps, here are 5 things you should consider to amplify the value of being on AWS.