The “simplest” of remote work is given by Alexey Sabanov: “If during your remote work you have not been hacked and critical business information has not been taken away, then the security policies adopted in your organization do not need to be changed. If incidents do occur, you need to think about what needs to be urgently corrected.”
Automated visibility
Charaka Gunathilake, chief technology officer at Panaseer, echoes Reed's sentiments. He also believes that cloud security is about visibility, and agrees that the growing use of multiple cloud platforms and services creates a host of challenges, the biggest of which is visibility.
“Security teams are struggling to identify assets, manage coverage gaps, and prevent unauthorized access to the cloud. As it has become so easy to deploy large infrastructure, many organizations are increasing their attack surface at an unprecedented rate through automation. This is compounded by the lack of uniformity: most are using unique combinations of clouds, hybrid clouds, multi-clouds, and on-premises data centers that are constantly evolving,” Gunathilake said.
To overcome visibility issues, many organizations mine data via APIs and build inventories for each of the three most commonly used cloud infrastructure tiers: IaaS, PaaS, and SaaS.
However, Gunathilake points out that manual bahrain mobile database are not only error-prone, but also require significant resources and time. “This also means,” he added, “that things can get overlooked. This was demonstrated by a McAfee report that claimed that 99% of cloud incidents go undetected. The fact that almost all cloud incidents go undetected indicates a critical lack of visibility into cloud security and responsibilities. The best way to fix this is to invest in systems that automatically provide visibility into all computing environments.”
Recommendation for monitoring the security
-
- Posts: 542
- Joined: Mon Dec 23, 2024 3:13 am