Cloud computing deeply affects governance because the new cloud-based world is a fast-paced and emerging business model and technologies that require new types of controls and processes.
I share the five security pillars that every AWS cloud deployment should consider and ultimately implement within each layer of your application/system deployment.
In this article today, I provide you with a checklist that you can use to make sure you have processes and programs in place for properly securing your workloads in the cloud.
In a brand new series of articles, I walk you through how to build a web-based phonebook application on AWS to help illustrate the basics of cloud computing.
You should look at each of your AWS workloads and run them through this basic security principles checklist to ensure you are not missing the obvious.
The “how” of security has dramatically changed with cloud computing, but the underlying strategies still remain very similar. There are many new opportunities to adopt the power and benefits of the cloud within our security strategies and programs.
Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It assesses applications for vulnerabilities or deviations from best practices developed by AWS. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity that can and should be reviewed by qualified information security professionals.
In this article, I share the type of security functions that should exist with a Secure Software Development Life Cycle (SSDLC) process in any organization that is developing and deploying applications in the cloud.
Security is one of the most important aspects of any application, and in the age of cloud computing, it is arguably the most important because if the application isn’t secure, the application may lead to an undesirable and damaging cybersecurity incident.
The public cloud computing model and services has completely changed how we secure our systems and applications. There are several benefits as well as some new challenges.