Introduction to Cybersecurity in the Cloud

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour 13 minutes
Difficulty
Beginner
CEU/CPE
1
Video Transcription
00:05
>> Welcome to this short introductory session
00:05
to workload protection.
00:05
In this session, we'll take a high-level look at
00:05
the threat landscape concerning Cloud workloads.
00:05
We'll briefly lay out CloudGuards
00:05
advanced capabilities for protecting workloads.
00:05
By the end of this session,
00:05
you will be able to,
00:05
describe the Cloud workloads in
00:05
application security threat landscape,
00:05
and you'll be able to describe in general terms
00:05
how CloudGuard protects workloads in applications.
00:05
Where do we begin? As we know,
00:05
moving from an on-prem mindset and
00:05
implementation to the Cloud means
00:05
a shift from a monolithic approach where
00:05
services in applications are fully hosted on servers,
00:05
supplying all the resources needed to a dynamic,
00:05
decentralized approach comprised of
00:05
microservices which have the potential of
00:05
being scattered across multiple platforms,
00:05
environments, and resources.
00:05
Infrastructure elements that were static in
00:05
the corporate data center are now obstructed to
00:05
software in the Cloud and
00:05
their entire life cycle may only
00:05
be a matter of minutes or seconds,
00:05
what is known as ephemeral.
00:05
On top of this obstruction, decentralization,
00:05
and scattering of IT components,
00:05
the management of various components
00:05
becomes decentralized as well.
00:05
Instead of just one IT department to manage,
00:05
execute and monitor,
00:05
we have multiple cross-departmental teams who can deploy,
00:05
manage, and modify resources, services, or applications.
00:05
This evolution comes with a slew of
00:05
security challenges that are unique to Cloud deployments.
00:05
The more decentralized a system is,
00:05
the broader its attack surface.
00:05
There are simply more components,
00:05
assets, and mechanisms that may be exposed.
00:05
Additionally, deploying multiple Cloud accounts
00:05
created by different teams for different applications,
00:05
means that there are simply many more targets of
00:05
attack that might be compromised due to the human factor.
00:05
All it takes sometimes is
00:05
one misconfiguration of a resource
00:05
or an account and the road is paved for exploitation.
00:05
Since Cloud deployments may stretch over
00:05
a vast array of platforms and environments,
00:05
with multiple assets and multiple personnel
00:05
responsible for various aspects
00:05
of deployment and management,
00:05
this may lead to deficiency in visibility and tracking.
00:05
Invisible and unmanaged assets can
00:05
create large gaps in security enforcement.
00:05
Cloud assets are provisioned and decommissioned,
00:05
dynamically in large scale and in fast pace.
00:05
Traditional security tools were not
00:05
developed for the Cloud and thus
00:05
cannot enforce policies in such flexible environments.
00:05
The faster than ever pace of
00:05
the DevOps process around application deployment in
00:05
server provisioning increases the risk of
00:05
coding mistakes and exploit being
00:05
shared automatically in this work culture.
00:05
This rapid pace leaves little room for errors.
00:05
In multi-cloud deployments, applications
00:05
are deployed across multiple Cloud providers.
00:05
Vulnerabilities and mitigations
00:05
differ between Cloud providers.
00:05
It becomes a challenge to create
00:05
a consistent security policy across those deployments.
00:05
Finally, Cloud delivered
00:05
systems must be Cloud compliant.
00:05
That is, be in compliance with the industry standards,
00:05
regulations, and best practices.
Up Next