Cloud Security

Explore top LinkedIn content from expert professionals.

  • View profile for Sean Connelly🦉
    Sean Connelly🦉 Sean Connelly🦉 is an Influencer

    Zscaler | Former CISA Zero Trust Director & TIC Program Manager | Co-author, NIST SP 800-207 | Co-author, CISA Zero Trust Maturity Model

    22,379 followers

    🚨CISA & NSA release Crucial Guide on Network Segmentation and Encryption in Cloud Environments🚨 In response to the evolving requirements of cloud security, the Cybersecurity & Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently released a comprehensive Cybersecurity Information Sheet (CSI): "Implement Network Segmentation and Encryption in Cloud Environments." This document provides detailed recommendations to enhance the security posture of organizations operating within cloud infrastructures (that probably means you). Key Takeaways Include: 🔐 Network Encryption: The document underscores the importance of encrypting data in transit as a defense mechanism against unauthorized data access. 🌐 Secure Client Connections: Establishing secure connections to cloud services is fundamental. 🔎 Caution on Traffic Mirroring: While recognizing the benefits of traffic mirroring for network analysis and threat detection, the guidance cautions against potential misuse that could lead to data exfiltration and advises careful monitoring of this feature. 🛡️ Network Segmentation: Stressed as a foundational security principle, network segmentation is recommended to isolate and contain malicious activities, thereby reducing the impact of any breach. This collaboration between NSA and CISA provides actionable recommendations for organizations to strengthen their cloud security practices. The emphasis is on strategically implementing network segmentation and end-to-end encryption to secure cloud environments effectively. Information security leaders are encouraged to review this guidance to understand better the measures necessary to protect cloud-based assets. Implementing these recommendations will contribute to a more secure, resilient, and compliant cloud infrastructure. Access the complete guidance provided by the NSA and CISA to fully understand these recommendations and their application to your organization’s cloud security strategy. 📚 Read CISA & NSA's complete guidance here: https://lnkd.in/eeVXqMSv #cloudcomputing #technology #informationsecurity #innovation #cybersecurity

  • View profile for Yew Jin Kang

    Banking Chief Technology Officer | IDG/Foundry CIO100 | Solution Architect | Cloud | Artificial Intelligence Enthusiast | Comics Collector | Toy Photography

    11,613 followers

    This EY incident underscores a truth we often overlook: the most common cloud vulnerability isn't a zero-day exploit; it's a configuration oversight. A single misstep in cloud storage permissions turned a database backup into a public-facing risk. These files often hold the "keys to the kingdom" ie. credentials, API keys, and tokens that can lead to a much wider breach. How do we protect ourselves against these costly mistakes? Suggestions 1. Continuous Monitoring: Implement a CSPM for 24/7 configuration scanning. CSPM is Cloud Security Posture Management -> a type of automated security tool that continuously monitors cloud environments for misconfigurations, vulnerabilities, and compliance violations. It provides visibility, threat detection, and remediation workflows across multi-cloud and hybrid cloud setups, including SaaS, PaaS, and IaaS services 2. Least Privilege Access: Default to private. Grant access sparingly. 3. Data Encryption: For data at rest and in transit. 4. Automated Alerts: The moment something becomes public, you should know. 5. Regular Audits: Regularly review access controls and rotate secrets.

  • View profile for Shounak Das

    GreyMatter Specialist at ReliaQuest | Security Engineering, Incident Response, Detection Optimization | Splunk, Google SecOps, QRadar, Crowdstrike, Sentinel, Exabeam

    2,129 followers

    I recently built a cloud-based SOC lab at home using Microsoft Azure and Sentinel. The goal was to simulate a real-world environment to monitor brute-force attacks in real time. I deployed a Windows VM, deliberately exposed it to the internet, and configured Sentinel to ingest and analyze security events. Using KQL (Kusto Query Language), I filtered failed login attempts and linked source IPs to geolocation data via a watchlist. The result: a live, map-based visualization of attack sources from around the world. This was a hands-on way to better understand log analytics, threat detection, and how SIEM tools operate in practice. 🔗 https://lnkd.in/gGjGzpad Inspired by Josh Madakor's tutorial 👏 #Azure #MicrosoftSentinel #SOC #SIEM #KQL #Cybersecurity

  • View profile for Brij kishore Pandey
    Brij kishore Pandey Brij kishore Pandey is an Influencer

