Vulnerability management is a must with cloud environments workloads change

Vulnerability management is a must with cloud

This preview shows page 3 - 5 out of 5 pages.

Vulnerability management is a must with cloud environments workloads change more promptly in the cloud. Scan more often with no impact on workloads, prioritize quick assessment of real and residual risk of information system and remediation by discussing that a cyber-attack consequence on our business and setup an effective action plan. We need to avoid misconfigurations by applying best practices in cloud. Discovery process is fast along with being non-intrusive by using IaaS APIs because they have zero impact on network communications, no risk of false positives, stopped/suspended when asset are detects. Keeping data safe in IaaS platforms needs steps beyond protecting the computing environments such as: Authentication is essential for controlling any application with delicate business information especially cloud applications exposed to the Internet.
Image of page 3
Cloud Application Security 4 Unrestricted Access with unnecessary exposing of our environment raises the danger of attacks that include DoS, man-in-the-middle, SQL injections, and data loss Inactive/unused accounts create a preventable risk with auditing inactive/unused accounts can prevent account compromise and misuse at little cost to productivity Sincerely Justin Evans
Image of page 4
Cloud Application Security 5
Image of page 5

You've reached the end of your free preview.

Want to read all 5 pages?

  • Fall '18
  • cloud application, IaaS Cloud Application

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture