什么是云风险管理? 

云风险管理(CRM)是管理的实践, 优先级, 和 acting on risks within the large scale of modern multi-cloud environments. Context is a critical driver of that prioritization; namely, underst和ing the potential impact of a particular risk 和 its likelihood of exploitation.

CRM can be an ephemeral concept – much like cloud operations themselves – to underst和. 但其核心是, you should be able to leverage a single CRM solution to secure highly ephemeral, 原生云应用, 以及您的整个内部部署足迹. 这可不容易找到, 但在当今充满风险的运营和环境中,这种需求是存在的.

云风险vs. On-Prem风险

超过一半的受访者认为 最近的调查 相信云操作比内部部署的风险更高, 很容易理解为什么对客户关系管理的需求如此旺盛. 事实上, 暴露的五个关键风险领域:运行时, 身份管理, 错误配置的可能性, 尚未解决的弱点, 和审计.

Each of those areas feature personnel 和 systems that must work h和-in-h和 with one another – often at a fast pace – to remain productive. A single miscommunication or misconfiguration could create risk exposure analysts or developers aren’t even aware of until it’s too late. Yes, managing risk in the cloud is very complex, but there are frameworks in place 安全运营中心(SOC) 团队可以利用研究、补救和降低风险.

如何评估云中的风险? 

要评估云中的风险,首先要确定谁负责 云安全 风险管理:您或您的云服务提供商(CSP)? 的 责任分担模式 (SRM) stipulates that CSPs are typically responsible for managing risks to the underlying cloud infrastructure on which your business’ operations are running.

Internal security teams are typically responsible for security of those operations in the cloud, meaning they are responsible for making sure their own data – 和 their customers’ data – is properly secured. Once a team determines where their 责任 lie 和 what exactly they’ll need to take a hard look at, it’s important to take into account that the assessment will need to take place in real-time.

云风险评估的4个步骤

 

  1. 识别资产: Which cloud assets would have the most significant impact on your organization if their confidentiality, 完整性或可用性受到损害?
  2. 识别威胁: What are some of the potential causes of assets or information becoming compromised? Threat modeling is an important activity that helps add context by tying risks to known threats 和  漏洞 和 the different ways threats can exploit risks 和 disrupt an entire company’s operations.
  3. 优先考虑风险报告通常在前两个步骤中建立和传播, 因此,在这个阶段可以考虑到上下文. Key criteria one must keep in mind when adding context is knowledge of the existing threat l和scape 和 consideration of how threats may evolve.
  4. 行为: Now would be the time to implement remediation controls: 应用ing a patch for a vulnerability, 建立防火墙规则, 确保 身份和访问管理(IAM) 协议已经制定并更新.

管理云中的风险的最佳实践

选择信誉良好的云服务提供商

重要的是要选择一个CSP,它不仅支持SRM的末端, 但这也是一个有多年经验支持的决定, 可靠的法规和遵从性标准, 随时间变化的一致性能, 以及他们的服务/架构与您的需求的匹配程度. A security team must also ensure their scanning tools can fit into the workflow you define within that CSPs platform.

在云中,事情发生得很快, 风险通常在第一次暴露的两分钟内就被利用了, meaning you should be able to access real-time visibility into your environment at any given time instead of waiting for a scheduled scan.

进行彻底的风险评估 

Regularly conduct risk assessments via the steps outlined in the previous section. 从过程的前两个步骤收集的数据, 然而, 仍然面临着规模的现实, 速度, 和 complexity of cloud environments creates a situation where the amount of risk signals/alerts is so vast you simply can't address everything at once.

像这样, it’s imperative to prioritize the risk signals that present the most risk to the business 和 have the highest likelihood of exploitation. 这需要在完整的背景下实时完成, 因为风险信号本身并不能提供采取行动所需的全面细节.

监测异常情况

Extend coverage into runtime 和 monitor for anomalous activity based on an established baseline of what "normal" looks like. Detecting anomalous behavior – 和 thus potential threats – into runtime helps to correlate behaviors across multiple logged activities. It’s best to target a solution that can consolidate runtime threat detections 和 provide context by associating the findings with the affected cloud resource.

调查结果和背景什么都不是, 然而, 如果没有人意识到这一事实,就会发生异常情况. Teams should calibrate notifications 和 alerts to go to specific personnel who can most quickly remediate the issue.

加密传输和静止的数据 

数据在任何状态下都是敏感的, so it’s important to implement risk- management tools as early in the development process as possible. 这有助于避免团队之间的摩擦, 还可以在关键构建和运行时过程中持续保护数据. 数据应该总是 静态加密 默认情况下.

In this way of protecting data at all times, it’s probably a good idea to also establish a 最低权限访问(LPA) 协议. This helps to set the minimum amount of access a person or machine will need to do the job, 同时在数据的整个生命周期中保护数据.

云风险管理中的业务连续性

In the event of a significant cloud-security incident, it won’t be business as usual. However, business can 和 should certainly continue to whatever extent possible. 因此, it’s critical to have a business-continuity plan in place in the event of just such an incident. 该计划的一些关键组成部分包括: 

  • 灾难恢复:这是SOC恢复正常业务操作流程的时间. 如果在利益相关者和分析师需要数据时无法获得数据, 需要有一个适当的计划来尽快恢复它. Documentation is key to disaster planning so teams can underst和 what will 和 will not be part of your backup system. 维护一个完整系统的副本是非常昂贵的, 因此,灾难恢复计划可能只考虑部分恢复.
  • 备份和恢复过程: Having an automated, offline backup can help to smoothly recover from a destructive virus or ransomware攻击. 的 key here is to have scheduled backups that are usable for restore operations. Outdated backups are less valuable than recent ones – though better than nothing – 和 backups that don’t restore properly are of no value. No one wants to engage in stressful, frantic scrambling 和 costly downtime/data-loss.
  • 事件响应计划: An 事件响应计划 should include buy-in from key stakeholders; clearly defined roles, 责任, 和 processes; 和 technologies 和 partnerships to enable quick action. 当检测到异常或发生违规时, it’s certainly worth it to know the steps that need to be taken 和 who needs to take them.

    Perhaps the most important aspect of business continuity is reporting 和 communication of risk to all stakeholders in the organization, 无论是从高层到领导层,还是横向到其他团队.

阅读更多关于云风险管理的信息

2022 Cloud Misconfigurations Report: Latest 云安全 Breaches 和 Attack Trends

了解Rapid7的云风险管理解决方案

云安全:博客的最新消息