Skip to content

Best Practices for Proper Cloud Configuration

Through the digital transformation, now driven by the Covid-19 pandemic, we see a massive migration to decentralized, cloud-based models. And those who already use these models will further accelerate the migration to the cloud. According to Gartner, by 2021, more than half of global companies that already use Cloud will adopt a strategy in a 100%-Cloud environment.

Proper protection of this type of environment becomes a growing concern for Security teams and a business must. Thus, the risks associated with the lack of proper protection of the Cloud environment must be considered not only by the Security team but also by senior management, in order to ensure the organizations’ digital sovereignty over data, in addition to business continuity.

Learn more: Remote Work and Increased Usage of Cloud

Lacework researchers, for example, found more than 22,000 container orchestration dashboards and API management systems open on the internet. Among the applications Lacework has found during the research, we have Kubernetes, Mesos Marathon, Swagger API, Red Hat Openshift, and Portainer from Docker Swarm and Swarmpit. Also, according to the research, 95% of these dashboards and management systems were stored on Amazon Web Services (AWS). Although the vast majority of these interfaces have privileged credentials for access control, the researchers consider it an issue that these interfaces are exposed on the internet. This is because anyone with access to dashboards is able to perform tasks such as starting or stopping workloads, adding or removing applications, or even configuring security controls.

Against this background, it would be very easy for security teams to hand over responsibility for the cybersecurity aspect to CSPs (Cloud Service Providers). It is worth mentioning, however, that in distributed environments, organizations should not rely only on their cloud providers to ensure this protection. If the interfaces are not properly configured, the attack surface increases considerably, which brings a greater risk of cyberattacks to organizations’ infrastructure.

Also, new regulatory requirements, such as GDPR and LGPD, require adequate data protection, which can lead to heavy sanctions if not met. For organizations that treat personal data of European citizens, this figure can reach up to 50 million euros, or 50 million reais if the organization treats personal data of Brazilians and is subject to the LGPD, considering that the Brazilian legislation is already in force.

Some of the best practices that can be implemented by the Security teams to reinforce the organizations’ behavior when it comes to the security of Cloud environments and avoid data leaks include:

Having an understanding of their cloud environments

While ease and convenience bring together some of the biggest advantages of using services in a cloud environment, the implementation of workloads is not as trivial as it seems. The security team must commit itself to know all the configurations and permissions of its Cloud-based services, and thus leverage the maximum of the security features integrated with the contracted services. Even though it is an activity that requires extensive effort, it is necessary to ensure the security of the distributed environments.

Checking and configuring credentials and permissions

Organizations that are implementing Cloud approaches may find that using the default security settings is enough to prevent their workloads from being compromised. However, these settings are very basic or even non-existent. Given this, the recommendation is that those responsible for security in the Cloud environment constantly check credentials and permissions and ensure that access to workloads is limited to those who really need access, ensuring the implementation of the Principle of Least Privilege. This can be achieved through a Privileged Access Management solution or PAM. Besides, the use of features such as Multifactor Authentication (MFA) ensures an additional layer of security to the environment immediately.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

TÜV Rheinland attends 14th Shanghai International Electric Vehicle Supply Equipment Fair

From August 26 to August 28, the 14th Shanghai International Electric Vehicle Supply Equipment Fair (EVSE) was held at the Shanghai New International Expo Center. TÜV Rheinland, an internationally independent third-party testing, inspection and certification organization, attended with a comprehensive display of its professional and one-stop service capability covering the upstream and downstream segments of the industry chain.

With the rapid implementation of the “New Infrastructure” strategy, the local subsidy for purchasing new energy vehicles is being gradually transferred to such segments as the construction and operation of charging infrastructure and the use and operation of new energy vehicles. In addition, electrification of buses and taxis, electrification of logistics transportation, and the increasing demand for charging services in the timeshare rental market will further promote the flourishing of the charging pile market.

The only company to win Golden Pile Award 2020 Excellent Brand of Testing and Certification Service for Charging Facility

On the morning of August 26, the Golden Pile Award 2020 Top 10 Charging Facility Brands Awarding Ceremony was held. The Golden Pile Award is an annual event recognizing development achievements in China’s charging technology. It aims to encourage outstanding enterprises to enhance technology innovation and improve product quality and service level, so as to promote the construction and development of China’s charging infrastructure. With leading technology and quality service in the testing and certification of charging equipment, TÜV Rheinland was awarded the 2020 Excellent Brand of Testing and Certification Service for Charging Facility, and is the only testing and certification organization to have won the award.

As a global leading technology service provider, TÜV Rheinland has rich experience of nearly 10 years in the field of charging and swapping systems. It can provide product testing and certification for charging piles, charging stations, pantographs, swapping stations, charging cables, charging connectors, and related parts. It can also provide audits and technology assessments for charging and swapping systems and provide automobile companies and charging operation service providers with comprehensive localization services, including charging pile installer training, operator qualification audits, and field installation audits.

During the EVSE, TÜV Rheinland issued corresponding product certificates to more than ten charging equipment enterprises, and signed cooperation agreements with numerous companies, comprehensively demonstrating its technology advantage and service capability covering the entire industry chain.

