home.social

#cspm — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cspm, aggregated by home.social.

  1. Why is CSPM essential for companies? My latest article explores how proactive cloud security can protect your digital assets and drive business innovation. Plus, learn how RELIANOID can help boost your cloud security! Check out the article and get in touch for expert guidance.


    relianoid.com/blog/why-is-clou

  2. Near-realtime-защита внутри облака: как мы боролись с лавиной ИБ-событий и превращали их в полезные данные

    Меня зовут Владислав Архипов, я архитектор команды разработки security‑сервисов в Yandex Cloud. Мы занимаемся как непосредственной безопасностью облачной платформы и её клиентов, так и созданием сервисов безопасности. Итоги 2025 года в сфере информационной безопасности показали, что нагрузка на security‑команды любого уровня растёт вместе с ростом потока данных. На нашем примере: к середине 2025 года количество типовых событий безопасности, которые мы обрабатывали, в среднем составляло 28 млрд в день, а рост за год составил 20%. При этом всё чаще необходимо анализировать потоковые источники данных, где традиционные подходы с периодической выгрузкой информации просто исчерпали себя. В этой статье вместе с руководителем Cloud Security Operations Юрием Наместниковым @namestnikov мы расскажем, как создаём Security Deck и добиваемся прозрачности процессов ИБ, а также о том, как хронологическое хранилище помогает справляться с растущими потоками данных. Покажем, как мы превращаем разрозненные события в стейт и храним в хронологической базе данных, а также в чём отличие нашего запатентованного решения от других на уровне архитектуры.

    habr.com/ru/companies/yandex_c

    #безопасность #хронологическое_хранилище #temporal_bd #ydb #security_operation_center #soc #cspm #cnapp

  3. ☁️ Cloud Security Toolkit – What Modern Teams Actually Need 🛡️
    The cloud changed everything — speed, scale, AND attack surface. Security now happens at runtime, at identity level, and inside every pipeline. If your tools can’t see everything, they’re already failing.

    Core Categories to Lock In:
    • CSPM → Posture & misconfig checks (Prisma Cloud, Wiz, Dome9)
    • CWPP → Runtime protection for VMs & containers (CrowdStrike, Aqua, Trend Micro)
    • CASB → SaaS visibility & data control (Netskope, MS Defender for Cloud Apps)
    • IAM → Hardening identity (AWS IAM, Azure AD, Okta, BeyondTrust)
    • SIEM / Threat Detection → Splunk, Sumo Logic, Datadog + cloud logs
    • Vuln & Config Scanning → Tenable, Trivy, Qualys for IaC & images
    • Secrets Management → HashiCorp Vault, AWS Secrets Manager
    • CI/CD Supply Chain Defense → Snyk, Checkov, GitHub Advanced Security

    🧠 Cloud Rule:
    Attackers don’t break in — they log in. Identity is the new perimeter.

    Always what do you guys think ?

    ⚠️ Use responsibly. Test in staging before production. Map every tool to your threat model, compliance framework, and provider stack.

    #CloudSecurity #DevSecOps #CSPM #IAM #CWPP #SIEM #ContainerSecurity #InfoSec #CyberDefense #HacktivateLabs #SecurityTools

  4. Cloud compliance dashboards, CNAPP, and CSPM can all show green, but they don't show your entire attack surface.

    The issue is not with the dashboards, but with the blind spots that lie outside their view, such as leaked developer personal access tokens or overprivileged pipelines that do not appear as non-compliant.

    In this blog post, Joe Durbin looks at those gaps around tokens, pipelines, and third-party build services. He explains how human-led configuration reviews and custom threat actor simulations work alongside provider tools to show and test your actual attack surface.

    📌pentestpartners.com/security-b

    #cloudsecurity #cloudnative #devsecops #cnapp #cspm #cybersecurity

  5. ☁️ Cloud Security Tools — Essential Toolkit for Modern Teams 🛡️🚀

    Cloud environments introduce new risks and require specialized tooling to secure workloads, configurations, and data. Use a mix of CSP-native and third-party tools to cover posture management, runtime protection, identity, and visibility. Key categories and examples: Cloud Security Posture Management (CSPM) — Prisma Cloud, Dome9, Wiz for misconfig & compliance checks 🔍; Cloud Workload Protection (CWPP) — CrowdStrike, Trend Micro, Aqua for container and VM runtime defense 🐳🛡️; Cloud Access Security Broker (CASB) — Netskope, Microsoft Defender for Cloud Apps for SaaS visibility & data control ☁️🔐; Identity & Access Management — AWS IAM/Azure AD hardening, BeyondTrust, Okta for strong auth & least privilege 🔑; Threat Detection & SIEM — Splunk, Sumo Logic, Datadog + cloud-native logging for alerting and forensics 📊; Vulnerability & Configuration Scanning — Qualys, Tenable, Trivy for images and infra-as-code scanning ⚙️; Secrets Management — HashiCorp Vault, AWS Secrets Manager for safe key handling 🔐; and Supply-chain & CI/CD security — Snyk, Checkov, GitHub Advanced Security to catch insecure deps and pipelines 🧩.

    ⚠️ Disclaimer:
    For educational & defensive use only. Evaluate tools against your cloud provider, compliance needs, and threat model before deploying. Always test changes in staging before production. 🚫🔒

    #CloudSecurity #CSPM #CWPP #IAM #DevSecOps #InfoSec #Cloud #CyberSecurity #SecurityTools #Compliance #ContainerSecurity ☁️🛡️

  6. Киберугрозы в первом полугодии 2025 года: анализ векторов атак на облачные и гибридные инфраструктуры

    Привет, Хабр! Меня зовут Юрий Наместников, я руковожу Cloud Security Operations в Yandex Cloud, и сегодня мы поговорим о результатах анализа кибератак в первом полугодии 2025 года. За первые шесть месяцев 2025 года мы зафиксировали более 25 тыс. попыток кибератак на облачные и гибридные инфраструктуры. В этом отчёте с результатами нашего исследования рассказываем об актуальных угрозах и тенденциях, которые видели как в собственном контуре, так и в целом у российских компаний в первом полугодии

    habr.com/ru/companies/yandex_c

    #безопаность #облака #ycdr #cspm #kspm #mitre #mitre_attack

  7. 𝐌𝐚𝐩 𝐂𝐨𝐧𝐭𝐚𝐢𝐧𝐞𝐫 𝐈𝐦𝐚𝐠𝐞𝐬 𝐟𝐫𝐨𝐦 𝐂𝐨𝐝𝐞 𝐭𝐨 𝐂𝐥𝐨𝐮𝐝 𝐰𝐢𝐭𝐡 𝐃𝐞𝐟𝐞𝐧𝐝𝐞𝐫 𝐟𝐨𝐫 𝐂𝐥𝐨𝐮𝐝

    When a vulnerability is identified in a container image stored in a container registry or running in a Kubernetes cluster, it can be difficult for a security practitioner to trace back to the CI/CD pipeline that first built the container image and identify a developer remediation owner.

    With DevOps security capabilities in Microsoft Defender Cloud Security Posture Management (CSPM), you can map your cloud-native applications from code to cloud to easily kick off developer remediation workflows and reduce the time to remediation of vulnerabilities in your container images.

    techcommunity.microsoft.com/t5

    Details: learn.microsoft.com/en-us/azur

    #defender #cspm #CloudSecurityPostureManagement #devops #pipeline #codetocloud #container #vulnerabilities #Kubernetes #cnapp #cwpp #cloudnative #cloudsecurity #soc #microsoft #microsoftsecurity #azure #multicoud

  8. 𝐈𝐧𝐭𝐫𝐨𝐝𝐮𝐜𝐢𝐧𝐠 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐃𝐞𝐟𝐞𝐧𝐝𝐞𝐫 𝐟𝐨𝐫 𝐂𝐥𝐨𝐮𝐝 𝐋𝐚𝐛𝐬

    Our labs project help you get ramped up with Microsoft Defender for Cloud and provide hands-on practical experience for product features, capabilities, and scenarios. The labs are divided into 3 main tracks, a beginner (level 100/200) and an advanced (level 300+) track. The labs contain several modules cover different pillars such as Cloud Security Posture Management (CSPM) to Cloud Workload Protection (CWP). To start using our labs, you will need to create Azure Trial Subscription which provides you all capabilities for 30 days – so you have to finish this lab at this point to take advantage of the free trial.

