Tuesday, July 5, 2022
  • Slack for Security – How to do Policy Acknowledgements in Slack
  • OWASP API Security Top 10: Security risks that should be on your radar
  • Security BSides Athens 2022 – Ignatios’ ‘Talk 6 – API Security Testing Automation: A Story Of Shifting Left’
  • Where’s the Authority in Identity?: Part II
  • ‘ChinaDan’ Hacks 1 BILLION Police Records from Shanghai: 23TB of PII for Sale

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Cloud Security Security Bloggers Network 

Home » Cybersecurity » Cloud Security » Is Your Security Dashboard Ready for the Cloud?

SBN

Is Your Security Dashboard Ready for the Cloud?

by Chris Hudson on September 20, 2018

The ability to feed key security information onto a big screen dashboard opens up many new opportunities for managing the day-to-day security and maintenance workload as well as providing a useful method of highlighting new incidents faster than “just another email alert.”

DevOps Connect:DevSecOps @ RSAC 2022

Most Security Operation Centres I’ve visited in recent years have embraced having a few dedicated big-screen displays, but most are restricted to monitoring the on-premise architecture such as local firewalls and servers rather than taking a more holistic approach and accounting for the increasing use of cloud hosted infrastructure and services.

Security no longer starts and ends at the “front door,” with cloud playing a bigger role in more and more organisations. Here’s four things I think every company that uses cloud infrastructure should consider surfacing on their security dashboards.

Inventory and Discovery

The traditional model of server provisioning started changing with the growth of virtualisation. No longer can you assume that new hardware would be purchased and entered into a CMDB.

With the growth of cloud infrastructure, the provisioning of new virtual infrastructure became even easier, but with that comes new challenges for your security processes. For that reason, making sure that newly detected devices are highlighted front and center on a dashboard makes a lot of sense and can help to understand the changes going on during provisioning of a new or updated application during the DevOps cycle. Ensuring security coverage against these new devices is key to making sure that gaps don’t develop over time.

Vulnerabilities and Priorities

When vulnerabilities are detected, it’s important that they are presented in a practical fashion. Simply listing every missing patch or misconfiguration often isn’t a sensible approach to managing your workload. A good dashboard should help reveal the most common and highest risk vulnerabilities in an easy-to-read (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Chris Hudson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/cloud/security-dashboard-cloud/

September 20, 2018September 20, 2018 Chris Hudson Cloud, security, Security Dashboards
  • ← Detect Host Compromise with “Domains Generated Algorithmically”
  • A Chinese Affair: Theft of GlaxoSmithKline R&D →

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Most Read on the Boulevard

Using AI/ML to Secure the Hybrid Workforce
Inching Toward Defend Forward
Disgruntled Law School Applicant’s Cyberharassment Ends With Narrow Court Ruling
CISO Talk EP 22 – Diversity, Equity and Inclusion in Security – TechStrong TV
‘ChinaDan’ Hacks 1 BILLION Police Records from Shanghai: 23TB of PII for Sale
This Week in Malware—Python Cryptominers, 345 Dependency Confusion Packages
Security champions and DevSecOps: Invicti at Infosecurity Europe 2022
Five Eyes Cyber Security Predictions
Security BSides Athens 2022 – Jessica Roussou’s ‘Hearty Welcome To Security BSides Athens 2022’
Where Next for Quantum Computing and Cybersecurity?

Upcoming Webinars

Mon 18

Kubernetes Security

July 18 @ 1:00 pm - 2:00 pm
Tue 19

Finding the Ransomware Threat INSIDE Your Backups

July 19 @ 3:00 pm - 4:00 pm
Mon 25

Applying the 2022 Open Source Findings to Software Supply Chain Risk Management

July 25 @ 3:00 pm - 4:00 pm
Wed 27

How to Shift Security Left: Best Practices From a Fortune 500 DevSecOps Leader

July 27 @ 1:00 pm - 2:00 pm
Aug 30

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

August 30 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Industry Spotlight

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

June 17, 2022 Richi Jennings | Jun 17 0
Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Cybersecurity Governance, Risk & Compliance Industry Spotlight IoT & ICS Security Security Awareness Security Boulevard (Original) Threat Intelligence 

Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity

May 23, 2022 Mike Hodge | May 23 Comments Off on Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Establishing a Root of Trust in Embedded Linux and IoT
Cybersecurity Endpoint Industry Spotlight IoT & ICS Security Security Boulevard (Original) Vulnerabilities 

Establishing a Root of Trust in Embedded Linux and IoT

April 18, 2022 Anita Buehrle | Apr 18 Comments Off on Establishing a Root of Trust in Embedded Linux and IoT

Top Stories

‘ChinaDan’ Hacks 1 BILLION Police Records from Shanghai: 23TB of PII for Sale
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access Incident Response Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘ChinaDan’ Hacks 1 BILLION Police Records from Shanghai: 23TB of PII for Sale

July 5, 2022 Richi Jennings | Yesterday 0
Attackers Work Hard to Engineer Trust; SharePoint, OneDrive Accounts at Risk
Cloud Security Cybersecurity Featured Identity & Access News Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Vulnerabilities 

Attackers Work Hard to Engineer Trust; SharePoint, OneDrive Accounts at Risk

July 5, 2022 Teri Robinson | Yesterday 0
Google Launches Advanced API Security to Combat API Threats 
Featured News Security Boulevard (Original) Spotlight 

Google Launches Advanced API Security to Combat API Threats 

June 30, 2022 Nathan Eddy | Jun 30 0

Security Humor

Robert M. Lee's & Jeff Haas' Little Bobby Comic - 'WEEK 388’

Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 388’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.