Cloud Security , Governance & Risk Management , Operational Technology (OT)
Using End-to-End Security in the Cloud
What Does End-to-End Security Mean and How Does It Fit in the Zero Trust Framework?How do you manage cloud security in a conglomerate, and how does end-to-end security planning help? Two experts - Abbas Kudrati, director, APAC, chief cybersecurity adviser, Microsoft, and Mohit Gupta, group chief information security officer, Motherson Group - share their recommendations.
"We are now taking an approach where we do not only want to secure the services and the product which is developed by Microsoft. We want to support our customer irrespective of what digital fabric they are using - multiple cloud, etc. That is why we call it end-to-end security," Kudrati says.
"Underutilization of cloud resources can lead to overspending very quickly. It is equally important to analyze cloud resources utilization and its performance to understand that all is running efficiently. And if it is not, we should be able to upgrade or downgrade the infrastructure," Gupta says.
In a video interview with Information Security Media Group, the two also discuss:
- What end-to-end security means;
- How zero trust architecture fits in;
- The challenges of implementing a zero trust framework for both IT and OT environments.
Kudrati serves as an executive adviser to Deakin University, La Trobe University, the HITRUST Asia Advisory Council, EC Council-Asia and several security and technology startups. He supports the broader security community through his work with ISACA chapters and student mentorship.
Gupta has over two decades of global work experience, with strategic, tactical and leadership skills in the areas of governance, security, privacy and compliance.
Microsoft Privacy Statement