TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Is the Cloud Safe? Part 3: How to Make it Safe

2020-01-07 · Read original ↗

ATT&CK techniques detected

3 predictions
T1525Implant Internal Image
80%
"assessment and threat modeling including understanding the possible breach impacts and failure modes for each key service access control processes - defined access and identity roles for users, services, servers, and networks - defined processes to correct erroneous, obsolete, du…"
T1525Implant Internal Image
65%
"ability to manage complexity. compare this to the “ lift and shift ” cloud strategies, which result in over - provisioned deployments and expensive exercises in wastefulness. 3 the big picture given all of this, how do you put a cloud defense strategy together? you begin with the…"
T1078.004Cloud Accounts
64%
"maximize effectiveness. as with anything in technology and security, the strategy and priority decisions should come before the technological reasons. don ’ t go to the cloud just to say you are going to the cloud. a desired goal and accompanying strategy will drive the plan and …"

Summary

Now that we’ve explored cloud security failures, we’re going to explain defensive strategies laid out by deployment model.