From the course: DevSecOps: Building a Secure Continuous Delivery Pipeline

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Cloud security monitoring

Cloud security monitoring

From the course: DevSecOps: Building a Secure Continuous Delivery Pipeline

Start my 1-month free trial

Cloud security monitoring

- [Instructor] Have you ever had the frustrating moment where you couldn't figure out how to get the Amazon S3 bucket permission set right for your application to have access to it? What did you do? Just give up? Well, if you're like me, you probably opened up the permissions for the bucket as much as you possibly could. Of course, you promised yourself once you got it working, you'd go back and set it back to normal, which of course there's probably only a 50-50 chance there that that would ever happen. With developers sharing access to the cloud infrastructure, this story plays out at company after company and has created a new breed of offerings around this space that we will call cloud security monitoring. These tools check for configuration in the cloud to make sure that it hasn't changed from its last known good state. They also assess whether you are in or out of compliance across your entire cloud infrastructure. Some products call this as compliance's codes since you assert…

Contents