Part two of 'Escaping the Egregious Eleven’
Many thanks to anyone who read or shared my last blog Escaping the Egregious Eleven – Part One on Tripwire's ever informative and always worth visiting State of Security. The concluding part has now been published which explores the next and final five items of consideration in the CSA list:
- Insecure APIs
- Weak Control Plane
- Metastructure and Applistructure Failures
- Limited Cloud Usage Visibility
- Abuse and Nefarious Use of Cloud Services
Do please read Cloud Security Threats: Escaping the Egregious Eleven – Part Two here.
Continuing on a cloud security theme, I was honoured to contribute to another well curated Tripwire crowdsource piece also this month, containing some sound advice from a variety of security professionals. You can read How to Implement an Efficient Cloud Security Strategy here.