IR readiness in the cloud
Adversaries are using every opportunity that they can find to "penetrate," infect, harm, and disrupt your networks, regardless of whether you are in a traditional IT environment, cloud environment, or hybrid. Threat actors are well aware that even after nearly 50 years of computers being used commonly, IT teams still make misconfiguration mistakes. Looking at the cloud, which is fairly new compared to traditional IT, threat actors know that critical data will be duplicated poorly, and be unprotected and unsupervised in cloud environments. Chapter 11, Incident Response in the Cloud, explored how you can address cybersecurity incidents in the cloud, but here are a few reminders in the context of incident readiness:
- Know the differences and common points between your cloud and traditional environments. Implement security measures to protect your cloud environments. Keep in mind that in the cloud, you'll need to focus more on applications...