SlideShare a Scribd company logo
2
Most read
6
Most read
1
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
Foundations of Cloud monitoring
When the winds of change blow, some people build walls
and others build windmills.
Chinese Proverb
Moshe Ferber
CCSK, CCSP, CCAK, ACSP
“
”
2
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
Foundations of Cloud
monitoring
Moshe Ferber
CCSK, CCSP, CCAK, ACSP
When the winds of change blow, some people build walls
and others build windmills.
Chinese Proverb
“
”
3
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
About myself
Cloud Security Course Schedule can be found at:
http://www.onlinecloudsec.com/course-schedule
Founder, partner and investor at various cyber initiatives and startups
Popular industry speaker & lecturer (DEFCON, RSA, BLACKHAT,
INFOSEC and more)
Co-hosting the Silverlining IL podcast – security engineering
Founding committee member for ISC2 CCSP , CSA CCSK, ISACA CCAK
certifications
Member of the board at Macshava Tova – Narrowing societal gaps
Chairman of the Board, Cloud Security Alliance, Israeli Chapter
Information security professional for over 20 years
4
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
01 Global, not-for-profit organization
02
Building security best practices for
next generation IT
03 Research and Educational Programs
04
Cloud providers & security
professionals Certifications
05 Awareness and Marketing
06
The globally authoritative source for
Trust in the Cloud
4
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
About the Cloud Security Alliance
To promote the use of best practices for providing
security assurance within Cloud Computing, and provide
education on the uses of Cloud Computing to help
secure all other forms of computing
“
”
CSA Israel:
Community of security professional promoting
responsible cloud adoption.
5
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
CSA relevant publications
6
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
Monitoring Tool set
CSPM Cloud Security
Posture
Management
• Protect management
dashboard
• Monitor for
Compliance breachs,
misconfiguration,
Identity permissions
CWPP - Cloud
Workload Protection
Platform
• Protect Workloads
(VM’s, Containers,
serverless
• Traditional end-point
security (AV, VA )
ASPM - Application
Security Posture
Management
• Orchestration the
SDLC process, from
development to
deployment and
testing
CIEM - Cloud
Identity &
entitlement
management
• Monitor Identity
information
• Identity is more then
humans - include
services, workloads
and more
DSPM – Data
Security Posture
management
• Govern and monitor
of data silos across
organizations
• Support multiple
services
SSPM / CASB– SaaS
security posture
management
• Evaluating SaaS
providers
• Focus on posture
and compliance
Cloud native application
protection platform (CNAPP)
IaaS/PaaS SaaS
7
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
CNAPP
CSPM Cloud Security Posture
Management
• Protect management dashboard
• Monitor for Compliance breaks,
misconfiguration, Identity
permissions
CWPP - Cloud Workload
Protection Platform
• Protect Workloads (VM’s,
Containers, serverless
• Traditional end-point security
(AV, VA )
• Should support new workloads
(K8’s, FaaS)
Cloud native application protection platform
(CNAPP)
Focus on IaaS/PaaS
All cloud providers got
internal solutions
A must have solution
Disclaimer: vendor names are just examples….
• Palo Alto
• Check Point
• Wiz
• ORCA
• AQUA
• Light spin
How compliant I am with IS27001? How compliant I am with IS27001?
Which Workload has critical
vulnerability ?
8
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
ASPM
Application Security Posture
Management
• Orchestration of the SDLC process, from development
to deployment & testing and ongoing operations
• Integrates with CI/CD , testing tools and workflow tools
for developers' friendly integration
Focus on IaaS/PaaS
Foundation for
devsecops
The newest solution
Disclaimer: vendor names are just examples….
• ENSO
• APIIRO
• CIDER
• OX Security
What are my most vulnerable
applications?
Which sensitive data is exposed?
What is the status of CI/CD security
testing ?
9
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
CIEM
Cloud Identity & entitlement
management
• Monitor Identity information
• Identity is more then humans - include services,
workloads and more
Oriented at multicloud
Considered to be a niche
Identity is most
challenging aspect in
cloud
Disclaimer: vendor names are just examples….
• Ermetic
• Solvo
• Authomize
• Britive
Which users don’t have MFA? Which user has over privileges? Which user has hidden privileges?
10
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
DSPM
Data Security Posture Management
• Govern and monitor of data silos across organizations
• From discovery & classification to realtime monitoring
• Support multiple cloud platforms
IaaS/PaaS/SaaS
Considered to be a niche
Has similar aspects to
CIEM
Disclaimer: vendor names are just examples….
• DIG
• Laminar
• Satori
• Polar security
Do I have public PII? Where are my sensitive files? Who can access project X files?
11
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
SSPM
SaaS Security Posture Management
• Detect misconfiguration , excessive permission,
compliance risks
• A mixture of posture + online monitoring
• Need to support multiple services
Focus on SaaS GRC
Mostly identity and
compliance
We used to call it CASB
Disclaimer: vendor names are just examples….
• Adaptive Shield
• GRIP
• Valence
• WING
• ATOMSEC
• DoControl
DO I have misconfigurations? Which 3rd party apps connected? Which SaaS application do we use?
12
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
Monitoring Tool set
Logs
Posture &
configuration
Identity
data
Threat
intelligence
Workloads vulnerabilities
Security
Center
13
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
Log sources
• Cover Dashboard API
activity & access
• Cover main admin tasks
Cloud MNGT Logs
• Network traffic )flow logs
format)
Traffic Logs
• Extracted just like
traditional OS
Instances Logs
• K8's logs
• DNS logs
• Object storage logs
Unique logs
14
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
Architecting for log management
Cloud
Trail
S3
SIEM
Agent
Cloud WATCH
(Rules & Alerts)
SNS
(notifications)
VPC Flow
Logs
OS Logs
15
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
Keep in touch
Cloud Security Course Schedule can be found at:
http://www.onlinecloudsec.com/course-schedule
Moshe Ferber
www.onlinecloudsec.com
@FerberMoshe
http://il.linkedin.com/in/MosheFerber
15
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
16
w
w
w
.
o
n
l
i
n
e
c
l
o
u
d
s
e
c
.
c
o
m
Questions?

