It’s 6:00 a.m. on a Monday morning. You get an automated text from your security systems that a DDOS attack was attempted, but new security policies downloaded several hours earlier proactively protected the systems from the attacking IP address. All is well. 

The alternative is not good—meaning that you had no idea of the DDOS attack, and now you’re playing cloud security whack-a-mole to fend off the attack until you can put more permanent solutions in place. Of course, other types of breaches could be much worse, in terms of their impact on the enterprise. 

Proactive and automated security solutions are known as centralized trust. Simply put, these are central repositories of security policies that are linked to local repositories in the enterprise cloud. They may even contain centralized identities—things, processes, or people—that that can be centrally credentialed.

The cloud is the perfect place to have centralized trust, both for the cloud platforms themselves and enterprise resources wherever they may reside. Sadly, enterprises may not be willing to adopt this model.