    github.com/Azure/Microsoft-Def

    #defender #defenderforcloud #cnapp #cspm #cwp #cwpp #cloudsecurity #multicloud #azure #aws #gcp #microsoft #microsoftsecurity #soc #server #container #storage #dns #api #devops #database #api #github #arc #agentless #storageaccount #mde #vulnerability #mdvm #siem

  9. Prepare to onboard Microsoft Defender for Cloud (MDC) with Terraform: The new Terraform module, "mdc-defender-plans-azure" allows you to configure MDC plans for your subscriptions or management groups with just a few lines of code!

    "Simplifying Onboarding to Microsoft Defender for Cloud with Terraform" - Microsoft Community Hub
    techcommunity.microsoft.com/t5

    #MicrosoftDefenderForCloud #DefenderCSPM #IaC #Terraform #CSPM #CNAPP #MDFC #Security #Cybersecurity #Microsoft #Azure

  10. 𝗔𝗻𝗻𝗼𝘂𝗻𝗰𝗶𝗻𝗴 𝗻𝗲𝘄 𝗖𝗡𝗔𝗣𝗣 𝗰𝗮𝗽𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀 𝗶𝗻 𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿 𝗳𝗼𝗿 𝗖𝗹𝗼𝘂𝗱

    At Ignite 2023, we are excited to announce new innovations in Microsoft Defender for Cloud that will help security admins strengthen their CNAPP deployment, improve the cloud security posture through additional code to cloud insights, and protect cloud-native applications across multicloud environments in a unified solution:

    ➡ Unified insights from Microsoft Entra Permissions Management (CIEM) to enable comprehensive risk mitigation

    ➡Enhanced attack path analysis engine to swiftly pinpoint critical risks across clouds

    ➡Accelerated critical risk remediation with Microsoft Security Copilot integration

    ➡Integrated security across multiple DevOps platforms

    Extended protection for cloud workloads

    ➡Improved API Security Posture

    ➡Go beyond workload protection – detect and respond to threats across the enterprise in a unified platform

    More details:

    techcommunity.microsoft.com/t5

    #cnapp #devops #api #protection #ciem #cwp #cspm #defender #defenderforcloud #azure #gcp #aws #cloud #cloudnative #cloudprotection #cloudsecurity #multicloud #microsoft #microsoftsecurity #soc #ignite #microsoftignite #permissionmanagement #ai #mitre #copilot #securitycopilot #vulnerability

  11. 𝗔𝗻𝗻𝗼𝘂𝗻𝗰𝗶𝗻𝗴 𝗻𝗲𝘄 𝗖𝗡𝗔𝗣𝗣 𝗰𝗮𝗽𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀 𝗶𝗻 𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿 𝗳𝗼𝗿 𝗖𝗹𝗼𝘂𝗱

    At Ignite 2023, we are excited to announce new innovations in Microsoft Defender for Cloud that will help security admins strengthen their CNAPP deployment, improve the cloud security posture through additional code to cloud insights, and protect cloud-native applications across multicloud environments in a unified solution:

    ➡ Unified insights from Microsoft Entra Permissions Management (CIEM) to enable comprehensive risk mitigation

    ➡Enhanced attack path analysis engine to swiftly pinpoint critical risks across clouds

    ➡Accelerated critical risk remediation with Microsoft Security Copilot integration

    ➡Integrated security across multiple DevOps platforms

    Extended protection for cloud workloads

    ➡Improved API Security Posture

    ➡Go beyond workload protection – detect and respond to threats across the enterprise in a unified platform

    More details:

    techcommunity.microsoft.com/t5

    #cnapp #devops #api #protection #ciem #cwp #cspm #defender #defenderforcloud #azure #gcp #aws #cloud #cloudnative #cloudprotection #cloudsecurity #multicloud #microsoft #microsoftsecurity #soc #ignite #microsoftignite #permissionmanagement #ai #mitre #copilot #securitycopilot #vulnerability

