Any best practices for implementing a CNAPP in a multi-cloud environment? What’s most important to watch out for?
4.6k views1 Comment
Sort by:
Content you might like
Has anyone drafted an SOW for a cloud-based SIEM with setup, migration, and maintenance? I’m working on a FedRAMP-authorized SIEM SOW, migrating from on-prem Splunk, covering data, searches, alerts, dashboards, and models. Scope includes Environment Setup: Cloud provisioning, configuration, testing. Connectors/Parsers: Custom data source integration. Content Development: Rules, use cases, threat feeds. Performance Tuning: Query/index optimization. Runbooks: Operational procedures. Also required: 24x7 support, maintenance, lifecycle and application management, role-based training, and documentation. Must comply with NIST SP 800-53, CJIS, and FedRAMP Moderate+. Goal: Secure, scalable SIEM for rapid deployment. I may be missing elements, so suggestions are welcome. Please share redacted SOWs or tips if possible.
Very likely6%
Likely40%
Somewhat likely27%
Somewhat unlikely14%
Unlikely8%
Very unlikely2%
Unsure
Anyone have experiences or POVs on TruffleHog Open Source vs Commercial license?
What is the most critical information you expect your cybersecurity team to deliver to you on a consistent basis?
Strategies to prevent ransomware from impacting data backup & recovery29%
What it will take to restore minimal operations after a compromise51%
How prepared the organization is to engage law enforcement in the event of an attack16%
How prepared it is to engage cybersecurity investigators2%
Other (share below)
Dear Pradeep,
I haven't a direct experience about but with pleasure I searched more info online.
Checkpoint posted about with a downloadable paper: https://www.checkpoint.com/cyber-hub/cloud-security/what-is-a-cloud-native-application-protection-platform-cnapp/
What to watch out for:
✅Configuration Inconsistencies: Different clouds have different settings and defaults. Misconfigurations are a common issue and can lead to security vulnerabilities.
✅Compliance Challenges: Keeping up with various compliance requirements across different clouds can be challenging.
✅Complexity in Management: Managing security across multiple clouds adds complexity. This can lead to oversight and potential security gaps.
✅Shadow IT: Unauthorized cloud services used by employees can introduce security risks.
✅Vendor Lock-in Risks: Dependence on a specific cloud provider's tools or services can create challenges if you need to migrate or integrate with other clouds.
✅API Security: Ensure the security of APIs used to connect services and applications across different clouds.
Cheers, Fab