More Related Content

PPTX
Identity and Access Management (IAM): Benefits and Best Practices 
PDF
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
PDF
AWS Organizations & Service Control Policy
PPT
Introduction To OWASP
PPTX
AWS PPT.pptx
PPTX
Azure key vault
PPTX
Zero trust deck 2020
Identity and Access Management (IAM): Benefits and Best Practices 
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
AWS Organizations & Service Control Policy
Introduction To OWASP
AWS PPT.pptx
Azure key vault
Zero trust deck 2020

What's hot (20)

PDF
NIST Zero Trust Explained
PPTX
Introduction to Amazon Web Services by i2k2 Networks
PPTX
Cloud Security Architecture.pptx
PDF
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
PDF
SOC Certification Runbook Template
PPTX
Identity & access management
PPTX
Cloud security and security architecture
PPTX
SCCM Intune Windows 10 Co Management Architecture Decisions
PPTX
Zero trust Architecture
PPT
Anton Chuvakin on Security Data Centralization
PPTX
Aws Architecture Training
PDF
What is Cloud Computing | Cloud Computing Tutorial | AWS Tutorial | AWS Train...
PDF
30분만에 만드는 AWS 기반 빅데이터 분석 애플리케이션::안효빈::AWS Summit Seoul 2018
PDF
Defence in Depth Architectural Decisions
PDF
AWS Aurora 100% 활용하기
PPTX
독특한회사 ZEPL 경험기
PPT
UC4 SCHEDULING
PPT
Cloud security
PDF
The OCTAVE Method
PPTX
Sei gradi di separazione
NIST Zero Trust Explained
Introduction to Amazon Web Services by i2k2 Networks
Cloud Security Architecture.pptx
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
SOC Certification Runbook Template
Identity & access management
Cloud security and security architecture
SCCM Intune Windows 10 Co Management Architecture Decisions
Zero trust Architecture
Anton Chuvakin on Security Data Centralization
Aws Architecture Training
What is Cloud Computing | Cloud Computing Tutorial | AWS Tutorial | AWS Train...
30분만에 만드는 AWS 기반 빅데이터 분석 애플리케이션::안효빈::AWS Summit Seoul 2018
Defence in Depth Architectural Decisions
AWS Aurora 100% 활용하기
독특한회사 ZEPL 경험기
UC4 SCHEDULING
Cloud security
The OCTAVE Method
Sei gradi di separazione
Ad

Similar to Foundations of cloud security monitoring (20)

