Toolkit Network Security in The Cloud
Toolkit Network Security in The Cloud
Toolkit Network Security in The Cloud
in the Cloud
Introduction
Your choice of a next-generation firewall (NGFW) is an important one. There is
more to making this choice than just looking at features and prices. You need
to look at your organization’s broader security infrastructure and consider the
functionality you will need today, tomorrow, and even years from now. Just as
important, you need to ensure that your security vendor is a partner who can
support your organization today and far into the future.
This document will help you understand what is driving cloud security, the
challenges the cloud brings, and it provides some guidelines on selecting a
network security solution for the cloud.
Table of Contents
Related Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
FortiManager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
FortiAnalyzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
FortiSandbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2
POINT OF VIEW
Executive Summary
Organizations large and small have adopted digital transformation initiatives to
“The ability to view the entire
enable them to deliver business growth and meet organizational objectives. The
infrastructure on a single pane
pace of this transformation has accelerated as organizations have sought to
of glass is a huge benefit to
address challenges caused by the global pandemic. IT teams were forced to move
our architecture, network, and
many applications to the cloud faster than originally planned. These rapid changes
security teams.”
increased cybersecurity risks and imposed a heavy burden on infrastructure teams,
often due to the plethora of new, platform-specific security tools.
Jessie Hawkins
With moving to public clouds and modernizing data centers at the heart of this Systems Architect
transformation, care and attention must be given to ensuring that your networks University of South Carolina
and data are secure and that security can be easily managed across clouds and
data centers.
Digital Acceleration: The Journey to Cloud Starts with a Hybrid Mesh Firewall
Organizations pursuing digital acceleration have various strategies and are at different stages with their cloud adoption and
application journey. In many cases, organizations are lifting and shifting virtualized application workloads from their virtual data
centers into the cloud, while some are refactoring applications to integrate with cloud provider services, and a few are actually
architecting applications to be cloud native. Regardless of where they are in their journey, all of them have major concerns about
their applications and data security.
For most organizations, securing this application journey to the cloud begins with securing the network that connects their
users, branches, and data centers to the cloud. As a next step, they focus on securing the cloud network that connects to cloud
provider services and workloads in the public cloud and hybrid cloud. Organizations at an advanced level of cloud maturity then
move on to securing the networks that connect their application infrastructure in a multi-cloud deployment. Getting the cloud
network ready for deploying applications causes plenty of challenges, including setting up a robust cloud perimeter for every
network setup by various types of users, implementing advanced security for compliance, and streamlining their network and
security operations without being run over by runaway cloud costs.
3
Why Digital Acceleration Needs a Hybrid Mesh Firewall Approach POINT OF VIEW
A hybrid mesh firewall (HMF) is a network of next-generation firewalls (NGFWs) able to run locally and in the cloud that can
be centrally managed and can automate security updates and responses across the entire network. By utilizing an HMF,
organizations can reduce management overhead, consolidate security analytics, and reduce the strain on staff that comes from
having to manage disparate firewalls on each cloud and in each data center.
Once the organization gets accustomed to cloud usage, it evolves to refactor and rearchitect a select set of applications or even
create cloud-born applications. In this cloud expansion phase, it may expand its footprint to tens or hundreds of cloud networks.
At this stage, organizations are primarily deploying robust, high-scale routing to interconnect the organization’s virtual networks
on any cloud provider. But it will also need to ensure that it can effectively manage security on-premises and in the cloud. This
requires eliminating siloed security solutions for ones that work together in a security mesh. In most cases, this means weaving
the network firewalls, both cloud-based and physical, into an HMF infrastructure.
4
Why Digital Acceleration Needs a Hybrid Mesh Firewall Approach POINT OF VIEW
Conclusion
The answer to safely moving to the cloud for digital acceleration is reducing complexity and increasing security effectiveness
with an HMF approach. An HMF benefits organizations with centralized visibility, management, and automation across all
solution points, allowing them to leverage intelligence sharing for faster response times. Ultimately, this reduces complexities,
solves cloud cybersecurity skills and resource gaps, and increases overall security effectiveness. As such, organizations should
look for solutions that integrate and support a broad, integrated, and automated cybersecurity fabric.