    AI Architect | AI Engineer | Generative AI | Agentic AI

    710,149 followers

    𝟮𝟬 𝗧𝗼𝗽 𝗔𝗣𝗜 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗧𝗶𝗽𝘀 1. 𝗜𝗺𝗽𝗹𝗲𝗺𝗲𝗻𝘁 𝗦𝘁𝗿𝗼𝗻𝗴 𝗔𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗮𝗻𝗱 𝗔𝘂𝘁𝗵𝗼𝗿𝗶𝘇𝗮𝘁𝗶𝗼𝗻: Make sure only authorized users can access your APIs. Use strong authentication methods, such as OAuth or OpenID Connect, and grant users the least privilege necessary to perform their tasks. 2. 𝗨𝘀𝗲 𝗛𝗧𝗧𝗣𝗦 𝗘𝗻𝗰𝗿𝘆𝗽𝘁𝗶𝗼𝗻: Encrypt all traffic between your APIs and clients to protect sensitive data from being intercepted by attackers. 3. 𝗟𝗶𝗺𝗶𝘁 𝗗𝗮𝘁𝗮 𝗦𝗵𝗮𝗿𝗶𝗻𝗴: APIs should only expose the data that clients need to function. Avoid exposing sensitive data, such as personally identifiable information (PII). 4. 𝗦𝘁𝗼𝗿𝗲 𝗣𝗮𝘀𝘀𝘄𝗼𝗿𝗱𝘀 𝗦𝗲𝗰𝘂𝗿𝗲𝗹𝘆: Hash passwords before storing them in a database. This will help to prevent attackers from stealing passwords if they breach your database. 5. 𝗨𝘀𝗲 𝘁𝗵𝗲 '𝗟𝗲𝗮𝘀𝘁 𝗣𝗿𝗶𝘃𝗶𝗹𝗲𝗴𝗲' 𝗣𝗿𝗶𝗻𝗰𝗶𝗽𝗹𝗲: Give users and applications only the permissions they need to perform their tasks. This will help to minimize the damage if an attacker gains access to an API. 6. 𝗥𝗲𝗴𝘂𝗹𝗮𝗿 𝗨𝗽𝗱𝗮𝘁𝗲𝘀: Keep your API software up to date with the latest security patches. 7. 𝗗𝗶𝘀𝗮𝗯𝗹𝗲 𝗗𝗲𝗳𝗮𝘂𝗹𝘁 𝗘𝗿𝗿𝗼𝗿𝘀: Default error messages can sometimes reveal sensitive information about your API. Configure your API to return generic error messages instead. 8. 𝗦𝗲𝗰𝘂𝗿𝗲 𝗦𝗲𝘀𝘀𝗶𝗼𝗻 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁: Use secure methods for managing user sessions, such as using secure cookies with the HttpOnly flag set. 9. 𝗖𝗦𝗥𝗙 𝗧𝗼𝗸𝗲𝗻𝘀: Use CSRF tokens to prevent cross-site request forgery attacks. 10. 𝗦𝗮𝗳𝗲 𝗔𝗣𝗜 𝗗𝗼𝗰𝘂𝗺𝗲𝗻𝘁𝗮𝘁𝗶𝗼𝗻: Your API documentation should not contain any sensitive information. 11. 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗧𝗲𝘀𝘁𝗶𝗻𝗴: Regularly conduct security testing of your APIs to identify and fix vulnerabilities. 12. 𝗧𝗼𝗸𝗲𝗻 𝗘𝘅𝗽𝗶𝗿𝗮𝘁𝗶𝗼𝗻: Implement token expiration to prevent attackers from using stolen tokens for extended periods. 13. 𝗦𝗲𝗰𝘂𝗿𝗲 𝗗𝗮𝘁𝗮 𝗩𝗮𝗹𝗶𝗱𝗮𝘁𝗶𝗼𝗻: Validate all user input to prevent injection attacks. 14. 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗛𝗲𝗮𝗱𝗲𝗿𝘀: Use security headers to protect your API from common attacks, such as XSS and clickjacking. 15. 𝗖𝗢𝗥𝗦 𝗖𝗼𝗻𝗳𝗶𝗴𝘂𝗿𝗮𝘁𝗶𝗼𝗻: Configure Cross-Origin Resource Sharing (CORS) to restrict access to your API from unauthorized origins. 16. 𝗧𝗵𝗿𝗼𝘁𝘁𝗹𝗲 𝗟𝗼𝗴𝗶𝗻 𝗔𝘁𝘁𝗲𝗺𝗽𝘁𝘀: Throttle login attempts to prevent brute-force attacks. 17. 𝗔𝗣𝗜 𝗩𝗲𝗿𝘀𝗶𝗼𝗻𝗶𝗻𝗴: Use API versioning to allow you to make changes to your API without breaking existing clients. 18. 𝗗𝗮𝘁𝗮 𝗘𝗻𝗰𝗿𝘆𝗽𝘁𝗶𝗼𝗻: Encrypt data at rest and in transit to protect it from unauthorized access. 19. 𝗟𝗼𝗴𝗴𝗶𝗻𝗴 𝗮𝗻𝗱 𝗔𝘂𝗱𝗶𝘁𝗶𝗻𝗴: Log all API access and activity to help you detect and investigate security incidents. 20. 𝗥𝗮𝘁𝗲 𝗟𝗶𝗺𝗶𝘁𝗶𝗻𝗴: Implement rate limiting to prevent API abuse and overload.

