How can enterprises secure their applications in the public cloud?
Gaetan: We provide our customers with flexible solutions to secure their Microsoft Azure environment, ranging from simple alerts when we detect issues to fully managed security. The foundations for this are our healthguard services: we closely monitor our customers’ infrastructure and tell them when we identify potential weaknesses. Naturally, when we notify customers of a security issue, they can request that we address it.
Alternatively, we provide a fully managed service designed to maximize the security of the customer’s environment proactively. This approach is grounded in our best practices and extensive experience across our installed base.
We have a dedicated Cloud Center of Excellence staffed with Azure specialists who understand Azure’s workings and advise customers on building a secure environment. This center meets the high standards of Azure Expert MSP audits, which is an important stamp of approval by Microsoft, validating our expertise and proficiency.
Can you elaborate on these best practices?
Fabrice: Bringing workloads into the cloud involves applying the same security best practices as with any other infrastructure. You need to ensure proper configuration, implement access control, limit privileged access, and address security vulnerabilities, all essential cybersecurity fundamentals. In a public cloud environment, security is just as critical as in any other cloud model. Robust security measures are not automatically provided by the vendor and must be enforced to ensure resilience and protect sensitive data.
Gaetan: Our Cloud Center of Excellence can establish this foundation using secure Azure landing zones, which offers baseline security features. Secure landing zones are crucial in a cloud architecture, providing a pre-configured, secure environment for hosting workloads and meeting specific compliance requirements.
By defining network boundaries, enforcing strict identity and access management policies, encrypting the necessary components, and setting up logging and monitoring, these zones establish a robust foundation for deploying applications and services. This ensures a secure cloud infrastructure, crucial for preventing and mitigating cyber threats. Because best practices are generic and not tailored to specific customers, every customer benefits from them. When deviations from this baseline occur, we assist customers in mitigating risks and identifying the necessary measures.
Are these best practices primarily aimed at preventing cyberattacks?
Fabrice: Indeed, but despite these preventive measures, cyberattacks remain inevitable. This underscores the need for a modern Security Operations Center (SOC) capable of proactively detecting attacks and responding to them. Cegeka’s modern SOC provides comprehensive support for the full Microsoft stack and integrates deeply with Azure, Azure Sentinel, Defender for Cloud, and other technologies to manage incidents, threats, and attacks.
It’s crucial to have visibility across the entire security landscape, from Azure environments in the cloud to private data centers and even workstations. For instance, an incident arising from a phishing email on an employee’s workstation can potentially compromise the company’s cloud environment. That’s why our SOC equips customers with an end-to-end view of their security posture. These security dashboards are displayed in Horizon, our digital engagement platform.
So you offer managed Azure services with preventive security measures, and a modern SOC with proactive security measures. What’s the added value of combining both?
Fabrice: While available as standalone services, combining them offers visibility from two angles, which is critical for risk assessment. Our Healthguard services reveal whether the cloud environment is securely configured, whereas the modern SOC shows how the environment is attacked. Ideally, if the first part is done correctly, the SOC’s workload to defend the environment is minimized, but the constant evolution of threats requires ongoing vigilance.
By integrating preventive security measures with proactive monitoring, the benefits of secure landing zones are significantly enhanced. This comprehensive approach not only strengthens the cloud environment but also unburdens the customer by providing an integrated solution. When these services are obtained from different providers, customers must act as liaisons between two entities, often leading to inefficiencies and potential security vulnerabilities. However, a unified platform offers a robust solution with built-in security measures, ensuring seamless protection as it should be. This convergence of IT and security signifies a holistic, streamlined approach to cloud security, delivering peace of mind and operational excellence.
What is the end goal of combining preventive and proactive measures?
Fabrice: The ultimate aim is to attain resilience against cyberattacks. This resilience can be achieved by implementing security measures such as access control, vulnerability management, managed Azure services, a SOC, everything we just talked about. Together, these elements create a resilient environment. For cloud environments, we offer this as a service known as the Resilient Cloud, ensuring customers can withstand attacks, restore services, and maintain business continuity. This concept of cyber resilience is a superset of cybersecurity. In other words, the Resilient Cloud uses cybersecurity services to create a robust platform resistant to cyber attacks .
Gaetan: On top of that, some organizations need to be compliant with regulations such as DORA, NIS2, or C5. So, for those organizations, we build upon the Resilient Cloud with the Compliant Cloud. This service gives our customers peace of mind by providing visibility into over 140 controls through the Multi Compliance Framework. We offer the required assurances within the regulatory landscape. We carefully assist in categorizing data based on sector-specific and country-specific regulations, ensuring it’s stored and processed in the “right” cloud & providing the necessary transparency to maintain compliance throughout the entire operation.
Is this all solely applicable to public cloud environments?
Gaetan: Not at all. As a hybrid cloud provider with a multi-cloud strategy, we enable seamless integration across multiple cloud environments, allowing our clients to leverage both private and public clouds and even edge environments as part of a unified, secure ecosystem.
In each landing zone, we implement industry-leading security best practices—such as CIS benchmarks, custom baselines, and secure score enhancements—ensuring consistent protection and governance tailored to the specific characteristics of each cloud model. With this uniform approach, our security framework is cohesive across all cloud environments, making certain that each landing zone achieves the level of security optimized for its unique demands.
Fabrice: Moreover, our security approach isn’t confined to the cloud. With our SOC, we also cover traditional IT environments, including on-premise infrastructure and endpoints. This even extends to Operational Technology (OT), such as factory machines. With our Resilient Cloud, we provide comprehensive coverage from Azure to edge computing, and from IT to OT. As a trusted partner, we deliver end-to-end cloud services, including security.