BotNet News

Your source for Online Security News

Cloud Security refers to a variety of methods used to safeguard the data stored in the cloud. These include implementing strong authentication methods such as multi-factor or two-step authorization for administrative tasks, encrypting at rest and in transit to prevent data theft, and managing access controls on personal devices that have access to the cloud.

With cloud environments, ownership of hardware, software and remote connectivity frameworks varies based on the deployment model, with Infrastructure-as-a-Service (IaaS) providers managing core services and clients tasked with securing all that gets stacked on top, including applications, data, runtimes, middleware, and the operating system itself. Additional network security responsibilities include end-user device access and management, as well as any internal systems that connect to the cloud.

In addition, the proximity of cloud systems to other networked data and infrastructure, exposes them to threats that could compromise them in the same way as traditional on-premises systems are exposed to vulnerabilities, malware, misconfigurations, lateral movement risk, weak or leaked passwords, and other risks. The NSA affair made the public aware of how government agencies can intercept and manipulate data stored by citizens in their clouds.

To help reduce these risks, Cloud Security tools such as Aqua Security Real-Time CSPM (Cloud Service Provider Monitoring) scan workloads and identify the infrastructure components running in IaaS, PaaS, and SaaS environments. These tools also allow companies to continuously monitor the security posture of multicloud environments and compare their configurations with industry benchmarks such as AWS Well-Architected Framework, NIST, PCI-DSS, SOC2, etc.