Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Are You Ready To Automate Your Cloud Account Security?
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach

Are You Ready To Automate Your Cloud Account Security?

6 years ago Brent Holder
Are You Ready To Automate Your Cloud Account Security?

A Security Analyst, A Lead Developer, And A Cloud IT Admin Walk Into A Bar…

Stop me if you’ve heard this one before.

When we talk to users about the ways that they handle roles and responsibilities associated with keeping their Cloud accounts secure, we get a multitude of answers. There’s often a wide range of people and teams from various parts of the business, each handling a portion of the problem space. Addressing cloud security concerns can be a complicated puzzle that comes together differently for each organization. This is especially true when your teams, responsibilities, and assets are increasingly distributed.

“IT team oversees cloud configuration management, and AWS specific resources help with technical details.  We’re upskilling the app team and there’s are dedicated AWS resources to help”

Lead Application Developer, Retail

 

“A lot of people from across the globe, making a change they don’t know the impact of…we haven’t come up with a great way to control this.” 

Sr. IT Architect, Mgmt Consulting Firm

 

“Onboarding/offboarding resources…we need an automated solution to remove resources from projects or from the company.”

Lead Applications Developer, Retail

 

“Global Ops has dedicated cloud resources because they don’t do a lot of on-prem.  They have specific 365 teams, Azure teams.  300k users worldwide, so pretty specialized.”

Sr Network Security Engineer, Accounting firm

 

When it comes to the move to the Cloud, a lot of people and teams have to wear the Security hat, but it doesn’t always fit perfectly. One thing most companies have in common is a need for a set of requirements along with clear, repeatable playbooks to get into a good state and stay there. With our recently released Tripwire Configuration Manager, we can help.

Start With A Solid Foundation

An extremely common question we’ll hear when it comes to addressing security risk is, “Where should I start?”

This is true whether we’re talking with people trying to take in an entirely new problem space or with experienced security teams trying to make sure their limited resources are being applied to the most important issues.

When it comes to assessing Cloud Service Provider account level risk, the Center for Internet Security has created a perfect foundation. These are unsurprisingly called Foundations benchmarks, and they exist for AWS, Azure and Google Cloud. They focus on account settings related to Identity and Access Management, Logging, Monitoring, Networking and more, which make up the key security elements of your accounts.

Tripwire Configuration Manager collects your account configuration settings and evaluates them against the Center for Internet Security Foundations Benchmark. This gives you immediate, glanceable visibility into the current state, and it makes it easy to see which areas need attention.

Once you know the state of your account, it’s important to know which discovered issues to spend time on. Configuration Manager incorporates prioritized risk scoring so that you can fix issues with the highest risk first. This way, from the very first scan you run, you’ll know where you stand and where to start if there’s work to be done.

Intruders Attack At The Speed Of Automation

The image of a sinister hacker clacking away at keys as they manually duck and weave around their target’s defenses makes for good television, but we know the reality is much more boring to watch. Unfortunately, it’s also much faster. The truth is that much of this malicious activity is leveraging automation to multiply the efforts of a would-be intruder.

Where possible, security teams need to leverage that same speed provided by automation. Some problems have repeatable solutions and follow the same playbooks as they come up. We’ve heard from teams that have members spending almost all of their time rechecking existing configurations and moving things back into expected states as they drift. This is the type of activity we’d like to take off of your team’s plate to open up their time for more complicated issues. This is especially important in today’s security landscape, where 69% of companies reported understaffed cybersecurity teams, 58% reported open security positions, and 32% of open security positions took 6+ months to fill.

Automation also provides reliability. 62% of companies report misconfigurations as their greatest risk, and 95% of breach root causes are attributed to human error or misconfiguration. Configuration Manager can minimize human error and quickly close security gaps through configuration policy enforcement. Manual remediation details are available, but wherever possible, we’ve also enabled the user to “Fix Now” with a single button push. In those cases, there is also an option to automatically fix issues they are found to be insecure down the road.

Visibility That Grows As Fast As Your Business

As your cloud environment takes on more workloads, your number of active cloud accounts increases to match the growing needs of your business. Expanding the number of accounts to track and monitor can feel like a daunting task, but it doesn’t have to. AWS has a great feature, called a Launch Stack URL, which allows Configuration Manager to bundle up all of the necessary permissions into a set of predefined actions that can be run automatically. Leveraging this feature, we can give you a single button to get started and put everything in place to monitor your new account.

Using this quick start method, we’re able to set up a new AWS account for monitoring in a few clicks and can have results ready to view in under 5 minutes. Leveraging AWS External account access also allows us to monitor an AWS account without storing credentials or access keys that a user needs to rotate, which means even less Identity and Access Management administrative overhead for your teams.

It Only Takes A Few Minutes

So, a Security Analyst, a Lead Developer, and a Cloud IT Admin walk into a bar. Before they even have a chance to order, the bartender lets them know that they’ve been expected, and will have their order up right away.

Let us show you what that’s like. Go ahead and Request A Demo, and find out what Configuration Manager can do for you.

The post ” Are You Ready To Automate Your Cloud Account Security?” appeared first on TripWire

Source:TripWire – Brent Holder

Tags: Cloud, Critical Severity, Google, Hacker, TripWire

Continue Reading

Previous Top 5 Cybersecurity Risks with Cloud Migration
Next Cloud Services Abused by Clever Phishing Campaign

More Stories

  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

3 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

4 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

8 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach

Securing the Mid-Market Across the Complete Threat Lifecycle

8 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

11 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

14 hours ago [email protected] (The Hacker News)

Recent Posts

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
  • Securing the Mid-Market Across the Complete Threat Lifecycle
  • Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT