You, as the customer of the cloud service provider (CSP), are responsible for securing how you use cloud services, including properly configuring identity and access management (IAM), storage and compute settings, threat analysis and defense, and the security of the application and data processed and stored in the cloud.
Therefore, secure cloud configuration must be a dynamic and continuous process. At a base level, there is the configuration of the cloud infrastructure (e.g., blocking SSH ports, and IAM). Next, there is the configuration of the CSP security controls (e.g., enabling log monitoring and encryption). And, finally, SecOps teams must address changes to settings (e.g., detecting and acting on a threat actor turning off logging to cover their tracks).
With InsightCloudSec, all changes—no matter how they are implemented (via console, provisioning tools, or programmatically)—are detected through a two-tiered monitoring approach that includes API polling and event-driven harvesting for faster detection of changes and automation in real-time. This allows you to identify misconfigurations and resolve them with automated, real-time remediation.
With InsightCloudSec, you can accelerate innovation through the use of cloud and container services while minimizing the risk of misconfigurations.