PPTX
Cloud security for banks - the central bank of Israel regulations for cloud s...
PPTX
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
PDF
AWS Frederick Meetup 07192016
PDF
Security Essentials for Azure PaaS Lovers.pdf
PPTX
What the auditor need to know about cloud computing
PPTX
Cloud security for financial services
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
PDF
AWS Security Best Practices, SaaS and Compliance
PDF
Alfresco DevCon 2019: Encryption at-rest and in-transit
PPTX
CCSP Official Review Notes - 2019 version by Ben.pptx
PDF
IANS information security forum 2019 summary
PDF
Cloud security introduction
PPTX
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
PPTX
Transforming cloud security into an advantage
PPTX
Designing for Privacy in AWS cloud
PDF
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
PPTX
security and compliance in the cloud
PPTX
Multi cloud governance best practices - AWS, Azure, GCP
PDF
Notes_from_a_clouds_security_journey
PPTX
Chap 6 cloud security
Cloud security for banks - the central bank of Israel regulations for cloud s...
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
AWS Frederick Meetup 07192016
Security Essentials for Azure PaaS Lovers.pdf
What the auditor need to know about cloud computing
Cloud security for financial services
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
AWS Security Best Practices, SaaS and Compliance
Alfresco DevCon 2019: Encryption at-rest and in-transit
CCSP Official Review Notes - 2019 version by Ben.pptx
IANS information security forum 2019 summary
Cloud security introduction
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Transforming cloud security into an advantage
Designing for Privacy in AWS cloud
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
security and compliance in the cloud
Multi cloud governance best practices - AWS, Azure, GCP
Notes_from_a_clouds_security_journey
Chap 6 cloud security
Ad

More from Moshe Ferber (11)

PPTX
Cloud Security - the egregious 11 cloud security threats
PPTX
Understanding IaaS/PaaS attack vectors.pptx
PPTX
Cloud security certifications landscape
PPTX
Architect secure cloud services.
PPTX
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
PPTX
Surviving the lions den - how to sell SaaS services to security oriented cust...
PPTX
The Cloud & I, The CISO challenges with Cloud Computing
PPTX
Cloud security what to expect (introduction to cloud security)
PPTX
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
PPTX
Aligning Risk with Growth - Cloud Security for startups
PPTX
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud Security - the egregious 11 cloud security threats
Understanding IaaS/PaaS attack vectors.pptx
Cloud security certifications landscape
Architect secure cloud services.
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Surviving the lions den - how to sell SaaS services to security oriented cust...
The Cloud & I, The CISO challenges with Cloud Computing
Cloud security what to expect (introduction to cloud security)
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
Aligning Risk with Growth - Cloud Security for startups
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013

Recently uploaded (20)

PDF
medical staffing services at VALiNTRY
PPTX
Transform Your Business with a Software ERP System
PDF
AI in Product Development-omnex systems
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
L1 - Introduction to python Backend.pptx
PDF
top salesforce developer skills in 2025.pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
Online Work Permit System for Fast Permit Processing
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
DOCX
The Five Best AI Cover Tools in 2025.docx
PPT
JAVA ppt tutorial basics to learn java programming
PPTX
Operating system designcfffgfgggggggvggggggggg
medical staffing services at VALiNTRY
Transform Your Business with a Software ERP System
AI in Product Development-omnex systems
How to Migrate SBCGlobal Email to Yahoo Easily
Understanding Forklifts - TECH EHS Solution
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
L1 - Introduction to python Backend.pptx
top salesforce developer skills in 2025.pdf
Design an Analysis of Algorithms I-SECS-1021-03
ManageIQ - Sprint 268 Review - Slide Deck
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Online Work Permit System for Fast Permit Processing
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Internet Downloader Manager (IDM) Crack 6.42 Build 41
The Five Best AI Cover Tools in 2025.docx
JAVA ppt tutorial basics to learn java programming
Operating system designcfffgfgggggggvggggggggg

