throbber
The ISSA Journal - March 2019
`
`The Quest for
`
`bility and Control in the Cloud
`
`By Yuri Diogenes - ISSA Senior Member, Fort Worth Chapter 2019-03-20 18:52:29
`Although cloud security has evolved over the years and is becoming more mature, the endless journey to obtain the right level of visibility and control over
`the cloud workloads is still a challenge. This article will cover important considerations regarding cloud security visibility and control.
`
`Abstract
`
`Although cloud security has evolved over the years and is becoming more mature, the endless journey to obtain the right level of visibility and control over the
`cloud workloads is still a challenge. From companies that are still in the process of migrating to the cloud to companies that are already building their
`infrastructure entirely in the cloud, the governance of cloud workloads can be difficult if not approached correctly and using the right tools. In addition,
`companies that need to adhere to certain compliance standards must understand the current security controls around their workloads and how they map to
`the standards that they need to be in compliance with. This article will cover important considerations regarding cloud security visibility and control.
`
`ACCORDING TO “THE 2018 GLOBAL CLOUD DATA SECURITY STUDY” conducted by Ponemon Institute, 13 forty-nine percent of the respondents in the
`United States are “not confident that their organizations have visibility into the use of cloud computing applications, platform, or infrastructure services.”
`According to Palo Alto’s
`“2018 Cloud Security Report,” 14 sixty-two percent of the respondents said that misconfiguration of cloud platforms is the biggest
`threat to cloud security. What we have here is exactly the lack of visibility and control over different cloud workloads, which not only cause challenges during
`the adoption, but also slow down migration to the cloud.
`In large organizations the problem becomes even more difficult due to the dispersed cloud adoption strategy. This usually occurs because different
`departments within a company will lead their own way to the cloud, from the billing to infrastructure perspective. By the time security and operations teams
`become aware of those isolated cloud adoptions, these departments are already using applications in production and integrated with the corporate on-
`premises network (figure 1)
`
`Cloud Provider A
`
`Cloud Provider B
`
`
`
`
`
`
`laaS Cloud || PaaS Cloud
`Workloads || Workloads
`
`
`
`
`IT Department
`‘SecOps's Visibility
`
`leap Cloud
`Workloads
`
`
`
`
`
`
`Finance Department
`
`
`
`
`
`
`
`
`
`
` ‘ABC Company
`
`- An unstructured cloud adoption scenario can become a nightmare for the SecOps
`Figure 1
`In addition to this unstructured approach, these adoptions usually are done without proper monitoring planning, and many times the attempt to leverage
`legacy tools to gain viability to cloud resources does not provide an accurate picture of the current security posture of those workloads. According to the Palo
`Alto Networks report, the “top two security control challenges SecOps are struggling with are visibility into infrastructure security (forty-three percent) and
`compliance (thirty-eight percent).”
`To obtain the proper level of visibility across your cloud workloads, you can’t rely only on a well-documented set of processes; you must have the right set of
`tools. According to Palo Alto Networks, eighty-four percent of the respondents said that “traditional security solutions either don’t work at all or have limited
`functionality.” This leads to a conclusion that ideally you should evaluate your cloud provider's native cloud security tools before even starting to move to the
`cloud. But many current scenarios are far from the ideal, which means you need to evaluate the cloud provider's security tools while the workloads are already
`on it. This brings us to the discussion of two major categories of cloud security tools that are imperative these days:
`* Cloud Security Posture Management (CSPM)
`+ Cloud Workload Protection Platform (CWPP)
`
`Cloud security posture management
`
`When talking about cloud security posture management, we are basically referring to three major pillars: visibility, monitoring, and compliance assurance. A
`CSPM tool should be able to look across all these pillars and provide capabilities to discover new and existing workloads (ideally across different cloud
`providers), identify misconfigurations, provide recommendations to enhance the security posture of cloud workloads, and assess cloud workloads to compare
`against regulatory standards and benchmarks. According to Gartner, a typical deployment pattern for CSPM has the layers shown in figure 2. 25
`
`Compliance
`Assessment
`
`
`Operational
`Monitoring
`DevsecOps
`|
`Intooratian
`
`
`
`Jashboard
`
`Document title: The Quest for Visibility and Control in the Cloud The ISSA Journal : March 2019
`Capture URL: https://issa.mydigitalpublication.com/articles/the-quest-for-visibility-and-control-in-the-cloud
`
`
`Capture timestamp (UTC): Wed, 19 Mar 2025 13:10:06 GMT
`
`
`
`
`
`
`Orca Security Ltd.
`Exhibit 2137
`Wiz v. Orca
`IPR2024-00863, -00864, -00865
`
`Page 1 of 11
`
`Ex. 2137-001
`
`

