Common Cloud Attacks: An Inside Look at Open S3 Buckets

It can be challenging to secure your organization’s move to the cloud. Public cloud threats are more common than you might think and attacks come in many different forms (e.g. open S3 buckets, unprotected Kubernetes consoles or unprotected MongoDB instances). Plus, the adversaries we face daily are highly automated, employing advanced tools and techniques to identify vulnerabilities and misconfigurations and expose sensitive data being stored or shared in the cloud. This video offers a glimpse into the mindset and toolbelt of the adversary. See the world through the attacker’s eyes in the form of an actual attack targeting an open S3 bucket and gain a new perspective to help inform your security defenses.


 

RedLock At a Glance

With RedLock by Palo Alto Networks®, organizations can maintain compliance, govern security, and enable security operations across public cloud computing environments.
  • 1
  • 6858

SECURITY FIRST: Creating a Secure, Compliant Public Cloud Environment

This e-book provides a framework for developing a security-first approach to monitoring the state of your cloud environment, applying rapid fixes, and gaining control over all your operations in the cloud.
  • 1
  • 86