Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

Digital Vision: Cybersecurity 3

Cloud security

How AI can simplify cloud security management

At a Glance

Organizations are increasingly migrating their infrastructure to the cloud. This risks new security vulnerabilities- but how can AI help? Harshvardhan Parmer explores in this article how migration to cloud services can create security gaps and how AI can assist organizations detect and respond to attacks quickly.

4 Minute Read

Harshvardhan Parmar

Global Head of Data Science, Managed Detection and Response, Atos

Organizations are increasingly migrating their infrastructure to the cloud, with COVID-19accelerating cloud adoption across various industries. Gartner predicts that by 2025, enterprises will spend more on cloud computing than on traditional IT.

Migrating to a cloud ecosystem has many benefits for organizations. However, this migration also increases security risks that cannot be addressed by traditional security mechanisms.

Let’s take a look at why security risks are increasing and how AI can help us overcome them.

Hasty migration leads to unintentional security gaps during deployment

Cloud adoption has accelerated across almost every industry since the pandemic. One of the key requirements that arose was the need to quickly support remote working options.

Moving to cloud seemed like the natural choice for a requirement like this. However, the rush to get things operational resulted in weak configurations and insufficient security controls.

Cloud adoption has accelerated across almost every industry since the pandemic. One of the key requirements that arose was the need to quickly support remote working options.

Moving to cloud seemed like the natural choice for a requirement like this. However, the rush to get things operational resulted in weak configurations and insufficient security controls.

Traditional IT infrastructure has tested and proven security configurations. Cloud controls on the other hand are evolving as the technology evolves, and there is limited guidance on robust security controls.

AI can be leveraged to perform dynamic checks across the various moving parts to identify misconfigurations. It can also be used for vulnerability management and access management.

Cloud technologies increase the attack surface for threat actors

Although moving to the cloud gives organizations more flexibility as compared to traditional data centers, very few organizations use it for their entire infrastructure. Many organizations use a hybrid approach, distributing their workloads between cloud and on-premises or a multi-cloud approach that distributes workloads between multiple cloud service providers.

The vast majority of organizations use at least two cloud service providers. This means that multiple technologies work together to create a unified ecosystem. However, this very aspect also increases the attack surface available to threat actors. Additionally, extensive use of application programming interfaces (APIs) — a critical component of cloud services — contributes to the increased attack surface.

This larger attack surface directly increases the workload for cybersecurity professionals, despite the global shortage of skilled cybersecurity professionals. AI is capable of processing large volumes of data in a short period of time and can therefore be leveraged to augment the analysis performed by cybersecurity professionals. The result is not only comprehensive coverage for an increased attack surface, but also an overall increase in the efficiency of security processes.

Cloud technologies are evolving rapidly, resulting in unknown security threats

Cloud computing has introduced new technologies, such as serverless, containers and microservices, which are not seen in traditional IT technologies. These technologies provide an advantage in terms of scalability, flexibility and cost. Like any new technology, however, they can also inadvertently introduce new vulnerabilities and/or weaknesses. Due to a lack of knowledge about these technologies and their vulnerabilities, it is difficult to protect against these threats through traditional security mechanisms.

AI is already being used to varying degrees for anomaly detection. However, it can truly display its potential in a cloud scenario. While supervised learning can be used to detect known threats, unsupervised learning can enable the detection of unknown threats, including potential zero-day attacks. It can also be used to learn the normal behavior of users and systems in order to create a baseline, which can be used to detect any deviations.

AI not only helps you detect threats faster and more efficiently, but can also help you respond to threats more quickly. AI can be used to determine potential remedial actions and present them to a human analyst. The actions performed by the human analyst can then be used as a training dataset to enable a machine to mimic human decision making and perform remedial actions when threats are identified.

Digital Vision: Cybersecurity 3 – Further Insights

From across Atos and beyond, find out more about cybersecurity challenges and how organizations can respond to cyber threats

Share this Page

Kulveer Ranger, SVP, Head of Strategy, Marketing, Communications & Public Affairs, Northern Europe & APAC, Atos