5
SOLUTION BRIEF
43%
37% 32% 32%
Figure 1: Reported biggest operational, day-to-day headaches trying to protect cloud workloads
6
The Top Challenges of Cloud Network Security SOLUTION BRIEF
Cloud providers and the organizations that rely on them must comply with various laws and regulations that govern data
protection, privacy, and security in different regions and industries. These include the General Data Protection Regulation
(GDPR), the Health Insurance Portability and Accountability Act (HIPAA), the Payment Card Industry Data Security
Standard (PCI DSS), and others. Compliance requires in-depth visibility into an organization’s systems and data across
clouds and data centers.
3. Lack of visibility
Modern IT environments are highly distributed, with applications deployed across private data centers, multiple public
clouds, and edge locations. This means that most enterprises have potentially hundreds of applications spreading across
a combination of SaaS-based, IaaS-based, private DC-based, or edge locations. Adding even more complexity is that
shadow IT groups can spin up applications without full knowledge of the IT team.
As organizations build out their hybrid IT infrastructure, they must have end-to-end visibility of the IT environment and
eliminate any blind spots, as it is impossible to manage something that you cannot “see.” Visibility must be broad to
identify and scan resources, activities, and potential vulnerabilities across the entire compute surface. Visibility must also
be deep to pierce the veil of encryption to identify malicious or inappropriate traffic. And it must be application aware to
quickly identify known and unknown applications and apply appropriate security and routing policies, including zero trust
policies.
With multiple cloud providers in use, it can be difficult to keep track of everything and ensure that each component
is configured correctly. Every cloud service provider has a different approach to security, models, responsibilities and
compliance obligations, best-practice recommendations, and names for the same services. Worse, these security
products may have different features and different detection rates. Given the above, it comes as little surprise that many
organizations struggle to offer consistent security policies when relying on varied security tools.
69%
use two or more cloud providers
32%
26%
18% 19%
5%
None One Two Three More than
Three
Figure 2: Most organizations struggle to apply consistent security policies across clouds.
7
The Top Challenges of Cloud Network Security SOLUTION BRIEF
By definition, cloud services are accessed over the internet, making them more exposed to potential attackers. In this
way, cloud computing is similar to DMZs in traditional networks, making them more vulnerable to attacks. Further, cloud-
specific technologies and interfaces introduce new attack vectors that might not exist in traditional IT environments.
These include attacks targeting cloud APIs, orchestration platforms, containerization systems, and serverless
architectures.
6. Complexity
Complexity is the enemy of security. In fact, Gartner famously stated that by 2025, human failure, largely due to
complexity, will be responsible for over half of significant cybersecurity incidents.4 Complexity is not new; it’s been
creeping up on us for years. Multi-cloud and other complicated, heterogenous platform deployments have recently
accelerated overly complex deployments. At the same time, security budgets, approaches, and tools have remained
static. As complexity rises, the risk of breach accelerates at approximately the same rate.
7. Human error
Human error, the inevitable result of the six factors above, is ultimately at the root of most data breaches. Cloud
computing, especially when multiple clouds are in play, increases the likelihood of mistakes and misconfigurations that
can lead the best defenses to fail. For example, 59% of cybersecurity professionals surveyed said that misconfiguration
remains the biggest cloud security risk.5 These mistakes are all the more likely when organizations rely on cloud-specific
security tools. One of the priorities of any digital transformation effort should be to reduce human errors by reducing
complexity, reducing the number of tools staff need to learn and manage, reducing the attack surface, and increasing
visibility into cloud systems, traffic, and users.
8
CHECKLIST
Executive Summary
The shift to a hybrid workforce and the rapid adoption of cloud services have allowed today’s users to connect to any
resource from any location using any device. While this flexibility is necessary, it also expands the attack surface,
opening the door to new threats. Organizations need to be sure their network security enables complete visibility
across the entire distributed infrastructure. Otherwise, it will be impossible to effectively deliver and coordinate security
protection with fast enough threat detection and remediation.
However, broader economic and social trends are leading many organizations to rethink their approaches to network
security as part of new digital transformation projects. The Internet of Things (IoT), the rise of hybrid-cloud computing, the
vast increase in remote work demands, the distribution of data center and application resources, the convergence of IT
and operational technology (OT), and the continued shortage of skilled security professionals are just a few of the realities
driving organizations to reassess their security strategies.