`

`ayaNse PSYUIGLUTy StaNuar Us Gu YEHUNIGIRS. MUCUIUIIY WY GUT Ue, G Ly MIRG! USPIVY eH PALS Fur Gorm as Wis raycrs SHuwi mE gure 2. —
`
`
`
`
`
`
`
` Compliance
`Assessment
` API integration
`Operational
`Monitoring
` DevSecOps
`Integration
`isk
`
`Identification
` Policy
`Enforcement
` Threat
`Protection
`
`
`
`
`
`z
`8 2
`3
`a 3 g
`g = a 8
`
`
`
`
`
`Figure 2 - CSPM capabilities
`
`Each layer is responsible for retrieving the relevant data across the different workloads, rationalize it, and providing the output via a dashboard. Some layers
`may also have the capability to integrate with external work flows, for example, to send emails or to trigger remediation tasks in case a pre-determined
`threshold is reached. Table 1 has general considerations for each one of those capabilities of the layered model descried in figure 2.
`
`CAPABILITY & CONSIDERATIONS
`
`Compliance Assessment: Make sure the CSPM is covering the regulatory standards used by your company.
`Operational Monitoring: Ensure that you have visibility throughout the workloads, and that best practices recommendations are provided.
`
`is possible to integrate this tool to existing work flows and orchestration. If it
`DevSecOps Integration: Make sure it
`to automate and orchestrate the tasks that are critical for DevSecOps.
`Identification: How the CSPM tool is identifying risks and driving your workloads to be more secure? This is an important question to answer when
`evaluating this capability.
`Policy Enforcement: Ensure that it is possible to establish central policy management for your cloud workloads and that you can customize and enforce
`it.
`Threat Protection: How do you know if there are active threats in your cloud workloads? When evaluating the threat protection capability for CSPM, it is
`imperative that you can not only protect (proactive work) but also detect (reactive work) threats.
`Table 1
`- CSPM general considerations
`Some cloud platforms will offer native CSPM solutions that are capable of mapping different regulatory compliance models to your workloads and provide
`recommendations for security controls. The example shown in
`figure 3
`is from the Azure Security Center regulatory and compliance feature, with the
`compliance control mapping for the monitored workloads located in Azure.
`
`is not, evaluate the available options
`
`Security Center - Regulatory Compliance (Preview)
`
`‘GENERAL

`Overview
`& Goting started
`“+
`Events
`© Search
`Pou & COMPLIANCE
`
`“B Coverage

