Aggregator
紧急Veeam更新:关键RCE CVE-2025-23121 (CVSS 9.9)和其他两个缺陷威胁备份服务器
OpenAI获得2亿美元国防部合同,开发用于国家安全的先进人工智能
英国数据法案承诺投入100亿英镑推动和创新
无文件 AsyncRAT 活动利用隐蔽的 PowerShell 有效载荷攻击德国用户
华硕Armoury Crate漏洞让攻击者获得Windows管理员特权
Critical Linux Flaws Discovered Allowing Root Access Exploits
美国加快2025年自动驾驶汽车豁免
Microsoft 365 to block file access via legacy auth protocols by default
谷歌将在印度扩大人工智能驱动的欺诈检测和安全运营
OpenAI为人工智能安全工具达成2亿美元的国防协议
'Stargazers' use fake Minecraft mods to steal player passwords
Building a Quantum-Safe Internet: The IETF's Plan for TLS
Stronger Cloud Security in Five: Accelerate Response in the Cloud
In this sixth installment of Tenable’s “Stronger Cloud Security in Five” blog series, we offer three recommendations that you can quickly roll out to help you expedite, prioritize and fine-tune how you detect and respond to cloud security issues.
The dynamic, distributed and fast-changing nature of cloud environments makes it imperative for organizations to have a streamlined and swift process for detecting and responding to cloud security issues.
Failure to promptly and effectively respond to cloud security findings can quickly lead to major breaches that threaten your organization’s sensitive data, business operations, regulatory compliance, and more.
As the “SANS 2024 Detection and Response Survey” shows, cloud detection and response is a priority for organizations. The report, based on a survey of almost 400 cybersecurity professionals – including incident response handlers, security analysts, security managers and security directors – found that:
- 53% of respondents planned to adopt more advanced cloud-native security tools.
- 52% were looking to integrate artificial intelligence and machine learning for enhanced threat detection and response.
- 71% planned to boost training for security teams on cloud-specific threats.
In this blog, we offer you three ways to accelerate your response in the cloud. Our recommendations are meant to get you started with a “quick win” that only takes minutes and that can serve as the foundation for implementing best practices with a broader scope.
Read on to get the details on these three tips:
- Sketch out owners for different categories of cloud security findings.
- Think about your most sensitive cloud resources and the types of security findings that – if they affected these resources – would merit a response.
- Set up notifications alerting the appropriate teams about these security findings via messaging tools or ticketing solutions.
A key for swiftly responding to cloud security issues is knowing who to go to — for particular assets — when in the heat of the moment.
For a quick win, think about the people who make up your security team and the roles they play in areas such as identity and access management (IAM); DevSecOps; governance, risk and compliance; and vulnerability management; and sketch these key owners out.
If you need to jog your memory, think through different ways your organization might best assign ownership, including:
- By specific cloud accounts or groups of accounts
- By specific types and categories of findings, such as IAM-related issues
- By assigning owners to clusters of resources that belong to a specific project
By documenting the teams that own specific categories of cloud security findings, you pave the way for decisive and quick responses to cloud security issues.
Handpick a couple of sensitive resources and their critical issuesHaving sketched out some of the ownership of security findings, you want to think about one or two of your most sensitive resources and identify which issues impacting them would warrant firing off an alert. The idea here is to set up one or two alerts for issues whose high severity would be obvious, such as suspicious changes to the permissions of an S3 bucket that holds data for your company's payment processing infrastructure. By thinking through this, you will be prioritizing the one or two issues that pose the greatest risk to your cloud environment’s “crown jewels.”
Once you have your rough list of sensitive resources, some critical issues you might be interested in would be:
- Changes being made to sensitive security groups
- Changes to the configuration of critical storage buckets
- Changes to access permissions from internal or external networks
By taking time to think through what your most critical cloud resources are, you will be on a path to proactively applying stronger safeguards and controls to them, thereby reducing the risk they’ll be breached.
Set up notifications via messaging tools or ticketing solutionsOnce you’ve sketched out the key responsibilities across your organization, as well as the critical resources and the critical issues impacting them, the final quick action you can take is to start setting up a few alerts around these connections.
You don’t need to set up every possible critical alert right now, but starting with one or two of the most critical alerts will give you good momentum to embark on a more comprehensive project later on. If possible, consider integrating your alerting system with a corporate messaging tool, like Slack or Microsoft Teams. This will offer you an effective way to make these notifications timely and actionable. If you have a bit more time, it’s very valuable to integrate this type of notification into your ticketing system or security information and event management (SIEM) system.
How Tenable can helpThere are different ways in which our Tenable Cloud Security cloud native application protection platform (CNAPP) can help you streamline and automate the three recommendations we’ve outlined in this blog for accelerating your response to cloud security findings.
First, Tenable Cloud Security allows you to assign custom properties and labels that can be applied to resources to add context for risk assessment. These have many uses, and many Tenable customers leverage this capability to tag different resources with their owners.
Tenable Cloud Security offers policy templates that provide a flexible way of defining exactly which resources you want to monitor, how, and for what.
And — of course — Tenable Cloud Security can tie all this together so you can quickly send notifications to resource owners about detected issues that are within their scope of responsibilities. Whichever way your team and your stakeholders work, Tenable Cloud Security can integrate your alerts there with the ability to send alerts and reports to recipients via Slack, Teams, email, Jira, ServiceNow, Datadog, Splunk, QRadar, Sumo Logic and Telegram, as well as to many others via webhooks.
Find out how you can take action to speed up and fine-tune your cloud detection and response, as well as your overall multi-cloud security in just five minutes.
Learn more:- "Stronger Cloud Security in Five: The Importance of Cloud Configuration Security"
- "Stronger Cloud Security in Five: How To Protect Your Cloud Workloads"
- "Stronger Cloud Security in Five: Securing Your Cloud Identities"
- “Stronger Cloud Security in Five: How DSPM Helps You Discover, Classify and Secure All Your Data Assets”
- “Stronger Cloud Security in Five: 3 Quick Ways to Improve Kubernetes Security in GCP”
Researchers Uncovered on How Russia Leverages Private Companies, Hacktivist to Strengthen Cyber Capabilities
A comprehensive new study reveals the sophisticated architecture behind Russia’s externalized cyber warfare strategy, exposing how the Kremlin systematically exploits private companies, hacktivist collectives, and cybercriminal groups to enhance its digital offensive capabilities while maintaining plausible deniability. The research demonstrates that Russia’s cyber outsourcing model emerged from the chaotic post-Soviet collapse of 1991, when institutional […]
The post Researchers Uncovered on How Russia Leverages Private Companies, Hacktivist to Strengthen Cyber Capabilities appeared first on Cyber Security News.