Your browser does not allow this site to store cookies and other data. Some functionality on this site may not work without them. See Privacy Policy for details on how we would use cookies.

Cloud Security

XXX this page is under construction

  • Cloud security threats
  • Cloud Access Security Broker (CASB)
  • Cloud secrets vault
  • Traffic management/firewalling between computing instances
  • Virtual firewalls
  • VPNs
  • Virtual private cloud
  • Software defined perimeter
  • Cloud Key Management
  • SSH access in the cloud
  • DevOps security (DevSecOps)
  • Virtual machine security
  • Container security
  • Hypervisor security
  • API security
  • Database security
  • Security between on-prem and cloud
  • SSH back-tunneling
  • Identity management in the cloud
  • Privileged access in the cloud
  • Refer to kill chain model

XXX Docker, puppet, chef, jenkings, AWS, Azure