`Secure score
`Security policy
`
`Regulatory compliance assessment _ Regulatory standards compliance status
`Sr
`Jamwecis
`Totes passedmles
`Is
`Jctoss32 Sot2tpassednies
`260
`[180 27001
`5 of25>passedrues I
`[soctse
`Botts pasednics
`
`Q
`
`Azure CIS
`
`PCIDSS32
`
` 1SO27001
`
`SOC TSP
`
`All
`
`Under each applicable Compliance Control is a set of assessments run by Security Center that are associated with that Control.
`If they are all green, it means those assessments are currently passing; this does not ensure you are fully compliant with that co
`Furthermore, not all controls for any particular regulation are covered by Security Center assessments, and therefore this report
`of your compliance status.
`
`A, Regulatory Compliance (Prev.
`
`Sian a conepbine
`
`Fae
`
`RESOURCE SECURITY HYGIENE
`
`1. Install and maintain a firewall configuration to protect cardholder data
`
`Recommendations
`
`v
`
`|]
`
`2. Do not use vendor-supplied defaults for system passwords and other security parameters
`
`Figure 3 - Regulatory compliance features in Azure Security Center
`
`Cloud workload protection platform
`
`By now you can already conclude that having a CSPM is an important step towards securing your cloud deployment. But there are other aspects of cloud
`security that need to be addressed including hardening, configuration, network security (firewall, segmentation), protection against exploits, application
`whitelisting, and other in-depth security capabilities. To address those needs, you will need to use a cloud workload protection platform (CWPP) tool. Gartner
`also exemplified a typical deployment pattern for CWPP, as shown in figure 4 16,
`
`Fndnnint
`
`
`
`Document title: The Quest for Visibility and Control in the Cloud The ISSA Journal : March 2019
`Capture URL: https://issa.mydigitalpublication.com/articles/the-quest-for-visibility-and-control-in-the-cloud
`
`Capture timestamp (UTC): Wed, 19 Mar 2025 13:10:06 GMT
`
`
`
`Page 2 of 11
`
`Ex. 2137-002
`
`

`

`By now you can already conclude that having a CSPM is an important step towards securing your cloud deployment. But there are other aspects of cloud
`security that need to be addressed including hardening, configuration, network security (firewall, segmentation), protection against exploits, application
`whitelisting, and other in-depth security capabilities. To address those needs, you will need to use a cloud workload protection platform (CWPP) tool. Gartner
`also exemplified a typical deployment pattern for CWPP, as shown in figure 4 16,
`
`
`
`Endpoint
`Protection
`
`
`
`
`
`Application
`Whitelisting
`
`
`
`
`
`System
`Integrity
`
`
`
`
`
`wppPp
`
`
`
` Configuration
`
`
`
`Network
`Segmentation C
`
`
`
`
`
`System
`Monitoring
`
`
`
`
`
`Workload
`
`
`
`Figure 4 - CWPP deployment patterns
`Cloud workload protection platforms that offer these deployment patterns enable customers to have more control and security over their enterprise
`workloads, containers, and storage across multiple laaS public cloud deployments and also traditional on-premises data center environments (hybrid cloud
`scenario). Since CWPP is a more in-depth security protection, it can also have threat detections as part of the system monitoring capabilities. Let's review
`some important considerations for each one of those capabilities of the layered model descried in figure 4 (table 2)
`
`CAPABILITY & CONSIDERATIONS
`
`Endpoint Protection: Make sure the CWPP can integrate with the current endpoint protection solution that is running on your laaS workloads.
`Application Whitelisting: Ensure that you can whitelist applications that are running in your laaS deployments.
`System Integrity: Make sure it
`is possible to monitor file integrity in Windows and Linux systems.
`Network Segmentation: Ensure you can harden virtual network traffic used by your laaS workloads.
`System Moni
`How do you monitor active events in Windows and Linux platforms? This is an important question that needs to be addressed by
`the CWPP. Ideally this should be seamless for laaS workloads in the cloud, as well as on-premises resources in a hybrid cloud scenario.
`Workload Configuration: How to deploy workload configuration in scale by leveraging security best practices, another important consideration that
`should be covered by the CWPP.
`
`Table 2 - CWPP considerations
`Some cloud platforms will offer native CWPP solutions that are capable of mapping all suggested patterns described in table 2. Make sure to evaluate the
`options, as native cloud tools are usually able to offer some unique capabilities since the cloud provider owns the underlying infrastructure. The example
`shown in figure 5 is from the Azure Security Center file integrity monitoring capability that can monitor Windows and Linux platforms.
`
`File Integrity Monitoring
`
`&3 settings
`
`© Refresh
`
`Y Filter
`
`i) Disable
`
`Total computers
`2
`
`Total changes
`16
`
`Change type
`Files
`Registry
`

