Logo
  • Deals
    • Matériel - Aperçu
      • Informatique mobile - Aperçu
      • Ordinateurs portables
      • Stations de travail portables
      • Tablettes
      • Smartphones et téléphones portables
      • Informatique vestimentaire
      • Garanties et services - Informatique mobile
      • Accessoires - Informatique mobile
      • Pièces détachées - Informatique mobile
      • Communication et conférence - Aperçu
      • Systèmes de conférence
      • Téléphonie VoIP
      • Micro-casques
      • Webcams
      • Garanties et services - Communication
      • Accessoires - Communication
      • Infrastructure informatique - Aperçu
      • Serveurs
      • Stockage
      • Alimentations sans interruption (ASI)
      • Réseau
      • Sécurité
      • Racks
      • Garanties et services - Infrastructure informatique
      • Accessoires - Infrastructure informatique
      • Pièces détachées - Infrastructure informatique
      • Informatique - Aperçu
      • PC
      • Stations de travail
      • Clients légers
      • PC tout-en-un
      • Points de vente et points d'information
      • Garanties et services - Informatique
      • Accessoires - Informatique
      • Pièces détachées - Informatique
      • Périphériques - Aperçu
      • Écrans
      • Écrans publics
      • Téléviseurs
      • Projecteurs
      • Périphériques d'entrée
      • Audio, photo et vidéo
      • Garanties et services - Périphériques
      • Accessoires - Périphériques
      • Imprimantes et scanners - Aperçu
      • Imprimantes
      • Imprimantes d'étiquettes
      • Stations de duplication
      • Scanners
      • Lecteurs de codes-barres
      • Collecte de données mobiles
      • Consommables
      • Garanties et services
      • Accessoires - Imprimantes et scanners
      • Pièces détachées - Imprimantes
      • Composants - Aperçu
      • SSD et disques durs
      • Supports mémoire
      • Cartes graphiques
      • Lecteurs et boîtiers
      • Interfaces et contrôleurs
      • Supports de stockage
      • Alimentations
      • Processeurs
      • Accessoires - Composants
      • Connectivité - Aperçu
      • Connexion réseau
      • Connexion PC
      • Connexion USB
      • Connexion électrique
      • Connexion téléphone
      • Serveurs de périphériques
      • Extensions et répétiteurs
      • Accessoires - Connectivité
      • Équipement de bureau - Aperçu
      • Poste de travail et ergonomie
      • Smart Home
      • Nettoyage
      • Protection et sécurité
      • Appareils pour bureau
      • Supports
      • Mobilier de bureau
      • Piles et batteries
      • Accessoires - Équipement de bureau
      • Outlet - Aperçu
      • B-Stock
    • Logiciels - Aperçu
      • Stockage, sauvegarde et restauration - Aperçu
      • Solutions de sauvegarde et de restauration clients
      • Sauvegarde, restauration et archivage
      • Solutions de sauvegarde et de restauration pour serveurs
      • Logiciels de sécurité - Aperçu
      • Sécurité des terminaux
      • Sécurité des e-mails
      • Suites de sécurité
      • Sécurité mobile
      • Sécurité des réseaux
      • Sécurité du cloud
      • Sécurité des passerelles
      • Management et formation
      • Logiciels de développement - Aperçu
      • Gestion de projets et collaboration
      • Logiciels de collaboration - Aperçu
      • Communication
      • Gestion de documents
      • Échange de fichiers
      • Applications bureautiques - Aperçu
      • Logiciel Office et modules complémentaires
      • Design créatif et édition
      • Logiciels d’infrastructure - Aperçu
      • Systèmes d’exploitation
      • Surveillance et reporting
      • Déploiement de logiciels et maintenance
      • Gestion des impressions
      • Optimisation
      • Virtualisation - Aperçu
      • Virtualisation de bureau
      • Infrastructure et administration
    • Solutions IT - Aperçu
      • Business Applications - Aperçu
      • Collaboration – et le travail d’équipe fonctionne
      • Enterprise Ressource Planning
      • DMS & ECM
      • Système de gestion de modèles Docunize
      • Artificial Intelligence
      • Cloud Solutions - Aperçu
      • Services Multi Cloud
      • Public cloud
      • Clouds-Shop
      • FinOps (Financial Operations)-Service
      • Data & Analytics - Aperçu
      • Plate-forme et intégration des données
      • Analytics & AI
      • Data visualisation
      • Stratégie & Gouvernance
      • Datacenter - Aperçu
      • Multi-cloud
      • Compétence datacenter modulaire
      • Infrastructure hyperconvergée
      • Software Defined Datacenter
      • Infrastructure SAP HANA
      • IoT/AI - Aperçu
      • Bechtle Control Suite
      • Servinvent
      • Modern Workplace - Aperçu
      • Poste de travail 360° du futur
      • Device as a Service
      • Des réunions modernes
      • Communication et collaboration
      • Solutions Azure Virtual Desktop
      • Mobile working ▷ Remote & flexible on the road
      • Managed Workplace Services
      • Gestion efficace des salles
      • Workplace Security
      • Networking - Aperçu
      • Datacentre Networking
      • Enterprise Networking
      • Bechtle service bundles for Cisco infrastructure
      • Sécurité - Aperçu
      • Application Security
      • Securité du cloud
      • Cyber Security
      • Sécurité des datacenters
      • Data protection and information security
      • Infrastructure & Perimeter Security
      • IAM Identity & Access Management
      • Formation security awareness
      • Ransomware
      • Cyber Defence Centre
      • Solutions d’affichage - Aperçu
      • L'accueil
      • Wayfinding
      • Communication avec les employés
    • Services IT - Aperçu
    • Support & Exploitation
      • Consulting Services - Aperçu
      • Conseils Cloud
      • Managed Services - Aperçu
      • Printing Services
      • Azure Operations
      • 360° Managed IT
      • Bechtle Prime Support
    • Onsite Services
    • Professional Services
      • Software Asset Management - Aperçu
      • SAM as a Service
      • SAM Baseline
      • SAM Solution Advisory
      • SAM Cloud Readiness
      • SAM Consulting
      • SAM Century Platform
      • SAM Inventory2go
      • Workplace Services - Aperçu
      • Evaluation, conception et procurement
      • Services de staging et de déploiement
      • Services IMAC/RD
      • Service Break&Fix
      • Accessoires IT sur mesure
      • Services financiers - Aperçu
      • Conseils ▷ Services financiers | Des services IT de Bechtle
      • Structuration ▷ Services financiers | Services IT Bechtle
      • Financement ▷ Services financiers | Des services IT de Bechtle
      • E-Procurement - Aperçu
      • My Bechtle
      • Connexion ERP
      • Facturation électronique
      • Devis
      • Contrats cadres
      • Conditions spéciales
      • Promotion Products - Aperçu
      • Nouveautés
      • Clés USB
      • Station de chargement sans fil
      • Powerbanks
      • Gamme ProPro
      • Lifestyle
      • La webkey
      • Produits promotionnels 3D
      • Verre trempé avec marquage digital
      • Quickservice
      • Processus
    • 360° Managed-IT - Aperçu
    • 360° Managed IT sur Microsoft Azure
    • 360° swiss cube
    • 360° colocation
    • 360° infrastructure
    • 360° firewall
    • 360° network
    • 360° backup control
    • 360° cloud backup
    • 360° monitoring
    • 360° CIRT
    • Carrière - Aperçu
      • Bechtle as an employer - Aperçu
      • Développement
      • Vos avantages
      • Domaines d'activité - Aperçu
      • IT
      • Ventes
      • Autres domaines
    • Formation professionnelle
    • Processus de recrutement
    • Ressources humaines
    • Jobs
    • À propos de Bechtle - Aperçu
      • Entreprise - Aperçu
      • Management
      • Direction de Bechtle en Suisse
      • Les sites
      • Les entreprises Bechtle
      • La success story de Bechtle
      • Vision 2030
      • Certifications
      • Bechtle en Suisse
      • Relations investisseurs - Aperçu
      • L’action Bechtle
      • Publications
      • Calendrier financier
      • Assemblée générale
      • Gouvernance d’entreprise
      • Investisseurs – Contact
      • Actionnaires privé(e)s
      • Ventes de logiciels selon IFRS 15
    • Durabilité
      • Événements - Aperçu
      • Bechtle IT Forum 2025 - Replay
      • Webinar Replay Bechtle
      • Bechtle X-Mas Market.
      • Webinar: Discover Cybersecurity with Arctic Wolf (Only German)
    • Références
      • Secteur Public - Aperçu
      • Écoles et IT
      • OCRE avec Bechtle
      • International business with Bechtle - Aperçu
      • Bechtle Global IT Alliance
    • Partenaires
      • Contact - Aperçu
      • Bechtle direct Rotkreuz
      • Bechtle direct Dübendorf
      • Bechtle direct AG Schweiz Morges
      • Bechtle Suisse SA
      • Support
      • Actualites - Aperçu
      • Salle d'actualité
      • Actualité du groupe
      • Newsletter
      • Bechtle Blog CH
      • Podcast. bits & bytes
À propos de Bechtle
Actualites
Bechtle Blog CH
IT-Security
Blog Post La sécurité dans le cloud grâce à des stratégies de sécurité automatisées
IT-Security - 11 sept. 2023

Secure in the cloud thanks to automated security strategies.

de Maximilian Munker

The path to the cloud often fails because of one question: Who takes care of security? Yet many cloud providers have already integrated the security measures. Fully automated, they monitor not only data, but also user identities, computer resources and compliance guidelines.

"We are not a target for cyber attacks", many companies still think these days. They are sure: with the existing on-premise infrastructure, attackers from outside have a hard time. However, according to the Microsoft Digital Defense Report 20221, increasing networking, digitalisation and not least the rapid developments in the field of artificial intelligence, which are also used by cyber criminals, are leading to increasingly complex approaches by attackers. In addition, the criminal cyber economy is becoming increasingly industrialised. As a result, attacks via the internet are an everyday threat to every company and can cause immense damage. Contrary to the widespread opinion that the cloud is much more susceptible to attacks here, in everyday corporate IT it is more likely to be gaps in the security measures and tools used and in the lifecycle management of IT resources that help ransomware attacks to succeed, for example.

Is on-premises more secure than the cloud?

The security of an on-premises environment can therefore be deceptive. Even though the total costs may be more manageable, the monthly costs over the entire life cycle can be calculated more transparently if the data is outsourced to the cloud. In addition, with on-prem environments, the companies themselves are responsible for keeping the software up to date and for security precautions. This is a real challenge in view of the current shortage of skilled workers. Outdated hardware and software, non-compliant security solutions or a rather neglected identity and rights management can quickly lead to security gaps. If the servers are located in-house, corporate IT must also take care of maintenance and updates itself.

Security through the on-boarding tools of cloud providers.

The situation is different with cloud solutions. Professional public cloud providers such as Amazon AWS, Google Cloud or Microsoft Azure offer integrated, comprehensive security and compliance controls that automatically and, above all, quickly close security gaps and actively combat threats. Tasks that conventional individual applications can hardly perform in total, or only with very high effort. The comprehensive security services of the cloud providers take action against all common attack scenarios and offer, among other things, reliable identity and access management that complies with current corporate guidelines. They explicitly control all authentications and authorisations using available data such as identity, location and its plausibility, device integrity, data classification, anomalies, service or workload. Authorisations restrict the security solutions integrated in the cloud via user access with JIT/JEA (Just-in-Time/Just-Enough-Access). They relate to risk-based, adaptive policies and information protection for the company's data and files. In all of this, the automatic rule is: Simply trust nothing and no one - also called "Zero Trust".

Everyone relies on Zero Trust.

Zero Trust is now part of all professional public clouds, revolutionising the approach to security. Until now, in an on-prem network, access to IT has tended to be restricted by the access itself, and various security applications supplement this with further controls. This makes companies unnecessarily inflexible. If the "human" factor is then added, cyber dangers quickly arise that can only be contained, but no longer combated in advance. Dynamic companies, on the other hand, need a conditional access framework whose policy engine covers both policy definition and policy enforcement. This is precisely the security framework that cloud providers offer - automatically and fully integrated.

A brief comparison.

Amazon Web Services, for example, deployed a set of AWS identity and network services with centralised zero-trust building blocks where compliance policies and access rights can be defined. Google calls its zero-trust model, which allows all employees to work securely from anywhere without a VPN connection, BeyondCorp. The unified platform for identity, access, application and endpoint management (IAM/EMM) is Cloud Identity. In the Microsoft Azure Cloud, on the other hand, company data is protected by a holistic approach and numerous integrated security solutions. The zero-trust concept behind this carefully checks every access to users, devices, systems or data and initially treats it as if it were coming from an insecure network. This is followed by a comprehensive, multi-stage check: in addition to explicitly checking all available data points, the security solution checks all policies and automatically always assumes that security breaches can occur at any time (assume-breach paradigm). Thus, the system detects threats immediately and stops them before any damage is done. The holistic, multi-layered security approach of Azure thus protects company systems in advance.

Range of security solutions ensures a secure cloud.

The example of Microsoft Azure also shows how high the security standards in the cloud have become in the meantime. For identity management, protection of devices, applications, emails and data, Microsoft 365 Defender for endpoints and Azure Defender for Azure workloads and resources as well as Azure Sentinel as a SIEM and SOAR system (Security Information and Event Management / Security Orchestration, Automation, and Response) offer uniform threat management. All of the solutions mentioned use an integrated user interface and a common data model and thus actively detect threats. In addition, Microsoft Cloud App Security protects the data stored in cloud applications and services. The app, which is also fully integrated into the security solution, helps to enforce security policies and secure the data in the applications used by employees. Whether office applications, IoT or identity management, the solutions detect and protect against threats and suspicious behaviour. Shadow IT and applications on the internet (Shadow SaaS) can also be managed securely with it.

Cloud security solutions are easy to manage.

For all of this, a company that has opted for a cloud solution such as Microsoft Azure only needs little internal security expertise, as the company's own policies can be implemented by an external IT security specialist. The rest is done by the automatisms of the cloud solution. Nevertheless, the automation and the defined playbooks do not relieve the company of the responsibility to soundly assess and process the qualified security advisories and alerts. The "background noise" of security alerts is significantly reduced and fewer highly qualified security resources are needed to process the events in the company. The entire cloud environment is thus ideally protected and provides stable workloads. The holistic approach of cloud providers helps keep all resources safe from attack and keep pace with the increasing professionalisation of cybercrime. Cloud providers such as Microsoft invest heavily in their resources and the security of their services to this end. If the security functions are set correctly and employees are sensitised to the topic, companies can always trust that devices, data and applications in the cloud are safe. And those who feel secure work more productively and efficiently.

[1] https://www.microsoft.com/de-de/security/business/microsoft-digital-defense-report-2022

 

 

 

 

Rédigé par

max-munker_portrait.png
Maximilian Munker
Consultant Information Security

E-Mail: maximilian.munker@bechtle.com

    Microsoft Cloud Partner Logo
    Nous avons publié cet article le 11 sept. 2023.
    Le groupe
    Sites Bechtle
    Carrière
    Presse
    Relations investisseurs
    Événements
    Conditions de livraison et de paiement
    Centre d'aide
    Contact
    Support
    Newsletter

    LinkedIn Bechtle LinkedIn Bechtle Schweiz AG

    LinkedIn Bechtle LinkedIn Bechtle direct AG

    YouTube Bechtle YouTube

    Instagram Bechtle Instagram

    Facebook Bechtle Facebook

    Notre offre est exclusivement destinée aux clients professionnels et publics.

    Les prix se comprennent en CHF hors TVA en vigueur.

    Mentions légales Déclaration de protection des données CGV
    Support-ID: 4c4079bd49
    © 2025 Bechtle AG