I am not talking about office workload ... Relax!! 😅
I didn't know few terms so I thought to share my today's learnings.
CNAPP - Cloud Native Application Protection Platform
CWPP - Cloud Workload Protection Platform
CSPM - Cloud Security Posture Management
CIEM - Cloud Infrastructure Entitlement Management
KSPM - Kubernetes Security Posture Management
Please refer the below URLs to know about what these individual terms mean:
https://cloudsecurityalliance.org/blog/2021/10/25/what-is-a-cloud-native-application-protection-platform-cnapp
https://www.rapid7.com/fundamentals/what-is-cloud-native-application-protection-platform-cnapp/
In the context of a CWPP, the term "workload" refers to the various computing tasks, processes, or applications that run in a cloud environment. A workload can include virtual machines (VMs), containers, serverless functions, and any other components involved in processing, storing, or transmitting data. These workloads are what CWPP solutions are designed to secure, ensuring they are protected from cyber threats throughout their lifecycle, whether they run on public, private, or hybrid cloud infrastructure.
Key elements of workloads that CWPP focuses on include:
--> Applications: Web apps, databases, or software services hosted in the cloud.
--> Virtual Machines: VMs running in a cloud environment.
--> Containers: Containerized services, such as those using Docker or Kubernetes.
--> Serverless Functions: Code executions in serverless computing environments like AWS Lambda or Azure Functions.
A CWPP helps protect these workloads by providing security measures such as runtime protection, vulnerability scanning, identity and access management, and compliance monitoring.
Happy Learning !!
CyberSecurity VulnerabilityManagement
Subscribe to:
Post Comments (Atom)
Vulnerability Management - Understanding vulnerability posture
Understanding the vulnerability posture of an organisation at a basic level helps you drive remediation efforts. So, I don't know what t...
-
Scan based findings are related to a particular scan. It cannot tell you whether a vulnerability which existed earlier was fixed or not. It ...
-
There are lot of ways but following are the common ones: 1 . Zones Every company organizes its infrastructure in zones like "External F...
-
Your vulnerability scan did not find as many vulnerabilities as you were expecting in a normal authenticated scan? Even when credentials pro...
No comments:
Post a Comment