`16 SD =
`
`Change category
`Modified
`2 =m
`Added
`/—————s
`
`
`
`Computers | Changes
`
`P&
`
`Search computers
`
`Removed os
`
`NAME
`
`TOTAL CHANGES
`
`FILES:
`
`REGISTRY
`
`LAST CHANGE TIME...
`
`gi ASCBookSrv2012
`
`a W2012ReadyDemo
`
`8
`
`8
`
`oO
`
`oO
`
`8
`
`8
`
`02/18/19, 05:24 AM
`
`02/12/19, 06:23 PM.
`
`Figure 5 - File integrity monitoring in Azure
`is common that CWPP implementations are agent-based solutions. In a recent blog post published
`In order to provide in-depth security for your workloads, it
`hur Dain Alka Matwarbe 17 thaw ranartad that analucie dana in crimbaminar cada read hi Darla arann 18 idantifind that tha maliciane cada wae ahla ta nuada
`
`Document title: The Quest for Visibility and Control in the Cloud The ISSA Journal : March 2019
`Capture URL: https://issa.mydigitalpublication.com/articles/the-quest-for-visibility-and-control-in-the-cloud
`
`Capture timestamp (UTC): Wed, 19 Mar 2025 13:10:06 GMT
`
`
`Page 3 of 11
`
`Ex. 2137-003
`
`

`

`A waorareadydemo
`
`8
`
`0
`
`8
`
`02/12/19, 06:23 PM
`
`Figure 5 - File integrity monitoring in Azure
`is common that CWPP implementations are agent-based solutions. In a recent blog post published
`In order to provide in-depth security for your workloads, it
`by Palo Alto Networks 22, they reported that analysis done in cryptominer code used by Rocke group 28 identified that the malicious code was able to evade
`detection by uninstalling the cloud security protection and monitoring products from compromised Linux servers. Since this has the potential to become be a
`new attack vector against CWPP, it is imperative to verify with your CWPP vendor if they have the capability to detect this attempt to evade detection.
`
`Conclu:
`
`n
`
`Cloud security should be tackled from different angles, and as demonstrated in this article, a single approach may not cover all aspects that will enhance the
`security posture while keeping in-depth monitoring of the different cloud workloads. For this reason, CSPM and CWPP are solutions that should be prioritized
`during the planning phase of your cloud migration. For existing cloud deployments, it is important to review the design patterns of existing workloads, and
`ensure that the CSPM and CWPP solutions are capable of addressing current and future needs.
`
`References
`
`13 "The 2018 Global Cloud Data Security Study,” Gemalto (Jan 2018) - https://safenet.gemalto.com/resource/partnerasset.aspx?
`442454227 9&langtype=1033.
`
`
`14 "2018 Cloud Security Report,” Palo Alto Networks (May 2018) - https://www.paloaltonetworks.com/resources/research/2018-cloud-security-report-palo-alto-
`networks.
`15Richard Bartley, “Comparing the Use of CASB, CSPM, and CWPP Solutions to Protect Public Cloud Services,” Gartner (August 2018) -
`https://www.gartner.com/doc/3886773/comparing-use-casb-cspm-cwpp.
`
`
`16 Ibid.
`17 Xingyu Jin and Claud Xiao, “Malware Used by ‘Rocke’ Group Evolves to Evade Detection by Cloud Security Products,” Unit 42, PaloAlto Networks (Jan. 17,
`2019) - https://unit42. paloaltonetworks.com/malware-used-by-rocke-group-evolves-to-evade-detection-by-cloud-security-products/.
`18 Ed Targett, “This Malware Turns Off Your Cloud Security Tools,” Computer Business Review (Jan.
`1, 2019) - https://www.cbronline.com/news/rocke-group-
`malware.
`
`About the Author
`
`Yuri Diogenes, CISSP, MS in Cybersecurity Intelligence & Forensics Investigation, currently works for Microsoft as Senior Program Manager for Azure Security
`Center. Yuri is also a Professor for the Master of Science in Cybersecurity course from EC-Council University. You can follow Yuri on Twitter @yuridiogenes or his
`website yuridiogenes.us, yurid@microsoft.com.
`
`
`@ISSA. View All Articles.
`
`The Quest for Visibility and Control in the Cloud
`https://issa.mydigitalpublication.com/articles/the-quest-for-visibility-and-control-in-the-cloud
`Menu
`Page View
`
`Contents View
`Issue List
`Advertisers
`ISSA.org
`YouTube
`Facebook
`Twitter
`LinkedIn
`Instagram
`
`Issue List
`
`January/February 2025
`
`
`
`
`November/December 2024
`
`September/October 2024
`
`lulv-Auaust 2024
`
`
`
`Document title: The Quest for Visibility and Control in the Cloud The ISSA Journal : March 2019
`Capture URL: https://issa.mydigitalpublication.com/articles/the-quest-for-visibility-and-control-in-the-cloud
`Capture timestamp (UTC): Wed, 19 Mar 2025 13:10:06 GMT
`
`
`
`Page 4 of 11
`
`Ex. 2137-004
`
`