One outcome of these changes is the realization that network security tools, especially firewalls, can’t work in isolation.
Instead, they must work together, forming a hybrid mesh firewall (HMF). This unified security platform provides
coordinated protection to multiple areas of enterprise IT, including corporate sites, such as branches, campuses, data
centers, public and private clouds, and remote workers.
One of the most essential components of an HMF is its ability to traverse today’s multi-cloud and hybrid data center
environments. HMFs can coordinate protection across every IT domain (corporate sites, public and private clouds,
and remote workers) using a unified management console. This allows enterprise IT to automate its protection
capabilities, such as collecting and correlating data, performing AI-assisted deep analysis, and coordinating a
unified response across the network without duplicating efforts, re-creating policies, or investing needless manual
hours when a cybersecurity skills gap already constrains resources.
Effectiveness
A security system is only as good as its ability to detect threats. However, the effectiveness of NGFW solutions is
difficult to determine on your own. In this scenario, third-party testing is invaluable. One excellent source for efficacy
data is CyberRatings.org, a nonprofit member organization dedicated to providing visibility and transparency on the
effectiveness of cybersecurity products and services. While not all firewall vendors have agreed to be tested, those
that did, like Fortinet, often offer the report on their website. See the latest report here.6
9
How to Select a Virtual NGFW CHECKLIST
Many NGFW providers are ambiguous about how they represent their threat protection performance claims.
Documented performance claims should be examined carefully to ensure they reflect testing under load, with
threat protection fully engaged.
Single-pane-of-glass management is more effective from a security standpoint and is operationally more
efficient, reducing administrative time and training costs.
Automation
Network automation is essential to keep up with the speed and sophistication of today’s threats. But it is impossible
to implement when your various point security tools, including your NGFW deployments, operate in a silo. Automation
must combine software and processes to provision, configure, manage, and optimize all physical and virtual devices
within your network. With everyday functions automated and repetitive processes streamlined and controlled, network
service availability and overall user experience improve.
Network automation can reduce human error, improve efficiency, and ultimately lower costs. Employees can be
dynamically authenticated and connected to the network to improve an organization’s overall productivity levels. And
with zero-touch provisioning, new devices can be configured and made ready for use by employees right out of the
box, enabling them to start work faster without downtime. But network automation isn’t enough. Your security fabric
must also automate security functions. Security automation enables coordinating activities among different firewall
mesh components to accelerate detection and decrease response times to security events. Events occurring anywhere
across the firewall mesh should be monitored, and action responses should be able to defend any destination.
10
How to Select a Virtual NGFW CHECKLIST
Security fabric
A hybrid mesh firewall, however robust, is only part of your broader security infrastructure. Today’s security also
requires a comprehensive and integrated cybersecurity architecture that provides advanced protection and
visibility across the entire network infrastructure. This approach must combine a full range of security solutions,
including firewalls, endpoint protection, secure access, and cloud security, into a unified framework and tools
that enable and support a modern security operations center (SOC). A well-designed security fabric enables
organizations to detect and respond to threats in real time, automate security policies, centralize configurations,
and share threat intelligence across different security components, creating a cohesive and effective defense
against cyberattacks.
11
FortiGate Virtual
Next-Generation
Firewall
The FortiGate VM delivers NGFW capabilities for organizations of all sizes, with the flexibility to be deployed as an NGFW or VPN
gateway. It protects against cyberthreats with high performance, security efficacy, and deep visibility.
FortiGate VM delivers protection from a broad array of network security threats. It offers the same security and networking services
included in the FortiOS operating system and is available for public, private, and Telco Cloud (VNFs). A consistent operational
model across hybrid cloud, multi-cloud, and service provider environments reduces the training burden on security teams.
FortiGate is available for all major hypervisors and supports all major clouds. See the FortiGate Virtual Appliance data sheet for details.
