CloudGuard Workload Protection

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour 13 minutes
Difficulty
Beginner
CEU/CPE
1
Video Transcription
00:01
>> CloudGuard Workload Protection, which is part
00:01
of the CloudGuard Native Security Platform,
00:01
provides a unified view of container assets across
00:01
all Cloud environments to ensure configurations
00:01
are in compliance with known baselines such as CIS,
00:01
Kubernetes security benchmarks, or NIST 800-190.
00:01
In addition, security and
00:01
compliance configurations can be built
00:01
into CI/CD to automate
00:01
container security during development.
00:01
During runtime, CloudGuard protects the container assets
00:01
using dynamic protection based on customized rules,
00:01
behavioral analysis,
00:01
as well as other threat intelligence modules,
00:01
automating protection and remediation.
00:01
CloudGuard's breakthrough code-centric platform
00:01
automate security and
00:01
visibility for Cloud native serverless applications
00:01
from development to runtime,
00:01
enabling organizations to securely
00:01
innovate at Cloud speed.
00:01
By analyzing the serverless application code
00:01
before and after deployment,
00:01
organizations can achieve
00:01
a continuous serverless security posture,
00:01
automating application hardening, minimizing
00:01
the attack surface, and simplifying governance.
00:01
Utilizing machine-based analysis
00:01
and deep learning algorithms,
00:01
CloudGuard builds a model of
00:01
normal application and function behavior to
00:01
detect and block application layer attacks
00:01
for enhanced serverless security.
00:01
Up to this point, we've covered
00:01
the security threats Cloud workloads face,
00:01
and how CloudGuard can help protect against them.
00:01
But what about the applications themselves?
00:01
What about the APIs use to
00:01
interact with Cloud resources and services?
00:01
How do we protect these elements?
00:01
First, let's take a moment and talk
00:01
about the threats we face in these areas.
00:01
Web applications face a broad range of
00:01
possible attacks described in the OWASP Top 10 standard.
00:01
The decentralized nature of Cloud implementations,
00:01
and the speed and scale of working in the Cloud,
00:01
means apps are prime targets
00:01
for various malign activities,
00:01
from code injection,
00:01
to broken access control,
00:01
coupled with a lack of sufficient logging and monitoring.
00:01
These attacks can result in site defacing,
00:01
information leakage, digital theft,
00:01
and user session hijacking.
00:01
In the realm of APIs,
00:01
command injections and the API key extraction can lead to
00:01
exposure of sensitive data
00:01
and the hijacking of resources.
00:01
Furthermore, malicious bot attacks using
00:01
automated web requests can be used to manipulate,
00:01
defraud, or disrupt a website application,
00:01
API, and even end users.
00:01
Traditionally, you would use a legacy Web Application
00:01
Firewall to defend against these attacks.
00:01
These WAFs are rule-based and use
00:01
binary rules to match
00:01
requests to attack signature databases.
00:01
This creates enormous administrative overhead
00:01
and blocks legitimate application users,
00:01
or as we like to call it, false positives.
00:01
Faced with these threats and
00:01
the gap left by legacy WAFs,
00:01
CloudGuard AppSec can stop
00:01
OWASP Top 10 attacks, prevent bot attacks,
00:01
and stop any malicious interaction with
00:01
applications and APIs across any environment.
00:01
CloudGuard AppSec is fully
00:01
automated and leverages contextual AI
00:01
analysis to provide precise threat prevention
00:01
from modern web applications,
00:01
lessening the need for ongoing administration,
00:01
and increasing applications security at scale.
00:01
Gone are the days where rules had to be
00:01
tuned manually with exceptions
00:01
every time an update to
00:01
the web application or API was necessary.
00:01
From implementation through runtime,
00:01
CloudGuard AppSec automatically analyzes
00:01
every user transaction and
00:01
URL to create a risk score to
00:01
stop attacks without creating false positives.
00:01
There you have it. We've gone
00:01
through the major security challenges
00:01
we are faced when implementing
00:01
Cloud services in applications,
00:01
and the specific threats targeting Cloud workloads,
00:01
applications, and APIs.
00:01
We introduced CloudGuard's solutions to
00:01
these complex, ever-evolving challenges.
00:01
In our next session, we will start drilling
00:01
down into CloudGuard's workload protection,
00:01
and see how we can perform a deployment.
00:01
We will start with protecting containers.
00:01
Thank you for taking this introductory session.
00:01
I hope you enjoyed it,
00:01
>> and I'll see you in our next one.
00:01
>> [MUSIC]
Up Next