In addition to the traditional best practices for cybersecurity, focus on the "rapidly changing" security posture that is the result of DevOps.
Look at the ephemeral nature of objects - are these hardened and protected or would these open up the weakest link that hackers…
There are four major risks that need to be managed:
(1) data theft
(2) data integrity
(3) compliance
(4) project timeline.
For #1, most cloud providers support AES-256 encryption on the devices they ship (for example, Azure Data Box).
For #2, it is recommended that the…
It seems quite new, but similar terms are being defined by Gartner.
This tool seems to be addressing the "cloud-native" market for security tools: https://www.aquasec.com/news/a...