100%(4)4 out of 4 people found this document helpful
This preview shows page 3 - 5 out of 5 pages.
Vulnerability management is a must with cloud environments workloads change more promptly in the cloud. Scan more often with no impact on workloads, prioritize quick assessment of real and residual risk of information system and remediation by discussing that a cyber-attack consequence on our business and setup an effective action plan. We need to avoid misconfigurations by applying best practices in cloud. Discovery process is fast along with being non-intrusive by using IaaS APIs because they have zero impact on network communications, no risk of false positives, stopped/suspended when asset are detects. Keeping data safe in IaaS platforms needs steps beyond protecting the computing environments such as:Authentication is essential for controlling any application with delicate business information especially cloud applications exposed to the Internet.
Cloud Application Security4Unrestricted Access with unnecessary exposing of our environment raises the danger of attacks that include DoS, man-in-the-middle, SQL injections, and data lossInactive/unused accounts create a preventable risk with auditing inactive/unused accounts can prevent account compromise and misuse at little cost to productivitySincerelyJustin Evans