Public Cloud
12
CASE STUDY
Matthew Marlowe had been an IT consultant for the firm since 2012, and was
brought on as the company’s full-time IT director in 2018. His charter was to
bring the growing company’s IT infrastructure to current standards, boost its “Moving to the virtual private
performance, and implement process improvements. cloud infrastructure will cost
half as much as staying in
Modernizing a Legacy Cloud Architecture the public cloud—and the
infrastructure is more robust
At the time, Tower Water’s IT infrastructure was largely public cloud-based. “Of and secure.”
course, such a setup brings the benefit of full disaster recovery capabilities and
the ability to log in from anywhere,” Marlowe observes. “However, our employees
Matthew Marlowe
were seeing more and more issues with latency and performance, and this was Director of IT, Tower Water
starting to impact customer service. Fixing that was going to require us to buy more
RAM, which would have doubled our subscription costs. We were also having more
problems getting adequate support from our cloud provider and from third parties.”
Details
From a security perspective, Tower Water had minimal protection. “We did have an
Customer: Tower Water
open source-based physical firewall, but other than that we relied on the built-in
tools from our cloud provider,” Marlowe recalls. “They did not offer web filtering or Industry: Water Treatment
sandbox analysis, and only offered antivirus filtering at the network level.” Consulting
13
Water Treatment Company Improves Customer Service and Performance With Private Cloud CASE STUDY
Now the owners of the high-rise buildings are requesting their own access to the
digis on their properties. Tower Water realized that providing such access would Business Impact (contd.)
require a new, more strategic approach to both networking and security.
n Unscheduled downtime
reduced from 4% to none
Securing a New Virtual Environment
n Customers can access their
After researching available options, Tower Water decided to bring most of the own SCADA devices—securely
company’s services in-house with a new, virtualized infrastructure. Marlowe and easily
selected Nutanix AHV as the company’s hypervisor. “Once that decision was made,
I turned to finding a new threat management solution to protect this infrastructure,”
n Peace of mind from being
he explains. able to afford 24×7 support
because of choosing a virtual
An early question was whether to purchase a physical next-generation firewall NGFW
(NGFW) or go with a virtual one. “Going virtual made the most sense since almost
the rest of our infrastructure would be virtual,” Marlowe states. “This simplifies Solutions
maintenance and allows for full backups of the router rather than just configuration
backups.”
n FortiGate Secure SD-WAN
n FortiGate VM
As Marlowe researched virtual firewall providers, he learned that Nutanix is a
Fortinet Fabric-Ready Partner. This means that Fortinet and Nutanix leveraged the n FortiSandbox Cloud
collaborative power of the Fortinet Security Fabric to develop and validate joint n FortiGuard Security Services
solutions. For Marlowe, that meant the FortiGate VM virtual NGFW was prevalidated
n FortiCare 24×7 Service
and ready for deployment on Nutanix AHV. The Fabric-Ready solution resulted
in greater controls, deeper visibility, enhanced security, and seamless policy
enforcements in the virtual network. What is more, Marlowe had worked extensively
“FortiGate met our needs for
with Fortinet technology at two other companies in the past, developing significant
everything. We now have a
expertise with—and respect for—the technology. As a result, the decision to select
stable core firewall router,
FortiGate VM was an easy one.
web filtering, virus protection,
Tower Water elected to add the unified threat management subscription bundle VPN, and secure SD-WAN.”
to the FortiGate purchase. This gives the company access to a number of
Fortinet services, including advanced malware protection, sandbox analysis with Matthew Marlowe
FortiSandbox Cloud, application control, and intrusion protection. “FortiGate VM Director of IT, Tower Water
met our needs for everything,” Marlowe asserts. “We now have a stable core firewall
router, web filtering, virus protection, and secure VPN. And the fact that sandbox
analysis is included in the subscription means that we can protect our network
traffic from zero-day threats without adding another line item of cost.”
The company has also realized cost savings from the software-defined wide-area network (SD-WAN) capabilities in the
FortiGate VM. “The building we are in uses Bigleaf Networks for network routing,” Marlowe explains. “We are on a minimal,
50-megabyte-per-second plan with them. This means that we have potential latency problems when traffic is high. Rather than
buying more capacity from Bigleaf, we are using FortiGate Secure SD-WAN to route some traffic directly to the Verizon cellular
network when needed, bypassing Bigleaf altogether. This helps us avoid an 80% increase in our monthly subscription fees to
scale their service.”