`

`January/February 2025
`
`
`
`November/December 2024
`
`September/October 2024
`
`July-August 2024
`
`March-April 2024
`
`February 2024
`
`January 2024
`
`
`December 2023
`
`November 2023
`
`October 2023
`
`September 2023
`
`August 2023
`
`July 2023
`
`June 2023
`
`May 2023
`
`April 2023
`
`March 2023
`
`February 2023
`
`January 2023
`
`December 2022
`
`November 2022
`
`October 2022
`
`September 2022
`
`August 2022
`
`July 2022
`
`June 2022
`
`May 2022
`
`April 2022
`
`March 2022
`
`February 2022
`
`January 2022
`
`December 2021
`
`November 2021
`
`October 2021
`
`September 2021
`
`August 2021
`
`July 2021
`
`June 2021
`
`Document title: The Quest for Visibility and Control in the Cloud The ISSA Journal : March 2019
`Capture URL: https://issa.mydigitalpublication.com/articles/the-quest-for-visibility-and-control-in-the-cloud
`Capture timestamp (UTC): Wed, 19 Mar 2025 13:10:06 GMT
`
`
`Page 5 of 11
`
`Ex. 2137-005
`
`

`

`ee pyewuiwe: eves
`
`August 2021
`
`July 2021
`
`June 2021
`
`May 2021
`
`April 2021
`
`March 2021
`
`February 2021
`
`January 2021
`
`December 2020
`
`November 2020
`
`October 2020
`
`September 2020
`
`August 2020
`
`July 2020
`
`June 2020
`
`May 2020
`
`April 2020
`
`March 2020
`
`February 2020
`
`January 2020
`
`
`December 2019
`
`November 2019
`
`October 2019
`
`September 2019
`
`August 2019
`
`July 2019
`
`June 2019
`
`May 2019
`
`April 2019
`
`March 2019
`
`February 2019
`
` January 2019
`
`December 2018
`
`November 2018
`
`October 2018
`
`September 2018
`
`August 2018
`
`July 2018
`
`Document title: The Quest for Visibility and Control in the Cloud The ISSA Journal : March 2019
`Capture URL: https://issa.mydigitalpublication.com/articles/the-quest-for-visibility-and-control-in-the-cloud
`Capture timestamp (UTC): Wed, 19 Mar 2025 13:10:06 GMT
`
`
`
`
`Page 6 of 11
`
`Ex. 2137-006
`
`

`

`October 2018
`
`September 2018
`
`August 2018
`
`July 2018
`
`June 2018
`
`May 2018
`
`April 2018
`
`March 2018
`
`February 2018
`
`January 2018
`
`
`December 2017
`
`November 2017
`
`October 2017
`
`September 2017
`
`August 2017
`
`July 2017
`
`June 2017
`
`May 2017
`
`April 2017
`
`March 2017
`
`February 2017
`
`January 2017
`
`
`December 2016
`
`November 2016
`
`October 2016
`
`September 2016
`
`August 2016
`
`July 2016
`
`May 2016
`
`June 2016
`
`April 2016
`
`March 2016
`
`February 2016
`
`January 2016
`
`December 2015
`
`November 2015
`
`October 2015
`
`September 2015
`
`Document title: The Quest for Visibility and Control in the Cloud The ISSA Journal : March 2019
`Capture URL: https://issa.mydigitalpublication.com/articles/the-quest-for-visibility-and-control-in-the-cloud
`Capture timestamp (UTC): Wed, 19 Mar 2025 13:10:06 GMT
`
`
`Page 7 of 11
`
`Ex. 2137-007
`
`

