Security Risk Identification and Detection

Updated at: 2023-09-25 06:58

Security risk identification and detection include the following four dimensions:

  • Risk identification and detection for infrastructure: Cloud infrastructure includes network architecture and identity management. It is necessary to evaluate and identify the current network architecture to determine whether it complies with the principles of zero-trust and defense-in-depth.

  • Risk identification and detection for cloud platform configurations: It is necessary to identify and automatically detect whether the configurations created by organizations using cloud services comply with security best practices. A "cloud security baseline", which is in accordance with cloud security best practices and industry compliance requirements, can be established to identify and detect cloud migration risks.

  • Risk identification and detection for asset vulnerabilities: Assets in the cloud can be divided into workloads (ECS, Kubernetes, containers, serverless), network components(EIP, NAT, SLB, etc.), and applications (PaaS services, domain names, images, etc.). Vulnerabilities in assets should be identified and detected in advance and in an automated way.

  • Identification of compliance risks: Compliance includes external compliance and internal compliance. External compliance refers to compliance with regulations, while internal compliance refers to compliance with internal audits and security requirements.

    Feedback
    phone Contact Us

    Chat now with Alibaba Cloud Customer Service to assist you in finding the right products and services to meet your needs.

    alicare alicarealicarealicare