{"id":17625,"date":"2020-02-04T06:00:03","date_gmt":"2020-02-04T14:00:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2020\/02\/04\/news-11360\/"},"modified":"2020-02-04T06:00:03","modified_gmt":"2020-02-04T14:00:03","slug":"news-11360","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/04\/news-11360\/","title":{"rendered":"Four Reasons Your Cloud Security Is Keeping You Up At Night"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Tue, 04 Feb 2020 13:01:47 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud-380x380.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>We are excited to introduce guest posts from our newest Trenders from Cloud Conformity, now Trend Micro Cloud One \u2013 Conformity. More insights will be shared from this talented team to help you be confident and in control of the security of your cloud environments!<\/p>\n<p><strong>Why your cloud security is keeping you up at night<\/strong><\/p>\n<p>We are all moving to the cloud for speed, agility, scalability, and cost-efficiency and have realized that it demands equally powerful security management. As the cloud keeps on attracting more businesses, security teams are spending sleepless nights securing the infrastructure.<\/p>\n<p>Somewhere, a cyber con artist has a target set on you and is patiently waiting to infiltrate your security. Managing your security posture is as critical as wearing sunscreen even if the sun is hiding behind a cloud. You may not feel the heat instantly, but it definitely leaves a rash for you to discover later.<\/p>\n<p>Analyzing the volume of issues across the global Trend Micro Cloud One \u2013 Conformity customer base clearly shows that \u2018Security\u2019 is the most challenging area within AWS infrastructure.<\/p>\n<blockquote>\n<p><em>According to an internal study in June 2019, more than 50% of issues belonged to the \u2018Security\u2019 category.<\/em><\/p>\n<\/blockquote>\n<p>We can definitely reduce the number of security issues affecting cloud infrastructure, but first need to conquer the possible reasons for security vulnerabilities.<\/p>\n<p><strong>\u00a01. Not scanning your accounts regularly enough<\/strong><\/p>\n<p>If you deploy services and resources multiple times a day, you must continuously scan all your environments and instances at regular intervals. Tools like <a href=\"https:\/\/cloudconformity.atlassian.net\/wiki\/spaces\/HELP\/pages\/67403777\/Conformity+Bot\">Conformity Bot<\/a> scans your accounts against 530 rules across five pillars of the Well-Architected Framework to help you identify potential security risks and prioritize them. You can even set up the frequency of scans or run them manually as required.<\/p>\n<p><strong>2. Not investing in preventative measures<\/strong><\/p>\n<p>Seemingly harmless misconfigurations can cause enormous damage that can rapidly scale up and result in a security breach. You can prevent potential security risks from entering live environments by investing some time in scanning your staging or test accounts before launching any resources or services. You can use a <a href=\"https:\/\/cloudconformity.atlassian.net\/wiki\/spaces\/HELP\/pages\/57573495\/Template+Scanner\">Template Scanner<\/a> to scan your account settings against CloudFormation Template and identify any security and compliance issues before deployment.<\/p>\n<p><strong>3. Not monitoring real-time activity <\/strong><\/p>\n<p>Catastrophes don&#8217;t wait! It may take a few minutes before someone barges into your cloud infrastructure while you are away on the weekend. You need to watch activity in real-time to act on threats without delay. A tool such as <a href=\"https:\/\/cloudconformity.atlassian.net\/wiki\/spaces\/HELP\/pages\/67076349\/Real-Time+Threat+Monitoring\">Real-Time Monitoring Add-on<\/a> tracks your account\u2019s activity in real time and triggers alerts for suspicious activity based on set configurations. For example, you can set up alerts to monitor account activity from a specific country or region.<\/p>\n<p><strong>4. Not communicating risks in a timely<\/strong><strong> manner<\/strong><\/p>\n<p>The information trickling from your monitoring controls is fruitless until you get the right people to act quickly. One of the best practices to maintain smooth security operations is to merge the flow of security activity and events into information channels. Conformity allows you to integrate your AWS accounts with <a href=\"https:\/\/cloudconformity.atlassian.net\/wiki\/spaces\/HELP\/pages\/58982475\/Communication+Channels\">communication channels<\/a>, for example Jira, email, SMS, Slack, PagerDuty, Zendesk, ServiceNow ITSM, and Amazon SNS. Moreover, configuring communication triggers sends notifications and alerts to set teams through the selected channels.<\/p>\n<p>AWS provides you with the services and resources to host your apps and infrastructure, but remember \u2013 Security is a shared responsibility in which you must take an active role.<\/p>\n<p>See how Trend Micro can support your part of the shared responsibility model for cloud security: <a href=\"https:\/\/www.trendmicro.com\/cloudconformity\">https:\/\/www.trendmicro.com\/cloudconformity<\/a>.<\/p>\n<p>Stay Safe!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/four-reasons-your-cloud-security-is-keeping-you-up-at-night\/\">Four Reasons Your Cloud Security Is Keeping You Up At Night<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/four-reasons-your-cloud-security-is-keeping-you-up-at-night\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Tue, 04 Feb 2020 13:01:47 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud-380x380.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/cloud.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>We are excited to introduce guest posts from our newest Trenders from Cloud Conformity, now Trend Micro Cloud One \u2013 Conformity. More insights will be shared from this talented team to help you be confident and in control of the security of your cloud environments! Why your cloud security is keeping you up at night&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/four-reasons-your-cloud-security-is-keeping-you-up-at-night\/\">Four Reasons Your Cloud Security Is Keeping You Up At Night<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[11728,11064,11146,714],"class_list":["post-17625","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-cloud","tag-cloud-computing","tag-cloud-security","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17625"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17625\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17625"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}