`

`November 2015
`
`October 2015
`
`September 2015
`
`August 2015
`
`July 2015
`
`June 2015
`
`May 2015
`
`April 2015
`
`March 2015
`
`February 2015
`
`January 2015
`
`December 2014
`
`November 2014
`
`October 2014
`
`September 2014
`
`August 2014
`
`July 2014
`
`June 2014
`
`May 2014
`
`April 2014
`
`March 2014
`
`February 2014
`
`January 2014
`
`December 2013
`
`November 2013
`
`October 2013
`
`September 2013
`
`August 2013
`
`July 2013
`
`June 2013
`
`May 2013
`
`April 2013
`
`March 2013
`
`February 2013
`
`January 2013
`
`
`December 2012
`
`November 2012
`
`October 2012
`
`Document title: The Quest for Visibility and Control in the Cloud The ISSA Journal : March 2019
`Capture URL: https://issa.mydigitalpublication.com/articles/the-quest-for-visibility-and-control-in-the-cloud
`Capture timestamp (UTC): Wed, 19 Mar 2025 13:10:06 GMT
`
`
`
`Page 8 of 11
`
`Ex. 2137-008
`
`

`

`January 2013
`
`December 2012
`
`November 2012
`
`October 2012
`
`September 2012
`
`August 2012
`
`July 2012
`
`June 2012
`
`May 2012
`
`April 2012
`
`March 2012
`
`February 2012
`
`January 2012
`
`
`December 2011
`
`November 2011
`
`October 2011
`
`September 2011
`
`August 2011
`
`July 2011
`
`June 2011
`
`May 2011
`
`April 2011
`
`March 2011
`
`February 2011
`
`January 2011
`
`
`December 2010
`
`November 2010
`
`October 2010
`
`September 2010
`
`August 2010
`
`July 2010
`
`June 2010
`
`May 2010
`
`April 2010
`
`March 2010
`
`February 2010
`
`January 2010
`
`December 2009
`
`Mavamhar 2nna
`
`Document title: The Quest for Visibility and Control in the Cloud The ISSA Journal : March 2019
`Capture URL: https://issa.mydigitalpublication.com/articles/the-quest-for-visibility-and-control-in-the-cloud
`Capture timestamp (UTC): Wed, 19 Mar 2025 13:10:06 GMT
`
`
`Page 9 of 11
`
`Ex. 2137-009
`
`

`

`February 2010
`
`January 2010
`
`
`December 2009
`
`November 2009
`
`October 2009
`
`September 2009
`
`August 2009
`July 2009
`
`June 2009
`
`May 2009
`
`April 2009
`
`March 2009
`
`February 2009
`
`January 2009
`
`
`December 2008
`
`November 2008
`
`October 2008
`
`September 2008
`
`August 2008
`
`July 2008
`
`June 2008
`
`May 2008
`
`April 2008
`
`March 2008
`
` Library
`
`The Quest for Visibility and Control in the Cloud
`
`By Yuri Diogenes - ISSA Senior Member, Fort Worth Chapter
`
`Although cloud security has evolved over the years and is becoming more mature, the endless journey to
`
`obtain the right level of visibility and control over the cloud workloads is still a challenge. This article will
`cover important considerations regarding cloud security visibility and control.
`
`Abstract
`
`Although cloud security has evolved over the years and is becoming more mature, the endless journey to
`obtain the right level of visibility and control over the cloud workloads is still a challenge. From
`
`companies that are still in the process of migrating to the cloud to companies that are already building
`their infrastructure entirely in the cloud, the governance of cloud workloads can be difficult if not
`
`approached correctly and using the right tools. In addition, companies that need to adhere to certain
`
`®mSECEs
`
`0
`
`Document title: The Quest for Visibility and Control in the Cloud The ISSA Journal : March 2019
`Capture URL: https://issa.mydigitalpublication.com/articles/the-quest-for-visibility-and-control-in-the-cloud
`Capture timestamp (UTC): Wed, 19 Mar 2025 13:10:06 GMT
`
`
`
`
`Page 10 of 11
`
`Ex. 2137-010
`
`