Safety assessment regulations project for HPC equipment liquid cooling systems launched

For a long time, range and charging time have been two key factors restricting the development of new energy vehicles. With range now increasing, battery capacity needs to be increased accordingly, and charging time will also become longer. In order to make new energy vehicles more practical and convenient, high power charging (HPC) is an effective way to reduce charging time, but this also puts the charging system at risk of overheating. Therefore, a liquid cooling system has been adopted for HPC products, with a special circulation channel set in the cable and charging connector and liquid coolant added in. A power pump pushes the liquid circulation and achieves heat dissipation, and simultaneously cools the charging connector and the direct current pin in the vehicle inlet. Built-in temperature sensors measure system temperature in real time. By evaluating the temperature-rise data, a control unit can effect timely adjustment of the operating parameters of the liquid cooling system, thereby solving the heat dissipation problem and ensuring the safe and stable operation of the charging system.

At the EVSE, TÜV Rheinland and 20 upstream and downstream companies focused on HPC technology gathered to launch a safety assessment regulations project for HPC equipment liquid cooling systems, giving full play to their respective advantages and joining hands to promote the establishment of system safety assessment regulations. The 20 companies are as follows: ABB Chargedot, Aptiv, Amphenol (Zhuhai), OMG, Haoli Technology, Jiangyin Zhongding, Kangni New Energy, Kunshan Hwatek, Phoenix (Nanjing), Shanghai Huber+Suhner, Wanbang (Star Charge), Wuxi Xinhongye, EN-plus, EAST, Infypower, Far East Cable, Uchen New Energy, UUGreenPower, Zhengqi Machinery, and JONHON.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About TUV
The TÜV Rheinland is a leading provider of technical services worldwide. Since our foundation in 1872, we have been providing safe and sustainable solutions for the challenges arising from the interaction between man, the environment and technology.As an independent, neutral and professional organization, we are committed to working towards a future that can fulfil the needs of both mankind and the environment in the long term.

About The Microfibre Consortium (TMC)
Founded in November 2018, The Microfibre Consortium now has 40 members from across the outdoor sector, sports, high street, luxury fashion and home textiles, with a combined turnover of over €250 billion. TMC also has a rapidly growing network of research institutions and affiliates from around the world, supporting the consortium’s mission for increased global topic alignment collaboration and research to understand and reduce microfibre pollution.

ESET Endpoint Protection, Detection and Response solutions commended in KuppingerCole Market Compass

BRATISLAVA – August 19, 2020 – ESET, a global leader in cybersecurity, has been highly commended in the KuppingerCole Market Compass 2020 report. The report analyzed ESET’s Endpoint Protection, Detection and Response solutions, including ESET Endpoint Security and ESET Enterprise Inspector, praising ESET for its universal coverage.

KuppingerCole Analysts is an international and independent analyst organization that supports companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges. The Market Compass provides an overview of a market segment and the vendors in the Endpoint Protection, Detection & Response (EPDR) market. It covers the trends that are influencing this market segment and the essential capabilities required of solutions in this space and provides ratings on how well the solutions meet expectations. 

ESET achieved high scores across all categories, achieving the third highest number of strong positives out of a total 17 vendors, with top scores in six out of nine criteria and the rest being evaluated as positive. KuppingerCole assesses vendor solutions on nine key criteria – Security, Interoperability, Usability, Deployment, Malware Protection, Threat Hunting, Automated Responses, Secondary EPP and Common Functions – with strong positive as the highest possible rating.  

In addition to broad support for a variety of operating systems, KuppingerCole cites ESET’s rare technical capability of being able to scan the Unified Extensible Firmware Interface (UEFI) as a core strength. ESET is further commended for its complete suite of detection and protection techniques, and excellent implementation of multiple, advanced ML algorithms for discovering malicious activity patterns. As one of the very few vendors on the market, ESET leverages Windows AMSI, and provides a Script Scanner, Advanced Memory Scanner and Ransomware Shield. The report also highlights ESET’s contribution to mapping the MITRE ATT&CK framework in order to facilitate analysis of malicious actors. KuppingerCole also commend ESET Enterprise Inspector’s support of interactive live querying and memory analysis with automated response options like network isolation of suspect nodes, process termination, moving/deleting files and running scripts.  

ESET Enterprise Inspector, ESET’s own proprietary solution for targeted attacks and advanced persistent threats, was previously evaluated in the KuppingerCole Executive View Report 2020. The report highlights ESET’s practice of publishing threat intelligence discoveries for the benefit of the community, and the additional detailed security analysis and threat research gained from ESET’s powerful cloud-based reputation system, the global LiveGrid®. ESET Enterprise Inspector can also generate attribution theories with high confidence levels, with customers having flexibility in creating rules for detection thresholds and alerting, filtering out certain conditions that may occur so as to reduce false positives, or customers themselves can design rules for assignment of attributes and even edit event attributes during investigations.  

Ignacio Sbampato, Chief Business Officer at ESET, commented, “At ESET, we are dedicated to providing cutting-edge security solutions for businesses, and we are proud to be continually recognized by expert analysts for our advanced software solutions. The digital threat landscape is constantly evolving and adapting, and it is vital that organizations and their systems are adequately protected. Reports such as the KuppingerCole Market Compass are vital in holding us accountable to the high standards we set for our solutions, and our dedication to keeping enterprises and their data safe and secure around the world.”

To find out more about ESET’s Endpoint Detection and Response solution, click here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×