  12. 𝗔𝗻𝗻𝗼𝘂𝗻𝗰𝗶𝗻𝗴 𝗻𝗲𝘄 𝗖𝗡𝗔𝗣𝗣 𝗰𝗮𝗽𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀 𝗶𝗻 𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿 𝗳𝗼𝗿 𝗖𝗹𝗼𝘂𝗱

    At Ignite 2023, we are excited to announce new innovations in Microsoft Defender for Cloud that will help security admins strengthen their CNAPP deployment, improve the cloud security posture through additional code to cloud insights, and protect cloud-native applications across multicloud environments in a unified solution:

    ➡ Unified insights from Microsoft Entra Permissions Management (CIEM) to enable comprehensive risk mitigation

    ➡Enhanced attack path analysis engine to swiftly pinpoint critical risks across clouds

    ➡Accelerated critical risk remediation with Microsoft Security Copilot integration

    ➡Integrated security across multiple DevOps platforms

    Extended protection for cloud workloads

    ➡Improved API Security Posture

    ➡Go beyond workload protection – detect and respond to threats across the enterprise in a unified platform

    More details:

    techcommunity.microsoft.com/t5

    #cnapp #devops #api #protection #ciem #cwp #cspm #defender #defenderforcloud #azure #gcp #aws #cloud #cloudnative #cloudprotection #cloudsecurity #multicloud #microsoft #microsoftsecurity #soc #ignite #microsoftignite #permissionmanagement #ai #mitre #copilot #securitycopilot #vulnerability

  13. 𝗔𝗻𝗻𝗼𝘂𝗻𝗰𝗶𝗻𝗴 𝗻𝗲𝘄 𝗖𝗡𝗔𝗣𝗣 𝗰𝗮𝗽𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀 𝗶𝗻 𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿 𝗳𝗼𝗿 𝗖𝗹𝗼𝘂𝗱

    At Ignite 2023, we are excited to announce new innovations in Microsoft Defender for Cloud that will help security admins strengthen their CNAPP deployment, improve the cloud security posture through additional code to cloud insights, and protect cloud-native applications across multicloud environments in a unified solution:

    ➡ Unified insights from Microsoft Entra Permissions Management (CIEM) to enable comprehensive risk mitigation

    ➡Enhanced attack path analysis engine to swiftly pinpoint critical risks across clouds

    ➡Accelerated critical risk remediation with Microsoft Security Copilot integration

    ➡Integrated security across multiple DevOps platforms

    Extended protection for cloud workloads

    ➡Improved API Security Posture

    ➡Go beyond workload protection – detect and respond to threats across the enterprise in a unified platform

    More details:

    techcommunity.microsoft.com/t5

    #cnapp #devops #api #protection #ciem #cwp #cspm #defender #defenderforcloud #azure #gcp #aws #cloud #cloudnative #cloudprotection #cloudsecurity #multicloud #microsoft #microsoftsecurity #soc #ignite #microsoftignite #permissionmanagement #ai #mitre #copilot #securitycopilot #vulnerability

  14. 𝗔𝗻𝗻𝗼𝘂𝗻𝗰𝗶𝗻𝗴 𝗻𝗲𝘄 𝗖𝗡𝗔𝗣𝗣 𝗰𝗮𝗽𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀 𝗶𝗻 𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿 𝗳𝗼𝗿 𝗖𝗹𝗼𝘂𝗱

    At Ignite 2023, we are excited to announce new innovations in Microsoft Defender for Cloud that will help security admins strengthen their CNAPP deployment, improve the cloud security posture through additional code to cloud insights, and protect cloud-native applications across multicloud environments in a unified solution:

    ➡ Unified insights from Microsoft Entra Permissions Management (CIEM) to enable comprehensive risk mitigation

    ➡Enhanced attack path analysis engine to swiftly pinpoint critical risks across clouds

    ➡Accelerated critical risk remediation with Microsoft Security Copilot integration

    ➡Integrated security across multiple DevOps platforms

    Extended protection for cloud workloads

    ➡Improved API Security Posture

    ➡Go beyond workload protection – detect and respond to threats across the enterprise in a unified platform

    More details:

    techcommunity.microsoft.com/t5

    #cnapp #devops #api #protection #ciem #cwp #cspm #defender #defenderforcloud #azure #gcp #aws #cloud #cloudnative #cloudprotection #cloudsecurity #multicloud #microsoft #microsoftsecurity #soc #ignite #microsoftignite #permissionmanagement #ai #mitre #copilot #securitycopilot #vulnerability

