Deny by Default, Allow by Exception In the original post we defined steps to implement a bullet-proof Cloud Infrastructure Security Posture. Today we will look into specifics of the Administrative Tasks aimed to protect your cloud infrastructure from the external threats. ❓ How would you approach the implementation of the following?– Block Unused Services, Resources,...
Cloud Security Series #2
Access Control In the previous post we defined steps to implement a bullet-proof Cloud Infrastructure Security Posture. Now it’s time to dive deep into every topic, and let’s start with 🔐 Access Control. ❓ How would you approach the implementation of the following controls?– Establish Centralized Infrastructure Access (User Directory, SSO);– Implement Role-Based / Permission-based...