Cloud cybersecurity is a joint responsibility

Atlanta moved more of its enterprise to the cloud after a major ransomware attack. But simply moving to the cloud isn’t a cybersecurity strategy in and of itself. Cloud security is based on shared responsibility.

In March 2018, Atlanta city agencies were infected with the SamSam ransomware virus.  The incident knocked out many operations across the city government for weeks, including municipal court scheduling, online bill payments, and the public Wi-Fi network at Hartsfield-Jackson Atlanta International Airport, the world’s busiest. The recovery potentially cost taxpayers as much as $17 million.   

Cloud-as-cybersecurity?

In response to this major attack , the city’s chief information officer recently touted the movement of even more of their enterprise to the cloud as an important component of their cybersecurity strategy.

“We’ve also made some transition to a lot of cloud services. Even before this happened, we had cloud services—a hybrid strategy,” Atlanta CIO Gary Brantley said in the city’s cybersecurity video update. “But we wanted to, kind of, move that percentage a little bit higher. And so, we’re in the process of doing that as well.”

Shared Cloud Cybersecurity Responsibilities

While public clouds certainly incorporate built-in security controls, it’s important to remember that simply moving to the cloud isn’t a cybersecurity strategy in and of itself. Cloud security is based on a shared responsibility model. AWS, for example, couches it as the “security of the cloud”—which is their responsibility—versus “security in the cloud,” which is the customer’s. Organizations can’t just expect to move to the cloud and then forget about cybersecurity.

Cloud service providers will protect the hardware and software infrastructure that runs all of its services, but network administrators are responsible for the security of their assets in the cloud.

The Role of DNS

DNS infrastructure offers a unique way to protect assets and compute wherever they may reside. Malware uses DNS 91% of the time, and is hunting for sensitive data wherever it may reside. BlueCat Edge detects, blocks, and quickly remediates cyberattacks across cloud and on-premises environments.  When enterprises span multiple data centers and clouds or are being migrated from data centers into the cloud, DNS Edge can keep track of where assets reside and secure them in transit.  Within any cloud environment, BlueCat Edge provides visibility and control over every DNS request and response, logging the source IP address for quick review and analysis to detect patterns of malicious behavior.

That cybersecurity model should include defense through DNS. The visibility Edge provides allows cities like Atlanta to keep their end of the cybersecurity bargain.


Published in:


An avatar of the author

Rebekah Taylor is a former journalist turned freelance writer and editor who has been translating technical speak into prose for more than two decades. Her first job in the early 2000s was at a small start-up called VMware. She holds degrees from Cornell University and Columbia University’s Graduate School of Journalism.

Related content

Enhance RBAC for Microsoft DNS and DHCP servers with Micetro

Learn how easy it is to implement enhanced role-based access controls for Microsoft DNS and DHCP server environments with Micetro.

Read more

Micetro 11.1 boosts DHCP management for Cisco Meraki SD-WAN

Learn how BlueCat Micetro 11.1 can help you overcome the limitations of Cisco Meraki SD-WAN devices to manage your distributed DHCP architecture.

Read more
Banner announcing BlueCat's acquisition of LiveAction, displaying both logos and the phrase "We're about to get bigger."

BlueCat acquires LiveAction to drive network modernization and optimization

BlueCat’s acquisition of LiveAction will allow customers to expand their view beyond DNS and dive deeper into the health of their network.

Read more

Simplify NIS2 compliance with DNS management

Learn whether the EU’s NIS2 requirements apply to your organization and about how DNS management and BlueCat can boost your path to compliance.

Read more

Modern network complexities can introduce security risks, operational risks, and create huge operational expense for your organization when not properly managed. Join our webinar on February 26 to learn how BlueCat helps you augment your Cisco implementations.