Zero Trust and Cloud Firewalls: Securing Multi-Cloud Environments

The Evolution of Cloud Security and Zero Trust Firewalls

There’s something about sitting at my desk with cup of coffee number three that gets the cogs of my brain spinning—especially when I consider how far we’ve come since I was a network admin in 1993. You kids and yer PSTN muxes and yer crazy juggling acts between voice an’ data! Those were simpler times. Then the Slammer worm hit, and it seemed like the entire world learned how susceptible the most locked-down networks were. Fast forward 30 years and now I’m helping customers, including three banks very recently, modernize their zero-trust architectures across multi-cloud environments. And I can tell you, firewalls are not what they used to be.

The Rise of Multi-Cloud

Multi-cloud—it’s sort of like that cluttered garage in your home. More clouds = more room, but also more hiding places for missing or stolen things. No company wants to make a single big bet on a cloud, and tie itself to it forever the way they did to their data centers. Every company wants to use AWS here, Azure there, Google Cloud over here, maybe private clouds too. But—plot twist—the more clouds, the more complex it gets. And complexity means risk.

The traditional perimeter security concept? Dead. It was built on a castle and moat mentality that just doesn’t work once your assets are spread across so many environments.

That is precisely where Zero Trust plays in. Never trust devices or users just because they are inside the perimeter. Don’t trust no one vouch everything. This is required in multi-cloud environments. And safeguarding those assets requires a firewall strategy that’s intelligent, adaptive, and identity-focused.

Firewall Policies for Cloud

Let’s get into the weeds for a moment—no longer are firewalls in the cloud simply about blocking ports. Today’s firewalls are context-aware, they look at layer 7 traffic and they tightly integrate with cloud service provider APIs. I’ve seen too many businesses treat cloud firewalls the way they did hardware firewalls—set it, forget it, cross fingers. That’s a recipe for disaster.

In other words, a sound firewall policy in multi-cloud looks like:

And here’s a little pet peeve: I don’t understand why so many organizations continue to count on default firewall policies. It’s lazy and dangerous. You wouldn’t leave your front door wide open because you THINK no one suspicious will come in, correct?

Identity-Based Security

The new perimeter is identity. Period. The faces of firewalls themselves are changing, moving to identity-based policies—access and firewall rules based not on where someone is located on the network, but who they are, what kind of device they’re using, and more.

I was nodding along as I had to help each of those banks recently, for each one wanted to enforce access based on roles and real-time indicators such as the health of device and geolocation. The firewalls needed to get along with identity providers and SSO systems. Not just permit or deny IP addresses blindly.

In multi-cloud, you can use an identity-based firewall for securing. Here is a handy checklist:

Some people believe identity-based policies diminish the network’s performance or annoy users. In fact, from what I’ve seen, it’s not scary at all when done well—and can make life easier and much, much safer. But it requires thoughtful planning and integration—there’s no cookie-cutter approach.

API and Workload Protection

Here’s a spot that doesn’t receive nearly enough attention. Cloud workloads speak to each other over APIs all the time. And you’ve either hardened those APIs and workloads, or you’ve left a big hole.

So what are we really saving here?

There are numerous firewalls that protect both by:

In the past, I deployed hardware firewalls which couldn’t have even understood we were sending, let alone understand application logic. Now we have cloud firewalls with workload awareness, which at least gives us a fighting chance.

One last thing—do not overlook workload security agents on your cloud servers or containers. And firewall rules are only going to do so much for you if a piece-of-oh-hi compromised app decides to call out to the shadiest of the shady IPs and you have no visibility into that.

Threat Intelligence

With so much complexity, you can no longer depend on static blocklists or general alerts. The terrain is changing every day, with new threats, zero-days and targeted attacks that are purpose-built for cloud infrastructure.

Smart cloud firewalls thrive on threat intelligence—dynamic information about attacker IPs, new malware signatures, and attack patterns.

At PJ Networks, we mix threat intel from assorted sources to dynamically feed our firewall policies. That means:

And here’s the thing—not every AI-fueled solution is a good one. I’ve seen more flash than substance in some instances. But threat intelligence, when curated and paired with the wisdom of a human? GOLD.

Quick Takeaway for Cloud Security

For those skimming (I understand—time is money):

Finally, I’m still high from the DefCon hardware hacking village. It’s a good reminder how attackers continue to innovate—outsmarting us is a losing strategy, if we aren’t also evolving our multi-cloud firewalls and Zero Trust strategies, we’re a sitting duck.

Keep in mind, securing the cloud involves more than just installing tools. It’s a mindset, it’s design, and it’s the steady hand of vigilance. And that I dictated from my desk, on a third cup of too-strong coffee? Now is the best time to begin.

Exit mobile version