Check Point® Software Technologies Ltd. has been recognized as a Leader and Outperformer for its Harmony Email & Collaboration security solution in GigaOm’s latest Radar for Anti-Phishingreport.
For many, security is like an onion. Sure, it can bring tears to your eyes when implementing it. However, the real reason for this analogy is that security comprises many layers; the more you have, the greater your chances of preventing a breach. Within this context, securing your cloud infrastructure can be compared only to an enormous (and intimidating) onion — one that'll surely win prizes at the farmers' fair.
Rethinking Security by Taking a Step Back
Before diving headfirst into implementing your cloud security architecture, it's crucial to take a step back and understand the threats you face. This is where a process-driven approach, like threat modeling can help you take that step back and begin identifying potential security threats and vulnerabilities within a cloud environment, enabling you to put yourself in attackers’ shoes and ask:
■ What are my valuable assets in the cloud? (Data, applications, etc.)
■ How could someone try to compromise these assets? (Exploiting software vulnerabilities, social engineering, etc.)
■ What are the potential consequences of a successful attack? (Data breach, financial loss, reputational damage, etc.)
■ What can I do to mitigate these risks? (Implement strong access controls, encryption, intrusion detection systems, etc.)
Understand and Defend Your Attack Surface
Threat modeling can be a good starting point, but it shouldn't end with a stack-based security approach. Rather than focusing solely on the technologies, approach security by mapping parts of your infrastructure to equivalent security concepts. Here are some practical suggestions and areas to zoom in on for implementation.
Network Security
If you're on AWS, for example, your network starts at the VPC (Virtual Private Cloud). Traffic using security groups and network ACLs will allow for proper network control and help in micro-segmentation — dividing your network into segments and applying security controls to each segment.
Similarly, you can use a WAF (Web Application Firewall) to protect your web applications from common exploits like SQL injection and cross-site scripting (XSS).
Once you have these fundamentals covered, a good next step is embracing a zero-trust architecture, which is based on the principle of "never trust, always verify." No user, device, or piece of data is automatically trusted, regardless of whether they're inside your network.
Workload Protection
When protecting workloads in the cloud, consider using some variant of runtime security. Kubernetes users have no shortage of choice here with tools such as Falco, an open-source runtime security tool that monitors your applications and detects anomalous behaviors.
However, chances are your cloud provider has some form of dynamic threat detection for your workloads. For example, AWS offers Amazon GuardDuty, which continuously monitors your workloads for malicious activity and unauthorized behavior.
Inventory Management
Consider implementing a system for tracking software versions running across your entire stack. While this can be time-consuming, it will prevent the "are we vulnerable" debate at your next stakeholder meeting.
Use this inventory to determine which components need to be updated or patched based on known vulnerabilities. Regularly review and update your software to ensure you're running the most secure versions.
2MFA
Implementing two-factor authentication adds an extra layer of protection by requiring a second form of verification, such as an authenticator app or a passkey, in addition to your password. While reaching for your authenticator app every time you log in might seem slightly inconvenient, it's a far better outcome than dealing with the aftermath of a breached account. The minor inconvenience is a small price to pay for the added security it provides.
AI for Threat Detection
While the mention of AI in the context of cloud security might have you rolling your eyes due to the current hype surrounding the technology, there's a genuine use case for leveraging AI and ML to enhance threat detection. Traditional security systems, often relying on static rules and signatures, struggle to keep pace with the dynamic nature of cloud environments and the constantly evolving threat landscape.
By leveraging machine learning, security systems can analyze vast quantities of security data, including network traffic, user activity logs, and security events, to identify patterns and anomalies that may indicate malicious activity. Examples of AI/ML in action include:
■ Enhancing security information and event management (SIEM) platform accuracy by correlating events from various security sources.
■ AI-powered network traffic analysis (NTA) reveals more anomalies, such as malware communication, data exfiltration, and command-and-control activity.
■ User and entity behavior analytics (UEBA) utilize AI to establish baselines of normal user behavior and identify deviations that may indicate insider threats or compromised accounts.
Never Stop Moving
By rethinking your approach to security and first seeking to understand which areas of your infrastructure are most vulnerable, you can take a more proactive approach to building secure infrastructure.
Understanding your attack surface, implementing cloud-specific security measures, and managing your software inventory are all great tips to significantly enhance the security posture of your cloud infrastructure. However, this post wouldn't be complete without the ever-present reminder that security isn't a desired state but a journey.
Industry News
Aqua Security, the primary maintainer of Trivy, announced that Root has joined the Trivy Partner Connect program.
GitLab signed a three-year, strategic collaboration agreement (SCA) with Amazon Web Services (AWS).
The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, announced the schedule for KubeCon + CloudNativeCon North America 2025, taking place in Atlanta, Georgia, from November 10–13, 2025.
Google Cloud announced a complete toolkit to help developers build, deploy, and optimize A2A agents.
ArmorCode announced significant application security and remediation advancements to help customers address risks posed by AI-generated code and applications, along with imminent compliance demands from regulations including the Cyber Resilience Act (CRA).
Black Duck Software announced significant enhancements to its AI-powered application security assistant, Black Duck Assist™, which is now directly integrated into the company's Code Sight™ IDE plugin.
Check Point's CloudGuard WAF global footprint has expanded with 8 new points of presence (PoPs) in recent months.
Apiiro launched its AutoFix Agent: an AI Agent for AppSec that autofixes design and code risks using runtime context – tailored to your environment.
Snyk announced the immediate availability of Secure At Inception, which consists of three new innovations focused on Model Context Protocol (MCP) technology.
Backslash Security announced that its platform for securing AI coding infrastructure and code will be shown at the AI Pavilion (booth #4312) at Black Hat USA in Las Vegas, August 6-7.
Salt Security announced the launch of Salt Surface, a new capability integrated into its API Protection Platform.
Wallarm announced the launch of its next-gen Security Edge offering, delivering the benefits of edge-based API protection to more teams, in more environments, with more control.
DefectDojo announced new automated Known Exploited Vulnerabilities (KEV) data enrichment features for DefectDojo Pro.
Temporal Technologies is launching a new integration with the OpenAI Agents SDK: a provider-agnostic framework for building and running multi-agent LLM workflows.