Sunday, September 29, 2019

A Pesky Cloud Security Use Case


You’ve loaded up the security controls to protect your data in any of those big name cloud providers. 



Ever think about the source network from which that authorized user is connecting to your internal cloud resources?


The crowded coffee shop in the tech savvy neighborhood.

That potentially unpatched public library.

That international public internet café machine.

Some networks just present more risk. That risk could mean a loss of control of legitimate credentials. 

No matter how they are gained, legitimate cloud credentials turn an outsider into an insider within your cloud network.

Follow me on Twitter for discussion and the latest blog updates: @Opinionatedsec1. Or, start your own discussion using #crazygoodcyberteams on twitter or Linkedin and I'll read it.

SEE ALSO



No comments:

Post a Comment