<aside> 📘 relates:
主要是 CSPM、DSPM,核心点如下:
除此之外还有一些其他的概念:
总的来说,一个大趋势就是跨云、下云,让用户摆脱云的控制。 而且部署方式也从 agent 到 agentless 的演变,提供安全 SaaS 云, 以 API 的形式对多云进行远程扫描。
</aside>
Article 2 of 8 in Building Your Cybersecurity Posture on LinkedIn
After you first understand your assets, enterprises need to determine how they want to continuously monitor the risk posture of each type of asset. These 6 security postures align with the technologies you need to protect. Each technology needs governance, policies, and guardrails to help your people appropriately act within your organization's defined policies.
A security posture is a collection of key risk indicators that collectively measure your organization's exposure to potential risk. The intention of a cybersecurity posture is to provide a high-level indicator of general risk categories. I use 5 levels to map a typical security posture.
No alt text provided for this image
Cloud Security Posture Management
Cloud Security Posture Management
<aside> 📘 all glossaries:
Cloud Security Posture Management:
Application Security Posture Management:
Network Security Posture Management:
Data Security Posture Management:
Identity Access Posture Management:
Device Security Posture Management:
The most common security posture tool in the marketplace is Cloud Security Posture Management (CSPM). Cloud security posture management is a compliance tool that manages cloud security policies, identifies configuration drift, detects misconfigurations, reports vulnerabilities, and integrates with workflow software to ensure the remediation of issues. There are a bunch of tools that capture many of the features, but this tool space is still evolving. Right now, many of the tools are incorporating some of the other postures I talk about…It’s not necessarily important to have a 1 to 1 matching of tool to capability, but instead to make sure you cover all of your postures somehow.
Application Security Posture Management is the developer side of posture management. CSPM monitors your operations environments, and I expect the markers to build ASPM tools as an extension of security from the operations environment into the development process. I see ASPM as a tool that provides an application risk score to measure your enterprise’s risk to open source dependency vulnerabilities, static code vulnerabilities, credentials & secrets in code vulnerabilities, and container vulnerabilities in your binary repositories. A tool that takes information from your source code repositories, continuous integration tool, binary repository, and security scanning tools and approximates risk to your application, business unit, and enterprise.