5 Steps for Enhanced Security of Applications in the Cloud

April 21, 2016 Off By David

Grazed from CSO. Author: Carric Dooley.

When you moved your applications to the cloud, your attack surface changed while the vulnerabilities at the application, database, and network level persisted. To address these issues, securing your cloud perimeter, preventing unauthorized access, and protecting your data is crucial.

The first step to reduce the attack surface is to run a port scan specific to an instance IP and lock down all the unnecessary open ports. In addition, be sure to lock down your meta and user data. Detailed instructions on how to perform these security measures in AWS are available from our team…

Let’s dig a little deeper into preventing unauthorized access to your cloud servers, in particular, in Amazon Web Services (AWS). Using Identity and Access Management (IAM), you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. Here are 5 best practices for setting up secure Identity and Access Management in AWS:…

Read more from the source @ http://www.csoonline.com/article/3059515/cloud-computing/5-steps-for-enhanced-security-of-applications-in-the-cloud.html