  15. It's taken me almost a year to write (and edit) my rant about categories and acronyms in cybersecurity. Which acronyms or categories annoy you the most? Security teams don't need more tools, they need efficient ways to mitigate risk and respond quickly to threats or attacks - especially now to keep up with faster development cycles.
    techtarget.com/searchsecurity/
    #cloudsecurity #applicationsecurity #appsec #cspm #sast #dast #iast #sca #sbom #ciem #asoc #dspm #aspm #cnapp #cdr #mdr #itdr #ndr #mdr #xdr #edr #cnapp #wapp #devsecops #cybersecurity #infosec #ciso #cso

  16. 𝗣𝗿𝗲𝗱𝗶𝗰𝘁 𝗳𝘂𝘁𝘂𝗿𝗲 𝗮𝘁𝘁𝗮𝗰𝗸𝘀! 𝗖𝗹𝗼𝘂𝗱 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗣𝗼𝘀𝘁𝘂𝗿𝗲 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 𝘄𝗶𝘁𝗵 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿

    Advanced cloud security protection goes beyond general security recommendations and provides predictive and future-facing defense, so users can prioritize security based on connected risks, visualize potential attack paths, and identify vulnerabilities and misconfigurations that attackers might exploit. Recommendations are ranked based on severity and potential impact, so users can focus on the most critical issues first.

    techcommunity.microsoft.com/t5

    #defendercspm #cspm #posturemanagement #defenderforcloud #cnapp #defender #microsoft #azure #cloud #multicloud #soc #cybersecurity #xdr

  17. 𝐍𝐞𝐰 𝐞𝐱𝐩𝐚𝐧𝐝𝐞𝐝 𝐯𝐢𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲 𝐢𝐧𝐭𝐨 𝐦𝐮𝐥𝐭𝐢𝐜𝐥𝐨𝐮𝐝 𝐝𝐚𝐭𝐚 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐢𝐧 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐃𝐞𝐟𝐞𝐧𝐝𝐞𝐫 𝐟𝐨𝐫 𝐂𝐥𝐨𝐮𝐝

    The data security dashboard provides a centralized, complete and current view of the state of your cloud data estate.

    The data security dashboard helps you to:

    ➡ Discover your complete multicloud data estate across managed and hosted data resources

    ➡Understand your Defender for Cloud protection coverage and gaps across data resources

    ➡Gain insight on which protected data resources contain sensitive data and the types of sensitive information they contain

    ➡Use built-in data query templates to speed up cloud security explorer results

    ➡Focus on sensitive data resources that require attention as a result of active threats or potential risks to your sensitive data

    ➡View changing trends of resources with sensitive data that require attention to analyze improvement of data security posture over time

    techcommunity.microsoft.com/t5

    #microft #azure #defender #defenderforcloud #cnapp #aws #gcp #data #datasecurity #cloud #cloudsecurity #soc #cspm #posturemanagement

  18. In the realm of cybersecurity, preventing attackers' entry through misconfigurations is paramount. Cloud misconfigurations, particularly in AWS environments, can open doors to vulnerabilities. Microsoft Defender for Cloud steps in as a proactive guardian, identifying these misconfigurations and enabling swift remediation.

    techcommunity.microsoft.com/t5

    🌐 Why Misconfigurations Matter

    Misconfigured cloud resources can expose sensitive data, grant unauthorized access, or leave unnecessary openings for exploitation. To maintain a strong security posture, proactive security management is essential.

    🛡️ How Microsoft Defender for Cloud Helps

    In this blog, I'll guide you through various scenarios of misconfigured AWS Cloud resources and showcase how Microsoft Defender for Cloud empowers security teams to identify, prevent, and remediate risks.

    🚀 Getting Started with Proactive Security

    To begin safeguarding your AWS resources, set up the connection between your AWS account and Microsoft Defender for Cloud. The cloud security graph, attack path analysis, and the cloud security explorer are invaluable tools for contextual security assessment.

    🔍 Scenario 1: Sensitive Data Exposure

    Imagine Contoso Bank, using Amazon S3 to store sensitive information. Mistakenly replicating data to a public S3 bucket opens avenues for data exposure. Microsoft Defender CSPM's attack path analysis uncovers this misconfiguration, providing insights and remediation steps.

    🔍 Scenario 2: Over-Permissioning via IAM Roles

    Datum Corporation's IT Admins manage AWS EC2 instances and want automated backups. Misconfigured IAM roles can lead to over-permissioning, exposing the instance to more access than necessary. Defender CSPM's attack path capability highlights vulnerabilities, effective permissions, and potential risks.

    🔍 Scenario 3: Compromising KMS Keys

    Fabrikam Inc secures sensitive data on Amazon EC2 instances through a KMS key. However, a high-severity vulnerability on the instance poses a risk of unauthorized access to the KMS. Defender CSPM's attack path analysis identifies potential credential theft and suggests remediation steps.

    📚 Continuous Monitoring and Stay Ahead

    The battle against misconfigurations isn't a one-time effort. Incorporating attack path analysis into your security strategy empowers teams to monitor and address new misconfigurations introduced during environment changes.

    Enhance your AWS security with Microsoft Defender for Cloud. Stay ahead of potential misconfigurations, safeguard sensitive data, and bolster your cloud security strategy.

    #CloudSecurity #AWSProtection #MicrosoftDefender #ProactiveSecurity #CyberDefense #microsoft #cnapp #defenderforcloud #aws #azure #multicloud #cspm #bucket #cloud #cloudsecurity #cloudnative #soc #xdr

  19. Steps Forward: Can ‘CNAPP’ solutions truly unify cloud, on-premises best cybersecurity practices?

    Byron Acohido hosts a #CNAPP conversation with #Runecast, Data Theorem, Palo Alto Networks, and #Gartner.

    #CSPM #CWPP
    lastwatchdog.com/steps-forward

  20. 𝐃𝐚𝐭𝐚 𝐀𝐰𝐚𝐫𝐞 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐏𝐨𝐬𝐭𝐮𝐫𝐞 𝐢𝐧 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐃𝐞𝐟𝐞𝐧𝐝𝐞𝐫 𝐟𝐨𝐫 𝐂𝐥𝐨𝐮𝐝 𝐢𝐬 𝐧𝐨𝐰 𝐆𝐞𝐧𝐞𝐫𝐚𝐥𝐥𝐲 𝐀𝐯𝐚𝐢𝐥𝐚𝐛𝐥𝐞

    learn.microsoft.com/en-us/azur

    For more information, see Data-aware security posture in Microsoft Defender for Cloud: learn.microsoft.com/en-us/azur

    #microsoft #security #data #cloud #azure #cspm #defendercspm #defender #defenderforcloud #cnapp #aws #cgp #cloudnative #cloudsecurity #soc #purview #microsoftpurview #storage #defenderforstorage #cybersecurity

  21. 𝗛𝗼𝘄 𝘁𝗼 𝘀𝗲𝗰𝘂𝗿𝗲 𝗮 𝗙𝘂𝗻𝗰𝘁𝗶𝗼𝗻 𝗔𝗽𝗽?

    𝚂̲𝚎̲𝚌̲𝚞̲𝚛̲𝚎̲ ̲𝚘̲𝚙̲𝚎̲𝚛̲𝚊̲𝚝̲𝚒̲𝚘̲𝚗̲

    ➡️Defender for Cloud for assessment of potential configuration-related security vulnerabilities

    ➡️Log and monitor: diagnostic settings to configure streaming export of platform logs and metrics

    ➡️Require HTTPS

    ➡️Securing keys with Azure key Vault

    ➡️Enable App Service Authentication/Authorization

    ➡️Use Azure API Management (APIM) to authenticate requests

    ➡️Run your function app with the lowest possible permissions

    ➡️Store data encrypted

    𝚂̲𝚎̲𝚌̲𝚞̲𝚛̲𝚎̲ ̲𝚍̲𝚎̲𝚙̲𝚕̲𝚘̲𝚢̲𝚖̲𝚎̲𝚗̲𝚝̲

    ➡️Disable FTP

    ➡️Secure the scm endpoint

    𝙽̲𝚎̲𝚝̲𝚠̲𝚘̲𝚛̲𝚔̲ ̲𝚜̲𝚎̲𝚌̲𝚞̲𝚛̲𝚒̲𝚝̲𝚢̲

    ➡️Set access restrictions

    ➡️Secure the storage account

    ➡️Private site access with Azure Private Endpoint

    ➡️Deploy your function app in isolation configuring a Web Application Firewall (WAF) for App Service Environment.

