A variety of threats affect your cloud security ranging from misconfigurations, network exploitation, brute-forcing, container malware, and account takeover to stolen credentials. These threats can affect your entire cloud estate - across multiple clouds, multiple regions, and multiple accounts with each having its own specific attack surface and active attack patterns.
SecOps and DevOps teams are inundated with alerts on misconfigurations, CVEs, and active threats and it is a real challenge to prioritize what are the 10 next most critical things to do.
In this talk, we will discuss potential strategies to prioritize which security findings need to be resolved and which can be snoozed for a later time. An ideal burn-down chart to resolve any cloud security alerts should provide optimal additional risk reduction, for every ticket created for an issue to be resolved.
We will also discuss how coupling runtime monitoring and configuration checking intelligently can help you fix your cloud security in the right order.