Foundations of cloud security monitoring

  • 1. 1 w w w . o n l i n e c l o u d s e c . c o m Foundations of Cloud monitoring When the winds of change blow, some people build walls and others build windmills. Chinese Proverb Moshe Ferber CCSK, CCSP, CCAK, ACSP “ ”
  • 2. 2 w w w . o n l i n e c l o u d s e c . c o m Foundations of Cloud monitoring Moshe Ferber CCSK, CCSP, CCAK, ACSP When the winds of change blow, some people build walls and others build windmills. Chinese Proverb “ ”
  • 3. 3 w w w . o n l i n e c l o u d s e c . c o m About myself Cloud Security Course Schedule can be found at: http://www.onlinecloudsec.com/course-schedule Founder, partner and investor at various cyber initiatives and startups Popular industry speaker & lecturer (DEFCON, RSA, BLACKHAT, INFOSEC and more) Co-hosting the Silverlining IL podcast – security engineering Founding committee member for ISC2 CCSP , CSA CCSK, ISACA CCAK certifications Member of the board at Macshava Tova – Narrowing societal gaps Chairman of the Board, Cloud Security Alliance, Israeli Chapter Information security professional for over 20 years
  • 4. 4 w w w . o n l i n e c l o u d s e c . c o m 01 Global, not-for-profit organization 02 Building security best practices for next generation IT 03 Research and Educational Programs 04 Cloud providers & security professionals Certifications 05 Awareness and Marketing 06 The globally authoritative source for Trust in the Cloud 4 w w w . o n l i n e c l o u d s e c . c o m About the Cloud Security Alliance To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing “ ” CSA Israel: Community of security professional promoting responsible cloud adoption.
  • 6. 6 w w w . o n l i n e c l o u d s e c . c o m Monitoring Tool set CSPM Cloud Security Posture Management • Protect management dashboard • Monitor for Compliance breachs, misconfiguration, Identity permissions CWPP - Cloud Workload Protection Platform • Protect Workloads (VM’s, Containers, serverless • Traditional end-point security (AV, VA ) ASPM - Application Security Posture Management • Orchestration the SDLC process, from development to deployment and testing CIEM - Cloud Identity & entitlement management • Monitor Identity information • Identity is more then humans - include services, workloads and more DSPM – Data Security Posture management • Govern and monitor of data silos across organizations • Support multiple services SSPM / CASB– SaaS security posture management • Evaluating SaaS providers • Focus on posture and compliance Cloud native application protection platform (CNAPP) IaaS/PaaS SaaS
  • 7. 7 w w w . o n l i n e c l o u d s e c . c o m CNAPP CSPM Cloud Security Posture Management • Protect management dashboard • Monitor for Compliance breaks, misconfiguration, Identity permissions CWPP - Cloud Workload Protection Platform • Protect Workloads (VM’s, Containers, serverless • Traditional end-point security (AV, VA ) • Should support new workloads (K8’s, FaaS) Cloud native application protection platform (CNAPP) Focus on IaaS/PaaS All cloud providers got internal solutions A must have solution Disclaimer: vendor names are just examples…. • Palo Alto • Check Point • Wiz • ORCA • AQUA • Light spin How compliant I am with IS27001? How compliant I am with IS27001? Which Workload has critical vulnerability ?
  • 8. 8 w w w . o n l i n e c l o u d s e c . c o m ASPM Application Security Posture Management • Orchestration of the SDLC process, from development to deployment & testing and ongoing operations • Integrates with CI/CD , testing tools and workflow tools for developers' friendly integration Focus on IaaS/PaaS Foundation for devsecops The newest solution Disclaimer: vendor names are just examples…. • ENSO • APIIRO • CIDER • OX Security What are my most vulnerable applications? Which sensitive data is exposed? What is the status of CI/CD security testing ?
  • 9. 9 w w w . o n l i n e c l o u d s e c . c o m CIEM Cloud Identity & entitlement management • Monitor Identity information • Identity is more then humans - include services, workloads and more Oriented at multicloud Considered to be a niche Identity is most challenging aspect in cloud Disclaimer: vendor names are just examples…. • Ermetic • Solvo • Authomize • Britive Which users don’t have MFA? Which user has over privileges? Which user has hidden privileges?
  • 10. 10 w w w . o n l i n e c l o u d s e c . c o m DSPM Data Security Posture Management • Govern and monitor of data silos across organizations • From discovery & classification to realtime monitoring • Support multiple cloud platforms IaaS/PaaS/SaaS Considered to be a niche Has similar aspects to CIEM Disclaimer: vendor names are just examples…. • DIG • Laminar • Satori • Polar security Do I have public PII? Where are my sensitive files? Who can access project X files?
  • 11. 11 w w w . o n l i n e c l o u d s e c . c o m SSPM SaaS Security Posture Management • Detect misconfiguration , excessive permission, compliance risks • A mixture of posture + online monitoring • Need to support multiple services Focus on SaaS GRC Mostly identity and compliance We used to call it CASB Disclaimer: vendor names are just examples…. • Adaptive Shield • GRIP • Valence • WING • ATOMSEC • DoControl DO I have misconfigurations? Which 3rd party apps connected? Which SaaS application do we use?
  • 12. 12 w w w . o n l i n e c l o u d s e c . c o m Monitoring Tool set Logs Posture & configuration Identity data Threat intelligence Workloads vulnerabilities Security Center
  • 13. 13 w w w . o n l i n e c l o u d s e c . c o m Log sources • Cover Dashboard API activity & access • Cover main admin tasks Cloud MNGT Logs • Network traffic )flow logs format) Traffic Logs • Extracted just like traditional OS Instances Logs • K8's logs • DNS logs • Object storage logs Unique logs
  • 14. 14 w w w . o n l i n e c l o u d s e c . c o m Architecting for log management Cloud Trail S3 SIEM Agent Cloud WATCH (Rules & Alerts) SNS (notifications) VPC Flow Logs OS Logs
  • 15. 15 w w w . o n l i n e c l o u d s e c . c o m Keep in touch Cloud Security Course Schedule can be found at: http://www.onlinecloudsec.com/course-schedule Moshe Ferber www.onlinecloudsec.com @FerberMoshe http://il.linkedin.com/in/MosheFerber 15 w w w . o n l i n e c l o u d s e c . c o m