  • View profile for John Wernfeldt

    I help CDOs stop firefighting data problems and start leading with strategic authority | Ex-Gartner

    47,716 followers

    Most organizations treat data governance like a compliance project. It's not. It's the operating framework that makes everything else work. Here's how data becomes trusted, usable, and scalable: DATA FOUNDATION This is where it starts. Not with dashboards or AI models. → Master data that's shared and neutral → Transaction data you can trace → Source systems you can rely on → Data products that deliver value → Event and IoT data that's structured Make data understandable and reliable. DATA MANAGEMENT The layer most organizations confuse with governance. → Data quality monitoring → Metadata management → Lineage tracking → Cataloging This operationalizes the rules. But it doesn't set them. DECISION AUTHORITY This is governance. The layer everyone skips. → Metric ownership assigned → Definition rights clarified → Change authority established → Escalation paths defined This is what scales. Not the catalog. Decision clarity. ANALYTICS & AI Built on governed decisions. → Dashboards and reporting that people trust → Advanced analytics that stay accurate → RAG and GenAI that don't drift → AI models and agents that scale BUSINESS OUTCOMES → Trusted metrics → Faster decisions → Scalable analytics → Safe AI adoption The framework connects to: → Technical enablement (cloud, platforms, APIs, security) → Operating model (roles, governance cadence, stewardship) → Risk and control (regulatory compliance, auditability, ethics) Here is how I see it: If ownership is unclear, nothing above scales. You can build the best data platform in the world. The cleanest pipelines. The most advanced AI. But without clear ownership and decision authority, it all breaks when someone asks "who approved this definition?" Start with the foundation. Build the governance layer. Then scale. Not the other way around.

  • View profile for Nelly Tacheva, MBA

    AI & Immersive Tech Innovator | Product Lead | Educator | Speaker

    3,901 followers

    💥Another Amazon Web Services (AWS) outage. Another wake-up call. This morning, I planned to work on my course, but Canvas LMS didn't load. A day off for students and educators? Realizing how massive the outage is stopped me in my tracks. Why does it take a disaster to remind us of basic risk management? It shouldn't be reactive. And business continuity should be priority. By now we must have realized that centralized infrastructure = centralized risk. No? We've been sold the cloud as the only solution for IT infrastructure. But relying on a single provider is not strategy. It's blind hope. Most IT professionals are only trained on #AWS and its services. Few even attempt thinking beyond that box. And when convenience trumps common sense, failures become inevitable. Maybe add this to your next board meeting agenda: If AWS/Azure/Google Cloud went down for a week, what is our contingency plan? Here's what we can do: ✅ Diversify your cloud strategy. At minimum, have a secondary provider. ✅ Build for failure. Assume outages will happen and design around them. ✅ Train your teams to think beyond vendor-specific tools. Solutions don't always reside within a big cloud provider's ecosystem. ✅ Don’t be afraid to do something unconventional, like supporting your own servers, for example. ✅ Review your business continuity plan quarterly. Not amidst the next outage. Canvas LMS, Reddit, Inc., Snap Inc., Perplexity, Substack, FORTNIGHT, Roblox, Coinbase, Robinhood, Lloyds Banking Group, Bank of Scotland, United Airlines, Delta Air Lines, The Walt Disney Company, Prime Video & Amazon MGM Studios, Canva, Duolingo, and McDonald's are some of the apps affected by the outage in the US-EAST-1 #AWS region today. #AWSOutage #CloudOutage #RiskManagement #DevOps

  • View profile for Adewale Adeife, CISM, CISSP

    Cyber Risk Management and Technology Consultant || GRC Professional || PCI-DSS Consultant || I help keep top organizations, Fintechs, and financial institutions secure by focusing on People, Process, and Technology.

