Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Category: security

How Cloud impacts Application Security

February 17, 2021May 11, 2021 by admin

This article is intended for software development and IT teams who want to securely build and deploy applications in cloud computing environments, specifically PaaS and IaaS. Cloud computing mostly brings security benefits to applications, but as with most areas of cloud technology, it does require significant changes to existing practices, processes, and technologies that were…

Read More

How Cloud impacts Incident Response

February 11, 2021May 13, 2021 by admin

The Incident Response (IR) Lifecycle Preparation: “Establishing an incident response capability so that the organization is ready to respond to incidents.” Process to handle the incidents. Handler communications and facilities. Incident analysis hardware and software. Internal documentation (port lists, asset lists, network diagrams, current baselines of network traffic). Identifying training. Evaluating infrastructure by proactive scanning…

Read More

QuickGuide: Cloud Incident Response Recommendations

February 9, 2021May 13, 2021 by admin

SLAs and setting expectations around what the customer does versus what the provider does are the most important aspects of incident response for cloud-based resources. Clear communication of roles/responsibilities and practicing the response and hand-offs are critical. Cloud customers must set up proper communication paths with the provider that can be utilized in the event of an incident….

Read More

QuickGuide: Cloud Security Recommendations

February 5, 2021May 13, 2021 by admin

Know the infrastructure security of your provider or platform: In the shared security model, the provider (or whoever maintains the private cloud platform) has the burden of ensuring the underlying physical, abstraction, and orchestration layers of the cloud are secure. Review compliance certifications and attestations. Check industry-standard and industry-specific compliance certifications and attestations on a regular basis for having the…

Read More

Common Cloud Security Threats

January 22, 2021May 13, 2021 by admin

Cloud deployments, whether public, private, hybrid or community, are susceptible to all the traditional cybersecurity threats and more. Let’s look at the most common threats: Virtual machine attacks: Active VMs are vulnerable to all traditional attacks that can affect physical servers. Once a VM is compromised, it may be able to attack other VMs running…

Read More

“​Trust me, I am a CISO”

January 19, 2021May 13, 2021 by admin

As things around us rapidly unfold in the cybersecurity realm, many “experts” are sprouting out of the woodwork. How do we distinguish between the real deal and the phonies? Some questions to ask every “CISO” – How do you ensure security policies, procedures, baselines, standards, and guidelines are written to address the information security needs…

Read More

Weapons of Mass Disruption

January 3, 2021June 11, 2021 by admin

Moonlight Maze In 1996, in the infancy of the Internet, someone was rummaging through military, research, and university networks primarily in the United States, stealing sensitive information on a massive scale. Victims included the Pentagon, NASA, and the Department of Energy, to name a very limited few. The scale of the theft was literally monumental,…

Read More

Installing Kali Linux on OCI

November 14, 2020May 13, 2021 by admin

What is Kali Linux? Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali Linux contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company. Installing Kali…

Read More

Best Practices on OCI Part 3: Logging & Monitoring

October 22, 2020May 13, 2021 by admin

Here are some key recommendations for configuring logging and monitoring on Oracle Cloud Infrastructure – Ensure audit log retention period is set to 365 days – Log retention controls how long activity logs should be retained. Studies have shown that The Mean Time to Detect(MTTD) a cyber breach is anywhere from 30 days in some sectors to up…

Read More

Best Practices on OCI Part 1: IAM

October 22, 2020May 13, 2021 by admin

Here are some key recommendations for Identity and Access Management on Oracle Cloud Infrastructure – Ensure service level admins are created to manage resources of particular service -Creating service-level administrators helps in tightly controlling access to Oracle Cloud Infrastructure (OCI) services to implement the least-privileged security principle. Ensure permissions on all resources are given only to…

Read More
  • Previous
  • 1
  • …
  • 6
  • 7
  • 8
  • 9

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!