Untangling the Web of Cloud Security Threats

Changing technologies and evolving threats make IT security more challenging. Business units are adopting cloud technologies, agile development practices, and application architectures. But cyber criminals are also moving to attack cloud infrastructures, as we’ve seen in our telemetry and in recently reported attacks.

With the right policies and governance implementations, however, cloud-based data and systems can be secured effectively.

Cloud environments are typically built on the shared-responsibility model: The service provider, e.g., Amazon Web Services, is responsible for securing the used infrastructure, while the customer secures parts that are built on top of the cloud. These parts include application components, workloads, or virtual machine instances.

This means that IT staff and developers working on building a secure cloud implementation also have to safeguard their own portion of the system using tools and best practices from their service provider.

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Resource Details

Trend Micro logo
Provided by:
Trend Micro
Topic:
Cloud
Format:
PDF