FirewallFortinet

Zero Trust and Cloud Firewalls: Securing Multi-Cloud Environments

Zero Trust firewalls protect assets across cloud environments.

The Evolution of Cloud Security and Zero Trust Firewalls

There’s something about sitting at my desk with cup of coffee number three that gets the cogs of my brain spinning—especially when I consider how far we’ve come since I was a network admin in 1993. You kids and yer PSTN muxes and yer crazy juggling acts between voice an’ data! Those were simpler times. Then the Slammer worm hit, and it seemed like the entire world learned how susceptible the most locked-down networks were. Fast forward 30 years and now I’m helping customers, including three banks very recently, modernize their zero-trust architectures across multi-cloud environments. And I can tell you, firewalls are not what they used to be.

The Rise of Multi-Cloud

Multi-cloud—it’s sort of like that cluttered garage in your home. More clouds = more room, but also more hiding places for missing or stolen things. No company wants to make a single big bet on a cloud, and tie itself to it forever the way they did to their data centers. Every company wants to use AWS here, Azure there, Google Cloud over here, maybe private clouds too. But—plot twist—the more clouds, the more complex it gets. And complexity means risk.

The traditional perimeter security concept? Dead. It was built on a castle and moat mentality that just doesn’t work once your assets are spread across so many environments.

That is precisely where Zero Trust plays in. Never trust devices or users just because they are inside the perimeter. Don’t trust no one vouch everything. This is required in multi-cloud environments. And safeguarding those assets requires a firewall strategy that’s intelligent, adaptive, and identity-focused.

Firewall Policies for Cloud

Let’s get into the weeds for a moment—no longer are firewalls in the cloud simply about blocking ports. Today’s firewalls are context-aware, they look at layer 7 traffic and they tightly integrate with cloud service provider APIs. I’ve seen too many businesses treat cloud firewalls the way they did hardware firewalls—set it, forget it, cross fingers. That’s a recipe for disaster.

In other words, a sound firewall policy in multi-cloud looks like:

  • Creating nitty rules from workloads, not just IP addresses.
  • Segmentation that walls off assets that are most essential so that when one cloud is breached, the break doesn’t move on to others.
  • Constant monitoring and dynamic rule adaptation, since cloud workloads are continually being spun up and spun down.

And here’s a little pet peeve: I don’t understand why so many organizations continue to count on default firewall policies. It’s lazy and dangerous. You wouldn’t leave your front door wide open because you THINK no one suspicious will come in, correct?

Identity-Based Security

The new perimeter is identity. Period. The faces of firewalls themselves are changing, moving to identity-based policies—access and firewall rules based not on where someone is located on the network, but who they are, what kind of device they’re using, and more.

I was nodding along as I had to help each of those banks recently, for each one wanted to enforce access based on roles and real-time indicators such as the health of device and geolocation. The firewalls needed to get along with identity providers and SSO systems. Not just permit or deny IP addresses blindly.

In multi-cloud, you can use an identity-based firewall for securing. Here is a handy checklist:

  • Seamless connection to identity & access management (IAM) tools
  • Apply the least-privilege rule: Does this user really need that access now?
  • Require multi-factor authentication to make access more secure
  • Record and track the user behavior for the purposes of auditing and anomaly detection.

Some people believe identity-based policies diminish the network’s performance or annoy users. In fact, from what I’ve seen, it’s not scary at all when done well—and can make life easier and much, much safer. But it requires thoughtful planning and integration—there’s no cookie-cutter approach.

API and Workload Protection

Here’s a spot that doesn’t receive nearly enough attention. Cloud workloads speak to each other over APIs all the time. And you’ve either hardened those APIs and workloads, or you’ve left a big hole.

So what are we really saving here?

  • APIs made available to internal or third-party users
  • Microservices chatting across clouds
  • Functions and containers without servers

There are numerous firewalls that protect both by:

  • Validating incoming API requests against known patterns and rejecting anomalous requests
  • Implementing policies for application communication on a per-application basis
  • Filtering and policing of east-west traffic in the cloud

In the past, I deployed hardware firewalls which couldn’t have even understood we were sending, let alone understand application logic. Now we have cloud firewalls with workload awareness, which at least gives us a fighting chance.

One last thing—do not overlook workload security agents on your cloud servers or containers. And firewall rules are only going to do so much for you if a piece-of-oh-hi compromised app decides to call out to the shadiest of the shady IPs and you have no visibility into that.

Threat Intelligence

With so much complexity, you can no longer depend on static blocklists or general alerts. The terrain is changing every day, with new threats, zero-days and targeted attacks that are purpose-built for cloud infrastructure.

Smart cloud firewalls thrive on threat intelligence—dynamic information about attacker IPs, new malware signatures, and attack patterns.

At PJ Networks, we mix threat intel from assorted sources to dynamically feed our firewall policies. That means:

  • Automatically block shady IPs before they reach your cloud resources
  • Recognizing patterns that correspond to known attack vectors
  • Ranking alerts by their risk level to ensure that your security team won’t be overwhelmed by the noise

And here’s the thing—not every AI-fueled solution is a good one. I’ve seen more flash than substance in some instances. But threat intelligence, when curated and paired with the wisdom of a human? GOLD.

Quick Takeaway for Cloud Security

For those skimming (I understand—time is money):

  • A multi-cloud reality is emerging – embrace Zero Trust to manage it
  • Firewalls need to be identity-aware, not just IP filters
  • Safeguard APIs and workloads via deep inspection
  • Get ahead of threats with real-time intelligence
  • Default firewall rules = security nightmare

Finally, I’m still high from the DefCon hardware hacking village. It’s a good reminder how attackers continue to innovate—outsmarting us is a losing strategy, if we aren’t also evolving our multi-cloud firewalls and Zero Trust strategies, we’re a sitting duck.

Keep in mind, securing the cloud involves more than just installing tools. It’s a mindset, it’s design, and it’s the steady hand of vigilance. And that I dictated from my desk, on a third cup of too-strong coffee? Now is the best time to begin.

What's your reaction?

Related Posts