Get In Touch
In the last two posts, we covered the security fundamentals to migrate to the Cloud and the 10 best practices to secure workloads. In this third post, we will talk about securing access to your AWS workloads.
Shadow networks are side channels to traditional networks, undetected and working quietly in the background alongside what the traditional network was designed to do.
Earlier I wrote about the importance of patching, or more accurately the importance of transferring the need to patch (& the associated risk) to someone else by using their cloud security service. While patching definitely falls into the security fundamentals category it remains as relevant as ever, but it's not the only security best practice we need to collectively remember.
We all heed the gospel of patching, but as recent incidents made clear, even cutting-edge disruptors struggle to patch everything, everywhere, and all the time.