For remote access security on the corporate ICT infrastructure side, additional measures should also be taken: install a fail-safe remote access gateway (e.g. Cisco Firepower), access control tools, and network anomaly monitoring using, for example, Cisco Stealthwatch . If a terminal access or VDI scheme is selected as the remote access architecture, then at the “landing” point of terminal sessions, it is necessary to ensure their protection and continuously monitor any anomalies that may characterize both compromises of remote computers and virtual “absences” of employees. In both cases, the Cisco Tetration solution can be used , which allows monitoring the operation of applications in corporate data centers from a security point of view, etc.
If, a company decides to use cloud applications (cloud el salvador whatsapp data programs, storage, mail, CRM services, the Desktop-as-a-Service concept, etc.), it is necessary to make sure that these resources are sufficiently protected on the side of cloud providers. If the security as a service (SaaS) model is used, tools such as Cloud Access Security Broker should be used, for example, Cisco Umbrella CloudLock , which allow, by analyzing cloud service logs via API, to identify threats and anomalies in them, such as data leakage, password guessing, employee abuse, violation of the law, etc. When using IaaS or PaaS cloud computing models, you can use both traditional security solutions implemented in the form of virtual solutions and specialized tools for cloud monitoring, for example, Cisco Stealthwatch Cloud .
It should be taken into account that Russian cloud providers, even among the leaders, still consider cybersecurity tasks as secondary and, at best, implement only basic security functions, since today they are faced with the task of survival or market capture. They do not provide for the integration of their services on the client side into corporate security monitoring systems. Thus, it is almost impossible to retrieve logs from Russian clouds in order to enter them into the corporate security event management system (SIEM), transfer them to the corporate center for monitoring and responding to information security incidents (SOC) in order to control the state of corporate information security. But the leaders of foreign cloud computing (Amazon, Google, Microsoft) are doing much better in terms of ensuring the information security of their clients.
When switching to remote work,
-
relemedf5w023
- Posts: 431
- Joined: Sun Dec 22, 2024 7:15 am