How to Keep Up With Vulnerability Management Challenges in Ephemeral Cloud Environments

How to Keep Up With Vulnerability Management Challenges in Ephemeral Cloud Environments

This blog is part of an ongoing series sharing key takeaways from Rapid7’s 2020 Cloud Security Executive Summit. Interested in participating in the next summit on March 9? Register here!


The modern perspective is that the cloud has made it much easier to have visibility of your attack surface and everything you’re working with. While still responsible for setting up patching, monitoring, remediation, and notification, you’re likely to find many security processes smoother in the cloud, enabling a never-before-seen velocity.


However, there are still many who are ramping up their knowledge of how to optimize cloud processes. And if you’re fragmented across multiple providers, what’s the best way forward if you’re working with a new company or otherwise looking to scale quickly?


The need for speed (and more speed and more speed)


In a post-office world, remote work culture has signaled the need to innovate and get workloads deployed at breakneck speed. However, the cost of misconfigurations from personnel who aren’t familiar with cloud security could be disastrous—it can impact shareholder value as well as a company’s public-facing perception. So, even though the need exists to deploy and scale quickly, education is a crucial component in the race to win. Configuring for the cloud is complex, but if done right, it makes things easier. With the right training for security and dev teams, shifting left with cloud can become a reality.


As this education and scaling process goes along, who is ultimately responsible for vulnerabilities in the cloud? Whether it’s on-premises or off-premises, a customer-facing team should be one ready and able to address the unique hybrid environments of each customer. To ..

Support the originator by clicking the read the rest link below.