14
Water Treatment Company Improves Customer Service and Performance With Private Cloud CASE STUDY
Operationally, the seamless Integration between FortiGate VM, FortiSandbox Cloud, and Nutanix is a huge timesaver. “This
was probably the biggest factor that led us to choose Fortinet,” Marlowe says. “The ability to spin up FortiGate VM instances
instantaneously in Nutanix—and make ongoing modifications on the fly—will save countless hours of my time over the years.”
Around-the-clock availability of support brings significant peace of mind despite the fact that Marlowe has not needed to
use it much. “I actually did not need to call them at all during deployment,” he recalls. “I did call them about one issue after
deployment, and they diagnosed and fixed it within an hour. My experience at other companies is that FortiCare support is bar
none.” Marlowe is also a big fan of the Fortinet Cookbook, which is full of tips and best practices. “I used several of its recipes to
deploy FortiGate VM for our specific environment.”
For Marlowe, Tower Water’s relationship with Nutanix and Fortinet is strong. “Everything just works—the products, the
integration, the support,” he concludes. “I expect this Fabric-Ready partnership to meet our needs for a long time to come.”
15
Related Products
NGFWs are powerful tools with a seemingly endless array of features, but they don’t stand alone. Your firewall should be part
of a firewall mesh that extends across platforms and part of a broader security fabric, one that encompasses support tools
(central management, sandboxing, analytics) and additional security solutions (WAF, EDR, XDR, NDR, MDR, endpoint security,
SOAR, identity management). Some important related products include:
FortiManager
FortiManager delivers unified management for consistent security across complex hybrid environments for
protection against security threats. Key benefits include accelerated zero-touch provisioning with best-practice
templates for deployment at scale of SD-WAN and streamlined workflows between the Fortinet Security Fabric and
integrations with 300+ ecosystem partners.
FortiManager provides granular device and role-based administration and zero-trust multi-tenancy deployments
for large enterprises and a hierarchical objects database for re-use of common configurations to serve multiple
customers for clear visibility of every device and user on the network.
Highlights:
n Single-pane management and provisioning
n Fabric automation
n Monitoring and visibility
n Security policy and objects management
FortiAnalyzer
FortiAnalyzer is a powerful log management, analytics, and reporting platform that provides organizations with a
single console to manage, automate, orchestrate, and respond, enabling simplified security operations, proactive
identification and remediation of risks, and complete visibility of the entire attack landscape.
Integrated with the Fortinet Security Fabric, FortiAnalyzer enables network and security operations teams with
real-time detection capabilities, centralized security analytics, and end-to-end security posture awareness to
help analysts identify advanced persistent threats (APTs) and mitigate risks before a breach can occur.
Highlights:
n Centralized network monitoring and visibility
n Advanced threat and vulnerability detection with event and log data correlation
n Augmented NOC/SOC operations for real-time response, analytics, and reporting
n Automation to save time, reduce errors, and improve efficiency
n Multi-tenancy solution with quota management
n Administrative domains for operational effectiveness and compliance
n 70+ reports and 2,000+ ready-to-use datasets, charts, and macros
16
Related Products
FortiSandbox
FortiSandbox detects and analyzes zero-day malware and other advanced file-based threats. The combination
of service and product provides a comprehensive, coordinated, integrated, and scalable approach to advanced
detection and protection from file-based zero-day threats. Inline sandboxing offers the industry’s first inline
blocking on an NGFW. Flexible deployment options include Platform-as-a-Service, SaaS, virtual machine, and
hardware appliances to suit any use case and type of organization.
17
Additional Resources
Data Sheets
n FortiGate Virtual Appliances Data Sheet
n FortiGate VM ESXi Data Sheet
n FortiOS Data Sheet
3 Ibid.
4 “Gartner Predicts Nearly Half of Cybersecurity Leaders Will Change Jobs by 2025,” Gartner, Feb. 20, 2023.
6 Ibid.
www.fortinet.com
Copyright © 2023 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product
or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other
conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser
that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any
such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise
revise this publication without notice, and the most current version of the publication shall be applicable.
2343766-0-0-EN