Today, this perspective is just as relevant in the cloud. These networks typically lack appropriate security measures such as an intrusion detection/prevention system (IDS/IPS) solution, and the increased visibility from a complimentary security information and event management (SIEM) or a similar system logging protocol (SYSLOG) monitoring solution. A common scenario that network engineers and security professionals are taught to avoid are networks with some degree of edge security such as strong firewalls and ACLs, but poor to non-existent internal visibility and enforcement often resulting in an increased risk for lateral attacks and movement.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |