Sign In
Not register? Register Now!
Pages:
3 pages/≈825 words
Sources:
Check Instructions
Style:
APA
Subject:
Technology
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 18.23
Topic:

Technical Review Paper (Cloud Security). Technology

Other (Not Listed) Instructions:

The project is a technical paper review selected from papers provided by the instructor or a topic of the individual’s choosing approved by the instructor. Topics must be unique and must not duplicate information discussed in class. Assume that the reader has the base knowledge presented in class. Projects must be original and may not have been submitted for credit in another course. Papers must be 3-4 pages in length (double spaced, 10 pitch type), clearly documented per the guidelines provided, and must use proper spelling and grammar.
Write a technical review for the article How to Improve Security
Visibility and Detection/Response Operations in AWS

Other (Not Listed) Sample Content Preview:

Technical Review
Name
Institution
Due Date
Technical Review
In today’s world where everything wholly or partly exists in the cloud, it is crucial to have an understanding of how to enhance security and curtail any threat to one’s data. Dave Shackleford's article titled How to Improve Security Visibility and Detection/Response Operations in AWS is indeed timely as it offers insight on the essentiality of improving security in Amazon Web Services or AWS. Every system or application has its vulnerabilities and this necessitates strategies to help offset or counter any malicious attacks. First of all, Shackleford starts by indicating the two types of event monitoring that should be done. The two include event-driven monitoring and behavior-driven monitoring. With event-driven monitoring, security teams monitor normal operations which are documented from the different logs within a security system. Behavior-driven monitoring, on the other hand, involves the assessment of events over time to detect patterns. For each of these two, there is a need for analysis of large amounts of data. However, as Shackleford notes, with current cloud security processes automated, sifting through the large datasets could be made easier.
The next section in the article offers a comprehensive explanation of how to enable cloud-native event logs and event management. Here Shackleford provides examples of logs that can be used as indicators of any inconsistencies. Data breaches are quite common today and logging events in real-time can help prevent any malicious marauding in the system or network. Here, Shackleford identifies three categories that are crucial to security teams. These include cloud control plane logs, workload OS/ application logs, and network flow logs for virtual private clouds. The significance of logs is that they allow security teams to monitor an entire system and reduce instances of vulnerability. Even though the three provided by Shackleford are crucial, neglecting asset logs could prove detrimental. Asset logs are the ones associated with licensure events, authentication events, and inception or creation events. The specifics of some of the listed asset logs do overlap with what Shackleford listed but there is a need to mention that an all-round effort is essential.
The section titled Improving Visibility in the Cloud is quite crucial as it seeks to showcase strategies to help maintain an environment that is free ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Other (Not Listed) Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!