    More details: learn.microsoft.com/en-us/azur

    #security #azure #cloud #data #management #streaming #functionapp #serverless #waf #appservice #privateendpoint #networksecurity #securedeployment #apim #ftp #keyvault #key #vulnerability #assessment #misconfiguration #encryption #storage #storageaccount #defender #defenderforcloud #cnapp #cspm #cwpp #microsoft #microsoftsecurity #cloudsecurity #cloudnative #siem #monitoring #soc

  22. 𝗛𝗼𝘄 𝘁𝗼 𝘀𝗲𝗰𝘂𝗿𝗲 𝗮 𝗙𝘂𝗻𝗰𝘁𝗶𝗼𝗻 𝗔𝗽𝗽?

    𝚂̲𝚎̲𝚌̲𝚞̲𝚛̲𝚎̲ ̲𝚘̲𝚙̲𝚎̲𝚛̲𝚊̲𝚝̲𝚒̲𝚘̲𝚗̲

    ➡️Defender for Cloud for assessment of potential configuration-related security vulnerabilities

    ➡️Log and monitor: diagnostic settings to configure streaming export of platform logs and metrics

    ➡️Require HTTPS

    ➡️Securing keys with Azure key Vault

    ➡️Enable App Service Authentication/Authorization

    ➡️Use Azure API Management (APIM) to authenticate requests

    ➡️Run your function app with the lowest possible permissions

    ➡️Store data encrypted

    𝚂̲𝚎̲𝚌̲𝚞̲𝚛̲𝚎̲ ̲𝚍̲𝚎̲𝚙̲𝚕̲𝚘̲𝚢̲𝚖̲𝚎̲𝚗̲𝚝̲

    ➡️Disable FTP

    ➡️Secure the scm endpoint

    𝙽̲𝚎̲𝚝̲𝚠̲𝚘̲𝚛̲𝚔̲ ̲𝚜̲𝚎̲𝚌̲𝚞̲𝚛̲𝚒̲𝚝̲𝚢̲

    ➡️Set access restrictions

    ➡️Secure the storage account

    ➡️Private site access with Azure Private Endpoint

    ➡️Deploy your function app in isolation configuring a Web Application Firewall (WAF) for App Service Environment.

    More details: learn.microsoft.com/en-us/azur

    #security #azure #cloud #data #management #streaming #functionapp #serverless #waf #appservice #privateendpoint #networksecurity #securedeployment #apim #ftp #keyvault #key #vulnerability #assessment #misconfiguration #encryption #storage #storageaccount #defender #defenderforcloud #cnapp #cspm #cwpp #microsoft #microsoftsecurity #cloudsecurity #cloudnative #siem #monitoring #soc

  23. What's new in Microsoft Defender for Cloud?

    Updates in May include:

    ➡️New alert in Defender for Key Vault

    ➡️Agentless scanning now supports encrypted disks in AWS

    ➡️Revised JIT (Just-In-Time) rule naming conventions in Defender for Cloud

    ➡️Onboard selected AWS regions

    ➡️Multiple changes to identity recommendations

    ➡️Deprecation of legacy standards in compliance dashboard

    ➡️Two Defender for DevOps recommendations now include Azure DevOps scan findings

    ➡️New default setting for Defender for Servers vulnerability assessment solution

    More details: learn.microsoft.com/en-us/azur

    #microsoft #azure #devops #cloud #aws #compliance #gcp #defender #defenderforcloud #cnapp #cspm #cwpp #soc #cloudsecurity #multicloud #securityplatform #microsoftsecurity

  24. I am very much looking forward to this discussion, as I typically take advantage of any opportunity that I have to talk with either of these guys, so having both together is a big treat. 😎 🎬 👏🏽

    #CNAPP #CSPM #CWPP #CloudSecurity

    runecast.com/register-now/how-