An overview of how to handle security of an application deployment - for the development team who is told to secure an application after they've shipped it.
Ingest customer data – lots of it - Analyze and Detect Security Vulnerabilities and Incidents - Security Operations Center expert analysis and guidance
data • Contains sensitive employee data such as PII • Contains production credentials • Outage would be customer impacting Moderate • Contains sensitive data such as: product source code, internal product and/or service research and/or development • Outage would impact internal business operations • No connectivity to accounts with a higher security risk classification Low • Contains no customer or sensitive data • Outage would not impact service delivery or internal business operations • No connectivity to accounts with a higher security risk classification
to date! - In Cloud deployments, you should not have special servers, so this should be very easy... Backup your data Metric & Log Storage and Auditing
much more powerful than before You can declaratively and precisely control what resources and operations an application can perform on a resource with security policies
container deployments, but typically offer reduced visibility into what application/container is being attacked New container-aware IDS systems can isolate attacks to specific containers