SlideShare a Scribd company logo
Cloud Security Controls Best
Practice
Advanced Guidance for AWS, Azure and GCP workloads
Sergio Loureiro
Feb 2020
Outpost24 at a glance
2
• Global HQ – Sweden
• Sales – BeNeLux, DACH,
Nordics, UK&I/France, US
• MSSP and Reseller partners
in additional locations
• Over 150 full time staff
Outpost24 experience in Cloud Security
• Founding Member of the Cloud Security Alliance (CSA) and co-author of
first guidelines for cloud security in 2009
• Founding Member of the CSA French chapter in 2012 and board member
in 2019
• Discovery of AWS first vulnerabilities and seminal paper in 2011
• First product in the AWS marketplace in 2012, AWS partner since 2012,
Azure Silver Partner
• 2 international patents on cloud security
3
Agenda
• Where to start when migrating to IaaS and PaaS?
• Why CWPP and CSPM are critical to cloud security?
• What are the fundamental controls security teams must address now?
• How to keep pace with new security tooling from cloud providers and finding
what works best for you?
• Where are cloud security controls heading and how to prepare for better
implementation and compliance?
4
5
Where to start when migrating to IaaS and PaaS?
• Through 2023, at least 99% of cloud
security failures will be the
customer’s fault.
Gartner 2019
Major Cloud Security Challenges
6
Credit: SANS Cloud adoption survey 2019
Cloud Maturity Adoption
7
Migration
Are you using cloud
services securely?
What is the risk?
Compliance
How to implement
best practices?
Show business
value
Multi-Cloud
How to manage
risk across different
providers?
Continuous
Continuous alerts
and continuous risk
assessment
Why CWPP and CSPM are critical to cloud security?
8
Image credit: Microsoft
CWPPCSPM
9
What are the fundamental controls security teams must
address now?
• Cloud Security Posture Management
• Cloud configuration Assessment
• Cloud Workload Protection Platform
• Vulnerability Management
• Application security
• Anti-virus, HIDS/HIPS, etc
CSPM and CWPP Now
• CIS AWS benchmark
• CIS Azure benchmark
• CIS GCP benchmark
Cloud Security Posture Management
- > Add Configuration Management
Cloud Workload Protection Platforms
-> Integrate controls
Start with Identify
• System Management
• Vulnerability Assessment
• Awareness Training
10
What checks? = What is in the CIS benchmarks?
CIS AWS
• 49 checks
• IAM, Logging, Monitoring, Networking
CIS Azure
• 97 checks
• IAM, Security Center, Storage Accounts, SQL Services, Logging and Monitoring,
Networking, Virtual Machines, Other
Examples of CSPM: CIS AWS and CIS Azure Controls
12
How to prioritize CSPM findings?
• No CVSS
• CIS benchmarks are marked scored/not scored
• Azure Security Center has its own scoring
• Without contextualization it’s hard to do
• Ideally, tags will indicate the most critical systems and user tags to help prioritize
results
What is missing? AWS, Azure and GCP advanced services
• More than 100 services on AWS, Azure and GCP
• Start with foundational services (example of AWS):
• Networking: SGs, VPCs, NACLs, CloudFront
• Instances: EC2
• Storage: S3, EBS
• IAM: rights and connection to AD
Workloads: Mapping Cloud Controls to NIST CSF
15
Source: SANS How to Optimize
Security Operations in the Cloud
Through the Lens of the NIST
Framework - Feb 2019
16
• Source: Gartner Market Guide to Cloud Workload Protection Platform 2017
CWPP
Guidance
Traditional Security is disrupted by Cloud
• Shared responsibility
• New layer of configuration (and misconfigurations)
• Elasticity and Agile
• Changing IPs for VMs
• License model
• Cloud Shadow IT
• New cloud services every week
• APIs for everything publicly accessible
18
More than 73% organizations are using
2 or more public cloud providers
• More attack surface
• Goal: Knowing the surface
• Harder to have visibility
• Goal: Single pane of glass
• Different services and tools
• Goal: Controls homogeneity
19
Plan for Multi-Cloud
Credit: SANS Cloud adoption survey 2019
Get full visibility on workloads and configuration
20
• For CWPP, extend existing tools
• Marketplace tools are available
• Check for deployment model (SaaS, agents, appliances)
• For CSPM, start with CIS benchmarks: AWS, Azure, GCP
• Do an assessment now!
21
How to keep pace with new security tooling from cloud
providers and finding what works best for you?
AWS
- Security Groups (firewall)
- Trusted Advisor (high level)
- Inspector (assessment)
- Key Management Service
- Identity and Access Management
- Macie (DLP)
- GuardDuty (threat detection)
- Shield (DoS)
- WAF (WAF)
Azure
- Azure Security Center
- Security Groups (firewall)
- Key Vault
- Endpoint Protection
- VM agent
- …
Compare and reduce lock-in risk
22
© 2018 Gartner, Inc.ID: 343562
Comparison of Cloud Console and Deployment
Security
GCP
Stackdriver Logging
(Cloud Security Command
Center in Alpha Stage)
AWS
AWS CloudWatch,
AWS CloudTrail
AWS Guard Duty
AWS Inspector
AWS Trusted Advisor
Azure
Azure Monitor, Azure
Operational Insights
Advanced Threat
Protection
Azure Advisor
Azure Security Center
Visibility Tools
Threat Protection
Security Assessment
Cloud Configuration
Assessment
Console and
Deployment Security
(Cloud Security
Command Center
in Alpha Stage)
CSP Access
Transparency
AWS Organizations
(Service Control
Policies)
Enterprise wide
Policiesand Constraints
(Access Transparency
in Beta Stage)
Azure Management
Groups
© 2018 Gartner, Inc.ID: 343562
Comparison of Instance Security
GCPAWS
AWS Inspector
AWS Systems
Manager
Azure
Azure Security Center
Microsoft Antimalware
for Azure
Update Management
(Part of Azure
Automation)
Vulnerability
Assessment
Endpoint Protection
Patch Management
Instance Security
Source: Gartner Comparing Security Controls and Paradigms in AWS, Google Cloud Platformand Microsoft Azure,
June 2018
Where are cloud security controls heading and how to
better prepare for implementation and compliance?
23
Follow the Workloads 24
Image credit: Gartner, Inc
• Business intelligence and data
analytics are great use cases for
Cloud adoption
25
Follow the Data
Credit: SANS Cloud adoption survey 2019
Extend to new cloud services – Off the beaten track
26
Goals:
• Keep up with the pace of innovation
• Be a business enabler while maintaining control
• Get your foundations right: IAM, Network, Application, Data Protection and Ops
Considerations:
• Not always possible to install agents, for example Serverless/FaaS
• Discover and implement best practices for every IaaS/PaaS service – today hundreds
• Sometimes no best practices available, providers tend to be slow with security
Key Takeaways
Handling Multi-
Cloud
Deployments
with a single
console
Migration of
Security
Controls to
Cloud
01
Achieving
compliance with
security
standards
02 03
Monitoring and
assessing risk in
continuous
mode
04
Use Cases and Requirements
28
Migration
Compliance
Multi-Cloud
Continuous
4 Steps Guidance
29
Check requirements for data and
workloads in the cloud
Extend existing workload
security to the cloud (CWPP)
Address cloud configuration
assessment (CSPM)
Handle Hybrid and prepare for
Multi-Cloud
TestProduction
30
Internal Network
Netsec
SWAT/MS
SUPPORT
Clone & Scan
Internal app
External app
Data Centre
Cloudsec
Appsec
Hacker-In-A-Box
+
Workload
Analytics
Cloud
On premise
Outpost24
Hybrid Cloud Security
Comprehensive Full-Stack Solution
31
Combines all 3 into one solution
Sergio Loureiro
Cloudsec Product Manager
sel@outpost24.com
+33 647 475 259
Thanks for listening! Q&A
33
1. Data Breaches
2. Misconfiguration and inadequate change
control
3. Lack of cloud security architecture and strategy
4. Insufficient identity, credential, access and key
management
5. Account hijacking
6. Insider threat
7. Insecure interfaces and APIs
8. Weak control plane
9. Metastructure and applistructure failures
10. Limited cloud usage visibility
11. Abuse and nefarious use of cloud services
Cloud Security is different

More Related Content

PPTX
Azure Security Center
PDF
CSA colorado 2016 presentation CloudPassage
PDF
HIPAA and HITRUST on AWS
PPTX
Shawn Harris - CCSP SAH v2
PDF
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
PDF
Cloud Governance & DevOps: Must-have Tools on Your Journey to Azure Cloud
PDF
How to Keep your Atlassian Cloud Secure
PPTX
Multi cloud governance best practices - AWS, Azure, GCP
Azure Security Center
CSA colorado 2016 presentation CloudPassage
HIPAA and HITRUST on AWS
Shawn Harris - CCSP SAH v2
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
Cloud Governance & DevOps: Must-have Tools on Your Journey to Azure Cloud
How to Keep your Atlassian Cloud Secure
Multi cloud governance best practices - AWS, Azure, GCP

What's hot (9)

PPTX
InterVision-Overview.January-2016
PDF
The Path to Broker Cloud Services
PPTX
Security and governance in the cloud
PPTX
The AWS Shared Security Responsibility Model in Practice
PPTX
Blue Chip Tek Connect and Protect Presentation #3
PDF
AWS Shared Security Model in Practice
PPTX
Improving Application Security With Azure
PPTX
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
PDF
Optimize Software, SaaS, and Cloud with Flexera and RightScale
InterVision-Overview.January-2016
The Path to Broker Cloud Services
Security and governance in the cloud
The AWS Shared Security Responsibility Model in Practice
Blue Chip Tek Connect and Protect Presentation #3
AWS Shared Security Model in Practice
Improving Application Security With Azure
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
Optimize Software, SaaS, and Cloud with Flexera and RightScale
Ad

Similar to Outpost24 Webinar - cloud security controls best practice (20)

PPTX
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
PDF
Outpost24 webinar - Busting the myths of cloud security
PPTX
Outpost24 webinar : how to secure your data in the cloud - 06-2018
PDF
The 3 Recommendations for Cloud Security
PDF
AWS Cloud Security
PPTX
093049ov4.pptx
PDF
Latest Developments in Cloud Security Standards and Privacy
PDF
Cloud Security Standards: What to Expect and What to Negotiate V2.0
PDF
Unified Protection for Multi-Cloud Infrastructure
PDF
8 Elements of Multi-Cloud Security
PDF
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
PPT
2011 Digital Summit - Not So Cloudy - Agcaoili
PPTX
CLOUD NATIVE SECURITY
PPTX
CSPM UNIT 4 HPS PRESENTATION FOR REFERENCE
PDF
Resetting Your Security Thinking for the Public Cloud
PDF
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
PDF
Security in the cloud
PDF
Security & Compliance in the Cloud [2019]
PDF
Security Teams & Tech In A Cloud World
PDF
Cloud Security Challenges, Types, and Best Practises.pdf
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar : how to secure your data in the cloud - 06-2018
The 3 Recommendations for Cloud Security
AWS Cloud Security
093049ov4.pptx
Latest Developments in Cloud Security Standards and Privacy
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Unified Protection for Multi-Cloud Infrastructure
8 Elements of Multi-Cloud Security
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
2011 Digital Summit - Not So Cloudy - Agcaoili
CLOUD NATIVE SECURITY
CSPM UNIT 4 HPS PRESENTATION FOR REFERENCE
Resetting Your Security Thinking for the Public Cloud
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Security in the cloud
Security & Compliance in the Cloud [2019]
Security Teams & Tech In A Cloud World
Cloud Security Challenges, Types, and Best Practises.pdf
Ad

More from Outpost24 (20)

PPTX
Outpost24 webinar - A fresh look into the underground card shop ecosystem
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
PPTX
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
PPTX
Outpost24 Webinar - Five steps to build a killer Application Security Program
PPTX
Outpost24 webinar - How to protect your organization from credential theft
PPTX
Outpost24 webinar : Beating hackers at their own game 2022 predictions
PPTX
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
PDF
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
PPTX
Outpost24 webinar: best practice for external attack surface management
PPTX
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
PPTX
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
PDF
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
PPTX
Outpost24 webinar - Api security
PDF
Outpost24 Webinar - CISO conversation behind the cyber security technology
PDF
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
PDF
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
PPTX
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
PPTX
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
PPTX
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
PPTX
Outpost24 webinar mastering container security in modern day dev ops
Outpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 Webinar - Five steps to build a killer Application Security Program
Outpost24 webinar - How to protect your organization from credential theft
Outpost24 webinar : Beating hackers at their own game 2022 predictions
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24 webinar: best practice for external attack surface management
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24 webinar - Api security
Outpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar mastering container security in modern day dev ops

Recently uploaded (20)

PDF
top salesforce developer skills in 2025.pdf
PPTX
Transform Your Business with a Software ERP System
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Online Work Permit System for Fast Permit Processing
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Materi_Pemrograman_Komputer-Looping.pptx
PPT
JAVA ppt tutorial basics to learn java programming
PDF
System and Network Administraation Chapter 3
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
DOCX
The Five Best AI Cover Tools in 2025.docx
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
top salesforce developer skills in 2025.pdf
Transform Your Business with a Software ERP System
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Online Work Permit System for Fast Permit Processing
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
2025 Textile ERP Trends: SAP, Odoo & Oracle
Materi_Pemrograman_Komputer-Looping.pptx
JAVA ppt tutorial basics to learn java programming
System and Network Administraation Chapter 3
How to Choose the Right IT Partner for Your Business in Malaysia
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
ManageIQ - Sprint 268 Review - Slide Deck
VVF-Customer-Presentation2025-Ver1.9.pptx
The Five Best AI Cover Tools in 2025.docx
ISO 45001 Occupational Health and Safety Management System
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
How Creative Agencies Leverage Project Management Software.pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Which alternative to Crystal Reports is best for small or large businesses.pdf

Outpost24 Webinar - cloud security controls best practice

  • 1. Cloud Security Controls Best Practice Advanced Guidance for AWS, Azure and GCP workloads Sergio Loureiro Feb 2020
  • 2. Outpost24 at a glance 2 • Global HQ – Sweden • Sales – BeNeLux, DACH, Nordics, UK&I/France, US • MSSP and Reseller partners in additional locations • Over 150 full time staff
  • 3. Outpost24 experience in Cloud Security • Founding Member of the Cloud Security Alliance (CSA) and co-author of first guidelines for cloud security in 2009 • Founding Member of the CSA French chapter in 2012 and board member in 2019 • Discovery of AWS first vulnerabilities and seminal paper in 2011 • First product in the AWS marketplace in 2012, AWS partner since 2012, Azure Silver Partner • 2 international patents on cloud security 3
  • 4. Agenda • Where to start when migrating to IaaS and PaaS? • Why CWPP and CSPM are critical to cloud security? • What are the fundamental controls security teams must address now? • How to keep pace with new security tooling from cloud providers and finding what works best for you? • Where are cloud security controls heading and how to prepare for better implementation and compliance? 4
  • 5. 5 Where to start when migrating to IaaS and PaaS? • Through 2023, at least 99% of cloud security failures will be the customer’s fault. Gartner 2019
  • 6. Major Cloud Security Challenges 6 Credit: SANS Cloud adoption survey 2019
  • 7. Cloud Maturity Adoption 7 Migration Are you using cloud services securely? What is the risk? Compliance How to implement best practices? Show business value Multi-Cloud How to manage risk across different providers? Continuous Continuous alerts and continuous risk assessment
  • 8. Why CWPP and CSPM are critical to cloud security? 8 Image credit: Microsoft CWPPCSPM
  • 9. 9 What are the fundamental controls security teams must address now? • Cloud Security Posture Management • Cloud configuration Assessment • Cloud Workload Protection Platform • Vulnerability Management • Application security • Anti-virus, HIDS/HIPS, etc
  • 10. CSPM and CWPP Now • CIS AWS benchmark • CIS Azure benchmark • CIS GCP benchmark Cloud Security Posture Management - > Add Configuration Management Cloud Workload Protection Platforms -> Integrate controls Start with Identify • System Management • Vulnerability Assessment • Awareness Training 10
  • 11. What checks? = What is in the CIS benchmarks? CIS AWS • 49 checks • IAM, Logging, Monitoring, Networking CIS Azure • 97 checks • IAM, Security Center, Storage Accounts, SQL Services, Logging and Monitoring, Networking, Virtual Machines, Other
  • 12. Examples of CSPM: CIS AWS and CIS Azure Controls 12
  • 13. How to prioritize CSPM findings? • No CVSS • CIS benchmarks are marked scored/not scored • Azure Security Center has its own scoring • Without contextualization it’s hard to do • Ideally, tags will indicate the most critical systems and user tags to help prioritize results
  • 14. What is missing? AWS, Azure and GCP advanced services • More than 100 services on AWS, Azure and GCP • Start with foundational services (example of AWS): • Networking: SGs, VPCs, NACLs, CloudFront • Instances: EC2 • Storage: S3, EBS • IAM: rights and connection to AD
  • 15. Workloads: Mapping Cloud Controls to NIST CSF 15 Source: SANS How to Optimize Security Operations in the Cloud Through the Lens of the NIST Framework - Feb 2019
  • 16. 16 • Source: Gartner Market Guide to Cloud Workload Protection Platform 2017 CWPP
  • 18. Traditional Security is disrupted by Cloud • Shared responsibility • New layer of configuration (and misconfigurations) • Elasticity and Agile • Changing IPs for VMs • License model • Cloud Shadow IT • New cloud services every week • APIs for everything publicly accessible 18
  • 19. More than 73% organizations are using 2 or more public cloud providers • More attack surface • Goal: Knowing the surface • Harder to have visibility • Goal: Single pane of glass • Different services and tools • Goal: Controls homogeneity 19 Plan for Multi-Cloud Credit: SANS Cloud adoption survey 2019
  • 20. Get full visibility on workloads and configuration 20 • For CWPP, extend existing tools • Marketplace tools are available • Check for deployment model (SaaS, agents, appliances) • For CSPM, start with CIS benchmarks: AWS, Azure, GCP • Do an assessment now!
  • 21. 21 How to keep pace with new security tooling from cloud providers and finding what works best for you? AWS - Security Groups (firewall) - Trusted Advisor (high level) - Inspector (assessment) - Key Management Service - Identity and Access Management - Macie (DLP) - GuardDuty (threat detection) - Shield (DoS) - WAF (WAF) Azure - Azure Security Center - Security Groups (firewall) - Key Vault - Endpoint Protection - VM agent - …
  • 22. Compare and reduce lock-in risk 22 © 2018 Gartner, Inc.ID: 343562 Comparison of Cloud Console and Deployment Security GCP Stackdriver Logging (Cloud Security Command Center in Alpha Stage) AWS AWS CloudWatch, AWS CloudTrail AWS Guard Duty AWS Inspector AWS Trusted Advisor Azure Azure Monitor, Azure Operational Insights Advanced Threat Protection Azure Advisor Azure Security Center Visibility Tools Threat Protection Security Assessment Cloud Configuration Assessment Console and Deployment Security (Cloud Security Command Center in Alpha Stage) CSP Access Transparency AWS Organizations (Service Control Policies) Enterprise wide Policiesand Constraints (Access Transparency in Beta Stage) Azure Management Groups © 2018 Gartner, Inc.ID: 343562 Comparison of Instance Security GCPAWS AWS Inspector AWS Systems Manager Azure Azure Security Center Microsoft Antimalware for Azure Update Management (Part of Azure Automation) Vulnerability Assessment Endpoint Protection Patch Management Instance Security Source: Gartner Comparing Security Controls and Paradigms in AWS, Google Cloud Platformand Microsoft Azure, June 2018
  • 23. Where are cloud security controls heading and how to better prepare for implementation and compliance? 23
  • 24. Follow the Workloads 24 Image credit: Gartner, Inc
  • 25. • Business intelligence and data analytics are great use cases for Cloud adoption 25 Follow the Data Credit: SANS Cloud adoption survey 2019
  • 26. Extend to new cloud services – Off the beaten track 26 Goals: • Keep up with the pace of innovation • Be a business enabler while maintaining control • Get your foundations right: IAM, Network, Application, Data Protection and Ops Considerations: • Not always possible to install agents, for example Serverless/FaaS • Discover and implement best practices for every IaaS/PaaS service – today hundreds • Sometimes no best practices available, providers tend to be slow with security
  • 28. Handling Multi- Cloud Deployments with a single console Migration of Security Controls to Cloud 01 Achieving compliance with security standards 02 03 Monitoring and assessing risk in continuous mode 04 Use Cases and Requirements 28 Migration Compliance Multi-Cloud Continuous
  • 29. 4 Steps Guidance 29 Check requirements for data and workloads in the cloud Extend existing workload security to the cloud (CWPP) Address cloud configuration assessment (CSPM) Handle Hybrid and prepare for Multi-Cloud
  • 30. TestProduction 30 Internal Network Netsec SWAT/MS SUPPORT Clone & Scan Internal app External app Data Centre Cloudsec Appsec Hacker-In-A-Box + Workload Analytics Cloud On premise Outpost24 Hybrid Cloud Security
  • 32. Sergio Loureiro Cloudsec Product Manager sel@outpost24.com +33 647 475 259 Thanks for listening! Q&A
  • 33. 33 1. Data Breaches 2. Misconfiguration and inadequate change control 3. Lack of cloud security architecture and strategy 4. Insufficient identity, credential, access and key management 5. Account hijacking 6. Insider threat 7. Insecure interfaces and APIs 8. Weak control plane 9. Metastructure and applistructure failures 10. Limited cloud usage visibility 11. Abuse and nefarious use of cloud services Cloud Security is different