`

`The Quest for Visibility and Control in the Cloud
`
`By Yuri Diogenes - ISSA Senior Member, Fort Worth Chapter
`
`Although cloud security has evolved over the years and is becoming more mature, the endless journey to
`
`obtain the right level of visibility and control over the cloud workloads is still a challenge. This article will
`cover important considerations regarding cloud security visibility and control.
`
`Abstract
`
`Although cloud security has evolved over the years and is becoming more mature, the endless journey to
`obtain the right level of visibility and control over the cloud workloads is still a challenge. From
`
`companies that are still in the process of migrating to the cloud to companies that are already building
`their infrastructure entirely in the cloud, the governance of cloud workloads can be difficult if not
`
`approached correctly and using the right tools. In addition, companies that need to adhere to certain
`compliance standards must understand the current security controls around their workloads and how
`
`they map to the standards that they need to be in compliance with. This article will cover important
`
`considerations regarding cloud security visibility and control.
`
`ACCORDING TO “THE 2018 GLOBAL CLOUD DATA SECURITY STUDY” conducted by Ponemon Institute,
`
`13 forty-nine percent of the respondents in the United States are “not confident that their organizations
`have visibility into the use of cloud computing applications, platform, or infrastructure services.”
`
`According to Palo Alto’s “2018 Cloud Security Report,” 14 sixty-two percent of the respondents said that
`misconfiguration of cloud platforms is the biggest threat to cloud security. What we have here is exactly
`
`the lack of visibility and control over different cloud workloads, which not only cause challenges during
`the adoption, but also slow down migration to the cloud.
`
`In large organizations the problem becomes even more difficult due to the dispersed cloud adoption
`strategy. This usually occurs because different departments within a company will lead their own way to
`
`the cloud, from the billing to infrastructure perspective. By the time security and operations teams
`become aware of those isolated cloud adoptions, these departments are already using applications in
`
`production and integrated with the corporate on-premises network (figure 1).
`
`®mSECEs
`
`0
`
`Cloud Provider A
`
`Cloud Provider B
`
`
`
`
`
`
`
` E
`i
`
`!
`laaS Cloud || PaaS Cloud
`
`
`
`
`MSHIGEED |) MSHS |
`IT Department
`
`
`
`
`
`
`
`Figure 1 - An unstructured cloud adoption
`scenario can become a nightmare for the
`
`SecOps
`
`In addition to this unstructured approach,
`
`these adoptions usually are done without
`proper monitoring planning, and many times
`the attempt to leverage legacy tools to gain
`viability to cloud resources does not provide
`an accurate picture of the current security
`
`posture of those workloads. According to
`the Palo Alto Networks report, the “top two
`
`security control challenges SecOps are
`struggling with are visibility into
`
`infrastructure security (forty-three percent)
`
`
`
`laaS Cloud
`Workloads
`
`
`
`Finance Department
`
` ‘ABC Company
`
`and compliance (thirty-eight percent).”
`
`To obtain the proper level of visibility across your cloud workloads, you can't rely only on a well-
`
`aa.
`ndinatnfinen.
`mount hauatha taht nat oftaala Aa.
`
` $a. Nala Alta Mats
`
`
`Document title: The Quest for Visibility and Control in the Cloud The ISSA Journal : March 2019
`Capture URL: https://issa.mydigitalpublication.com/articles/the-quest-for-visibility-and-control-in-the-cloud
`
`Capture timestamp (UTC): Wed, 19 Mar 2025 13:10:06 GMT
`
`
`
`
`
`
`Page 11 of 11
`
`Ex. 2137-011
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket