Logo
  • Deals
    • Hardware - Overview
      • Mobile Computing - Overview
      • Notebooks
      • Mobile Workstations
      • Tablets
      • Smartphones & Mobile Phones
      • Wearables
      • Mobile Computing Warranties & Services
      • Mobile Computing Accessories
      • Mobile Computing Spare Parts
      • Communication & Conferencing - Overview
      • Conference Systems
      • VoIP Telephony
      • Headsets
      • Webcams
      • Communication Warranties & Services
      • Communication Accessories
      • IT Infrastructure - Overview
      • Servers
      • Storage
      • Uninterruptible Power Supply
      • Network
      • Security
      • Racks
      • IT Infrastructure Warranties & Services
      • IT Infrastructure Accessories
      • IT Infrastructure Spare Parts
      • Computing - Overview
      • PCs
      • Workstations
      • Thin Clients
      • All-in-One PCs
      • Point of Sale & Point of Information
      • Computing Warranties & Services
      • Computing Accessories
      • Computing Spare Parts
      • Peripherals - Overview
      • Monitors
      • Public Displays
      • TVs
      • Projectors
      • Input Devices
      • Audio, Photo & Video
      • Peripherals Warranties & Services
      • Peripherals Accessories
      • Printers & Scanners - Overview
      • Printers
      • Label Printers
      • Disc Duplicators
      • Scanners
      • Barcode Scanners
      • Mobile Data Collection
      • Consumables
      • Warranties & Services
      • Printer & Scanner Accessories
      • Printer Spare Parts
      • Components - Overview
      • SSDs & HDDs
      • Memory
      • Graphics Cards
      • Drives & Enclosures
      • Interfaces & Controllers
      • Storage Media
      • Power Supplies
      • Processors
      • Component Accessories
      • Connectivity - Overview
      • Network Connectivity
      • PC Connectivity
      • USB Connectivity
      • Power Connectivity
      • Phone Connectivity
      • Device Servers
      • Extenders & Splitters
      • Connectivity Accessories
      • Office Equipment - Overview
      • Organisation & Ergonomics
      • Smart Home
      • Cleaning Products
      • Safety, Security & Protection
      • Office Appliances
      • Mounting Solutions
      • Office Furniture
      • Batteries
      • Office Equipment Accessories
      • Outlet - Overview
      • B-Stock
    • Software - Overview
      • Storage, Backup & Recovery - Overview
      • Client Backup & Recovery
      • Backup, Recovery & Archiving
      • Server Backup & Recovery
      • Security Software - Overview
      • Endpoint Security
      • E-mail Security
      • Security Suites
      • Mobile Security
      • Network Security
      • Cloud Security
      • Gateway Security
      • Management & Training
      • Development Software - Overview
      • Project Management & Collaboration
      • Collaboration Software - Overview
      • Communication
      • Document Management
      • File Sharing
      • Office Applications - Overview
      • Office Software & Add-ons
      • Creative Design & Publishing
      • Infrastructure Software - Overview
      • Operating Systems
      • Monitoring & Reporting
      • Software Deployment & Maintenance
      • Print Management
      • Optimisation
      • Virtualisation - Overview
      • Desktop Virtualisation
      • Infrastructure & Management
    • IT Solutions - Overview
      • Business Applications - Overview
      • Collaboration
      • Enterprise Resource Planning
      • DMS & ECM
      • Template Management System Docunize
      • Artificial Intelligence
      • Cloud solutions - Overview
      • Multi-Cloud
      • Public cloud
      • Clouds-Shop
      • FinOps (Financial Operations)-Service
      • Data & Analytics - Overview
      • Data platform and integration
      • Analytics & AI
      • Data visualisation
      • Data strategy
      • Data Centre - Overview
      • Multi Cloud
      • Modular Data Center Competence
      • Hyper Converged Infrastructure
      • Software-defined Datacenter
      • SAP HANA Infrastructure
      • IoT/AI - Overview
      • Bechtle Control Suite
      • Servinvent | Platform for collating medical devices
      • Modern Workplace - Overview
      • 360° Workplace of the Future
      • Device as a Service
      • Modern meetings
      • Communication and Collaboration
      • Azure Virtual Desktop Solutions
      • Mobile working ▷ Remote & flexible on the road
      • Managed Workplace Services
      • Efficient room management
      • Workplace Security
      • Networking - Overview
      • Data Centre Networking
      • Enterprise Networking
      • Bechtle service bundles for Cisco infrastructure
      • IT Security - Overview
      • Application Security
      • Cloud Security
      • Cyber Security
      • Data Centre Security
      • Data protection and information security
      • Infrastructure & Perimeter Security
      • IAM Identity & Access Management
      • Security awareness training
      • Ransomware
      • Cyber Defence Centre
      • Display solutions - Overview
      • The Reception
      • Wayfinding
      • Employee Communications
    • IT Services - Overview
    • Service Desk
      • Consulting Services - Overview
      • Cloud Consulting
      • Managed Services - Overview
      • Printing Services
      • Azure Operations
      • 360° Managed IT
      • Bechtle Prime Support
    • Onsite Services
    • Professional Services
      • Software Asset Management - Overview
      • SAM as a Service
      • SAM Baseline
      • SAM Solution Advisory
      • SAM Cloud Readiness
      • SAM Consulting
      • SAM Century Platform
      • SAM Inventory2go
      • Workplace Services - Overview
      • Assessment, design and procurement
      • Staging and Rollout Services
      • IMAC/RD Services
      • The Bechtle Break&Fix service.
      • Customised IT Accessories
      • Financial Services - Overview
      • Consultation
      • Structuring
      • Financing
      • E-Procurement - Overview
      • My Bechtle
      • ERP Connection
      • Electronic invoicing
      • Quotes
      • Framework agreements
      • Special conditions
      • Promotion Products - Overview
      • New in
      • USB Sticks
      • Wireless Charging Station
      • Powerbanks
      • ProPro range
      • Lifestyle
      • The Webkey
      • 3D Promotional Products
      • Digital Prints Under Tempered Glass
      • Quick Service
      • Process Flow
    • 360° Managed-IT - Overview
    • 360° Managed IT on Microsoft Azure
    • 360° swiss cube
    • 360° colocation
    • 360° infrastructure
    • 360° firewall
    • 360° network
    • 360° backup control
    • 360° cloud backup
    • 360° monitoring
    • 360° CIRT
    • Career - Overview
      • Bechtle as an employer - Overview
      • Development
      • Benefits
      • Departments - Overview
      • IT
      • Sales
      • Other departments
    • Vocational education
    • Application process
    • Career Contact
    • Jobs
    • About Bechtle - Overview
      • Company - Overview
      • Management
      • Bechtle management in Switzerland
      • Locations
      • Bechtle Group Companies
      • Company Development
      • Vision 2030
      • Certifications
      • Bechtle in Switzerland
      • Investors - Overview
      • Bechtle Share
      • Publications
      • Financial Calendar
      • General Meeting
      • Corporate Governance
      • Investors Contact
      • Retail Investors
      • Software revenue according to IFRS 15
    • Sustainability / CSR
      • Events - Overview
      • Bechtle IT Forum 2025 - Replay
      • Webinar Replay Bechtle
      • Bechtle X-MAS Market. (Only French)
      • Webinar: Discover Cybersecurity with Arctic Wolf (Only German)
    • References
      • Public Sector - Overview
      • Schools and IT
      • OCRE with Bechtle
      • International business with Bechtle - Overview
      • Global IT Alliance
    • Partners
      • Contact - Overview
      • Bechtle direct Rotkreuz
      • Bechtle direct Dübendorf
      • Bechtle direct AG Schweiz Morges
      • Bechtle Schweiz AG
      • Support
      • News - Overview
      • Newsroom
      • Corporate News
      • Newsletter
      • Bechtle Blog CH
      • Podcast. bits & bytes
About Bechtle
News
Bechtle Blog CH
IT-Security
Blog Post secure in the cloud thanks to automated security strategies
IT-Security - Sep 11, 2023

Secure in the cloud thanks to automated security strategies.

by Maximilian Munker

The path to the cloud often fails because of one question: Who takes care of security? Yet many cloud providers have already integrated the security measures. Fully automated, they monitor not only data, but also user identities, computer resources and compliance guidelines.

"We are not a target for cyber attacks", many companies still think these days. They are sure: with the existing on-premise infrastructure, attackers from outside have a hard time. However, according to the Microsoft Digital Defense Report 20221, increasing networking, digitalisation and not least the rapid developments in the field of artificial intelligence, which are also used by cyber criminals, are leading to increasingly complex approaches by attackers. In addition, the criminal cyber economy is becoming increasingly industrialised. As a result, attacks via the internet are an everyday threat to every company and can cause immense damage. Contrary to the widespread opinion that the cloud is much more susceptible to attacks here, in everyday corporate IT it is more likely to be gaps in the security measures and tools used and in the lifecycle management of IT resources that help ransomware attacks to succeed, for example.

Is on-premises more secure than the cloud?

The security of an on-premises environment can therefore be deceptive. Even though the total costs may be more manageable, the monthly costs over the entire life cycle can be calculated more transparently if the data is outsourced to the cloud. In addition, with on-prem environments, the companies themselves are responsible for keeping the software up to date and for security precautions. This is a real challenge in view of the current shortage of skilled workers. Outdated hardware and software, non-compliant security solutions or a rather neglected identity and rights management can quickly lead to security gaps. If the servers are located in-house, corporate IT must also take care of maintenance and updates itself.

Security through the on-boarding tools of cloud providers.

The situation is different with cloud solutions. Professional public cloud providers such as Amazon AWS, Google Cloud or Microsoft Azure offer integrated, comprehensive security and compliance controls that automatically and, above all, quickly close security gaps and actively combat threats. Tasks that conventional individual applications can hardly perform in total, or only with very high effort. The comprehensive security services of the cloud providers take action against all common attack scenarios and offer, among other things, reliable identity and access management that complies with current corporate guidelines. They explicitly control all authentications and authorisations using available data such as identity, location and its plausibility, device integrity, data classification, anomalies, service or workload. Authorisations restrict the security solutions integrated in the cloud via user access with JIT/JEA (Just-in-Time/Just-Enough-Access). They relate to risk-based, adaptive policies and information protection for the company's data and files. In all of this, the automatic rule is: Simply trust nothing and no one - also called "Zero Trust".

Everyone relies on Zero Trust.

Zero Trust is now part of all professional public clouds, revolutionising the approach to security. Until now, in an on-prem network, access to IT has tended to be restricted by the access itself, and various security applications supplement this with further controls. This makes companies unnecessarily inflexible. If the "human" factor is then added, cyber dangers quickly arise that can only be contained, but no longer combated in advance. Dynamic companies, on the other hand, need a conditional access framework whose policy engine covers both policy definition and policy enforcement. This is precisely the security framework that cloud providers offer - automatically and fully integrated.

A brief comparison.

Amazon Web Services, for example, deployed a set of AWS identity and network services with centralised zero-trust building blocks where compliance policies and access rights can be defined. Google calls its zero-trust model, which allows all employees to work securely from anywhere without a VPN connection, BeyondCorp. The unified platform for identity, access, application and endpoint management (IAM/EMM) is Cloud Identity. In the Microsoft Azure Cloud, on the other hand, company data is protected by a holistic approach and numerous integrated security solutions. The zero-trust concept behind this carefully checks every access to users, devices, systems or data and initially treats it as if it were coming from an insecure network. This is followed by a comprehensive, multi-stage check: in addition to explicitly checking all available data points, the security solution checks all policies and automatically always assumes that security breaches can occur at any time (assume-breach paradigm). Thus, the system detects threats immediately and stops them before any damage is done. The holistic, multi-layered security approach of Azure thus protects company systems in advance.

Range of security solutions ensures a secure cloud.

The example of Microsoft Azure also shows how high the security standards in the cloud have become in the meantime. For identity management, protection of devices, applications, emails and data, Microsoft 365 Defender for endpoints and Azure Defender for Azure workloads and resources as well as Azure Sentinel as a SIEM and SOAR system (Security Information and Event Management / Security Orchestration, Automation, and Response) offer uniform threat management. All of the solutions mentioned use an integrated user interface and a common data model and thus actively detect threats. In addition, Microsoft Cloud App Security protects the data stored in cloud applications and services. The app, which is also fully integrated into the security solution, helps to enforce security policies and secure the data in the applications used by employees. Whether office applications, IoT or identity management, the solutions detect and protect against threats and suspicious behaviour. Shadow IT and applications on the internet (Shadow SaaS) can also be managed securely with it.

Cloud security solutions are easy to manage.

For all of this, a company that has opted for a cloud solution such as Microsoft Azure only needs little internal security expertise, as the company's own policies can be implemented by an external IT security specialist. The rest is done by the automatisms of the cloud solution. Nevertheless, the automation and the defined playbooks do not relieve the company of the responsibility to soundly assess and process the qualified security advisories and alerts. The "background noise" of security alerts is significantly reduced and fewer highly qualified security resources are needed to process the events in the company. The entire cloud environment is thus ideally protected and provides stable workloads. The holistic approach of cloud providers helps keep all resources safe from attack and keep pace with the increasing professionalisation of cybercrime. Cloud providers such as Microsoft invest heavily in their resources and the security of their services to this end. If the security functions are set correctly and employees are sensitised to the topic, companies can always trust that devices, data and applications in the cloud are safe. And those who feel secure work more productively and efficiently.

[1] https://www.microsoft.com/de-de/security/business/microsoft-digital-defense-report-2022

 

 

 

 

Written by

max-munker_portrait.png
Maximilian Munker
Consultant Information Security

E-Mail: maximilian.munker@bechtle.com

    Microsoft Cloud Partner Logo
    This post was published on Sep 11, 2023.
    Company
    Bechtle Locations
    Career
    Press
    Investor Relations
    Events
    Payment and Delivery
    Help Centre
    Contact
    Support
    Newsletter

    LinkedIn Bechtle LinkedIn Bechtle Schweiz AG

    LinkedIn Bechtle LinkedIn Bechtle direct AG

    YouTube Bechtle YouTube

    Instagram Bechtle Instagram

    Facebook Bechtle Facebook

    Products are sold exclusively to commercial end customers and the public sector.

    Prices in CHF plus VAT.

    Legal Notice Privacy Policy T&Cs
    Support-ID: a30e33bcef
    © 2025 Bechtle AG