    30,299 followers

    🚨 Mastering IT Risk Assessment: A Strategic Framework for Information Security In cybersecurity, guesswork is not strategy. Effective risk management begins with a structured, evidence-based risk assessment process that connects technical threats to business impact. This framework — adapted from leading standards such as NIST SP 800-30 and ISO/IEC 27005 — breaks down how to transform raw threat data into actionable risk intelligence: 1️⃣ System Characterization – Establish clear system boundaries. Define the hardware, software, data, interfaces, people, and mission-critical functions within scope. 🔹 Output: System boundaries, criticality, and sensitivity profile. 2️⃣ Threat Identification – Identify credible threat sources — from external adversaries to insider risks and environmental hazards. 🔹 Output: Comprehensive threat statement. 3️⃣ Vulnerability Identification – Pinpoint systemic weaknesses that can be exploited by these threats. 🔹 Output: Catalog of potential vulnerabilities. 4️⃣ Control Analysis – Evaluate the design and operational effectiveness of current and planned controls. 🔹 Output: Control inventory with performance assessment. 5️⃣ Likelihood Determination – Assess the probability that a given threat will exploit a specific vulnerability, considering existing mitigations. 🔹 Output: Likelihood rating. 6️⃣ Impact Analysis – Quantify potential losses in terms of confidentiality, integrity, and availability of information assets. 🔹 Output: Impact rating. 7️⃣ Risk Determination – Integrate likelihood and impact to determine inherent and residual risk levels. 🔹 Output: Ranked risk register. 8️⃣ Control Recommendations – Prioritize security enhancements to reduce risk to acceptable levels. 🔹 Output: Targeted control recommendations. 9️⃣ Results Documentation – Compile the process, findings, and mitigation actions in a formal risk assessment report for governance and audit traceability. 🔹 Output: Comprehensive risk assessment report. When executed properly, this process transforms IT threat data into strategic business intelligence, enabling leaders to make informed, risk-based decisions that safeguard the organization’s assets and reputation. 👉 Bottom line: An organization’s resilience isn’t built on tools — it’s built on a disciplined, repeatable approach to understanding and managing risk. #CyberSecurity #RiskManagement #GRC #InformationSecurity #ISO27001 #NIST #Infosec #RiskAssessment #Governance

  • View profile for Victor GRENU

    AWS Consultant, Founder.

    4,596 followers

    A few months ago, we found a malicious AWS CloudFormation template trying to breach a customer's AWS account. It was disguised as “AWS Support for Fargate” Here’s what it’s really up to: 1. Grants itself administrator-level permissions via a fake support IAM role 2. Deploys a lambda function (in-line) to exfiltrate role ARN to an external API Gateway endpoint 3. Invoke itself using AWS CloudFormation CustomResource 📘 Blue team tips - Always review the IAM roles, policies, and external calls in any template. - Use the IAM Access Analyzer to verify external trust relationships - Don’t blindly trust anything labeled “AWS Support” — verify it first! - Report to AWS Security teams ASAP 📕 Red team tips - The malicious actor is identified by the AWS account ID in the AssumeRole policy. - Consider flooding the API endpoint with randomly generated payloads using fake IAM role ARNs.

  • Last week, I shared Microsoft’s recommendations for combatting abusive AI-generated content, including the growing threat of deepfakes. While deepfake scams remain a top concern for enterprise leaders and we must be vigilant and prepared to defend against them, it’s important to note that Business Email Compromise (BEC) schemes currently pose a far greater threat to organizational security. Last May, Microsoft Threat Intelligence reported 35 million BEC attempts annually, and a recent study from Perception Point found that BEC attacks had risen 1,760% in the past year. Like other social engineering tactics, BEC attacks exploit organizations’ weakest link: their people. Using generative AI, scammers can create more convincing phishing emails that are harder to spot, duping employees into sharing sensitive information that leads to data breaches and millions of dollars in loss. Not surprisingly, teams in finance, treasury, procurement, and HR are the most frequent targets. This piece shares some excellent points on prioritizing security against BEC attacks, including monitoring vendor payment data, unifying fraud prevention efforts across the organization (something we are implementing across our own teams here at Microsoft), and deploying fraud prevention software (such as Microsoft 365 Fraud Protection) as an extra layer of defense. I would also add requiring multi-factor authentication (MFA) for all employees, implementing a Zero Trust strategy for identity access and management, and adopting secure email and payment platforms. In this unpredictable and ever-changing landscape, one thing is clear: whatever the modus operandi, AI-enabled attacks will continue to rise. We must be prepared to tackle them at scale. You can revisit our Cyber Signals report on BEC attacks for more insights and recommendations from our Threat Intelligence team: https://lnkd.in/eiXtCUbk https://lnkd.in/eHHDfzSE #Cybersecurity #FraudPrevention #AI #BEC #SocialEngineering 

Explore categories