Enterprises must adapt their security systems as they move from virtual datacentre use to the private cloud, according to a new report from Gartner.
The analyst firm said that the way companies provide and deliver security services needs to change, and that over a third of all security controls used in datacentres will be virtualised by 2015.
The report identified a number of elements that organisations should consider early on in any transition process when moving from virtualisation to private cloud computing.
"For most organisations, virtualisation will provide the foundation and the stepping stone for the evolution to private cloud computing," said Thomas Bittman, a vice president and distinguished analyst at Gartner.
"However, the need for security must not be overlooked or 'bolted on' later during the transition to private cloud computing."
The nature of security will not change, according to Gartner, but will be delivered in a different way, and should be "decoupled" from physical hardware and allocated to a "fabric" of computing resources.
"Policies tied to physical attributes, such as the server, IP address, Media Access Control address or where physical host separation is used to provide isolation, will break down with private cloud computing," added Neil MacDonald, a vice president and Gartner Fellow.
"For many organisations, the virtualisation of security controls will provide the foundation to secure private cloud infrastructures, but alone it will not be enough to create a secure private cloud."
Gartner said that any virtualised security plans should start with a set of on-demand and elastic services, and that security should be delivered on demand, rather than as part of a set of siloed products.
Security workloads will become standardised as the cloud expands, and can be increased, moved, modified, cloned and retired, Gartner said.
Companies will also need a programmable infrastructure, which means that APIs are used to open up security services.
This will make security "consumable", according to Gartner, and will "enable information security professionals to focus their attention on managing policies, not programming infrastructure".
The analyst firm also suggested that policies should be based on logical as opposed to physical attributes.
By incorporating Runtime context into real-time security decisions, organisations will be able to make quicker and more informed decisions about what action to take during a security incident.
Scientists create a virtual reality simulation of a black hole sitting at the centre of the Milky Way
Simulations like this can help people understand complicated systems in the universe in a better way
The most luminous galaxy ever discovered is cannibalising at least three of its smaller neighbours, study finds
The galaxy radiates at 350 trillion times the luminosity of the Sun
Researchers modify genetic code of cancer-killing virus so it can target cells that protect cancer from immune system
Changing the genetic coding causes the infected cancer cells to produce a protein that kills the fibroblast cells that protect cancer
The findings can help improve the current understanding of brain development disorders, such as epilepsy or autism