Infrastructure Protection

Cloud providers typically provide some tools for infrastructure protection, such as:
Log management
Anti-malware updates
Host-based intrusion detection
System integrity monitoring
Network segmentation (firewalls and antivirus)

To get a holistic view of your network from physical layer to application layer, you can use a network traffic analyzer, which bundles together:
Log centralization
Configuration monitoring
Network traffic analysis
System file integrity
Process canning
Anti-phishing software

In this case, the database was hosted on an Amazon server, but the problem of misconfiguration is not limited to the public cloud. Indeed, in the public cloud there is less chance of screwing up because you have access to fewer configurations, while in a private cloud, you need to configure everything yourself, including setting up your firewalls, controlling encryption of sensitive data and deciding when to require multi-factor authentication.

Even a single misconfiguration, whether in the private or in public cloud, can be devastating, as the example above clearly illustrates. To mitigate your risk, be sure to:
Establish baseline configurations.
Regularly audit your configurations and correct any drift from your baseline.
Enable continuous change monitoring so you can detect and revert suspicious changes before they lead to a breach.
Ensure you can investigate each change quickly and thoroughly. Be sure you will know exactly which settings were modified, who made the change, and when and where it happened.


More Info: comptia a + jobs

Comments

Popular posts from this blog

Tech Industry Takes the Lead in Redefining Work

CompTIA A+ 220-1001 and A+ 220-1002 exam

Questions a+ certification