Tagging Strategies for Cloud Security Success

Logo
Presented by

Tom Croll, Advisor, Lionfish Tech Advisors & Paul Anderson, Senior Security Engineer, Tenable

About this talk

In ephemeral cloud environments, organizations often struggle to keep track of all their cloud resources, especially in expanding hybrid and multi-cloud environments with dozens or hundreds of users deploying applications into production. Proper implementation and enforcement of tagging rules for cloud resources can help users keep track of their running workloads while ensuring consistent application of security policies. However, as much as resource tagging can help organizations, the implications of an inconsistent tagging strategy are far-reaching. Risks include difficulties identifying resource owners, inflated costs due to unidentified and unused/zombie resources, and potential vulnerabilities within stale, unpatched workloads. Join this session to understand why tagging is a critical component of cloud security and how adopting Policy-as-Code and automation can help mitigate issues caused by inconsistent tagging. Presenters will dive into the best practices for building a tagging strategy and how you can implement them using a cloud-native application protection (CNAPP) tool.
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (946)
Subscribers (71461)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa