{"id":81666,"date":"2024-03-11T02:11:59","date_gmt":"2024-03-11T02:11:59","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81666"},"modified":"2024-03-11T02:18:25","modified_gmt":"2024-03-11T02:18:25","slug":"what-is-cloud-security","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/","title":{"rendered":"What is Cloud Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81666\" class=\"elementor elementor-81666\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bb9e2cb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bb9e2cb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1902c61\" data-id=\"1902c61\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6e1d693 elementor-widget elementor-widget-text-editor\" data-id=\"6e1d693\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>An organization\u2019s incident response plan is the set of measures and procedures it has in place to respond to and protect against a cyberattack. An effective incident response plan can reduce the damage experienced after a security breach and ensure faster systems recovery.<\/p>\n<p>As the rates of cybercrime continue to increase, incident response plans have become indispensable to the organization\u2019s security protocol. However, it\u2019s important to understand why and how incident response strategies for cloud-based infrastructures and systems differ from traditional incident management.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ea6c3f elementor-widget elementor-widget-heading\" data-id=\"7ea6c3f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Pillars of Information Security Management<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef0c67f elementor-widget elementor-widget-text-editor\" data-id=\"ef0c67f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tAccording to the <span style=\"color: #7baeda;\">Cloud Incident Response Working Group Charter<\/span>, there are three key elements that set cloud incident response apart from traditional incident response methods.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a17ef53 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a17ef53\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bc8124c\" data-id=\"bc8124c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-047a403 elementor-widget elementor-widget-image\" data-id=\"047a403\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/cloud-3.png\" class=\"attachment-large size-large wp-image-81671\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d2a746 elementor-widget elementor-widget-text-editor\" data-id=\"8d2a746\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tGovernance\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2079195 elementor-widget elementor-widget-text-editor\" data-id=\"2079195\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tWhen organizations engage cloud services with digital assets located across the globe, it is challenging to investigate an incident together.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7b55bc4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7b55bc4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf02579\" data-id=\"cf02579\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3800dd1 elementor-widget elementor-widget-image\" data-id=\"3800dd1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/cloud-3.png\" class=\"attachment-large size-large wp-image-81671\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-163861c elementor-widget elementor-widget-text-editor\" data-id=\"163861c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tVisibility\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba05ab2 elementor-widget elementor-widget-text-editor\" data-id=\"ba05ab2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIn the cloud, organizations do not have the same visibility rights as in a traditional IT environment. In some instances, they can only view logs provided by the cloud service providers for the specific service being used. It can be a challenge to understand an incident and curb its spread.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0d7441c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0d7441c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9d50775\" data-id=\"9d50775\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23cf676 elementor-widget elementor-widget-image\" data-id=\"23cf676\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/cloud-3.png\" class=\"attachment-large size-large wp-image-81671\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f3a5e4 elementor-widget elementor-widget-text-editor\" data-id=\"9f3a5e4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tShared Responsibility\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1ccba3 elementor-widget elementor-widget-text-editor\" data-id=\"a1ccba3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tCloud security has various stakeholders. In some services, customers are responsible for their data and cloud service providers for the underlying infrastructure and services.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-870714e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"870714e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cae06a2\" data-id=\"cae06a2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f582a8 elementor-widget elementor-widget-heading\" data-id=\"0f582a8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Steps of the Cloud Incident Handling Process<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8297c7 elementor-widget elementor-widget-text-editor\" data-id=\"f8297c7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tAccording to the<span style=\"color: #7baeda;\"> Cloud Incident Response Working Group\u2019s framework<\/span>, the incident-handling process in the cloud can be divided into four phases:\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6a3f04 elementor-widget elementor-widget-image\" data-id=\"d6a3f04\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1184\" height=\"293\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/steps.png\" class=\"attachment-full size-full wp-image-81672\" alt=\"\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/steps.png 1184w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/steps-300x74.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/steps-1024x253.png 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/steps-768x190.png 768w\" sizes=\"(max-width: 1184px) 100vw, 1184px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1da5746 elementor-widget elementor-widget-heading\" data-id=\"1da5746\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident Detection in the Cloud<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b43954 elementor-widget elementor-widget-text-editor\" data-id=\"6b43954\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>An integral aspect of a company\u2019s security infrastructure is incident detection, the practice of monitoring networks, servers, and IT assets for suspicious activity. Effective incident detection can find intruders in an organization\u2019s infrastructure and chart appropriate incident response strategies.<\/p><p>Detecting security breaches in the cloud is a daunting task. Because traditional incident detection mechanisms are not effective in the cloud environment, it is important that organizations hire security experts who know how to effectively respond to cloud-based data breaches.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0feee0f elementor-widget elementor-widget-heading\" data-id=\"0feee0f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Importance of Incident Response in the Cloud<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e3f2c5 elementor-widget elementor-widget-text-editor\" data-id=\"4e3f2c5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>In a perfect world, successful cyberattacks would never occur, but realistically, security breaches are unavoidable. Companies need secure plans and strategies to minimize the risks associated with security incidents.<\/p><p>If a security incident is identified, an incident response plan enables security teams to defend affected applications and infrastructures against compromises, insider threats, and access misuse. An effective incident response strategy can prevent excessive damage and reduce business disruption and enables organizations to quickly contain issues and respond effectively.<\/p><p>Reputation, revenue, and customer trust are at stake in the event of a cyberattack. The goal of any incident response plan is to restore operations as quickly as possible, minimize losses, and fix vulnerabilities.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4c28fc elementor-widget elementor-widget-heading\" data-id=\"a4c28fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The Cloud Incident Response Life Cycle<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b4f7d2 elementor-widget elementor-widget-text-editor\" data-id=\"7b4f7d2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThe<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response-life-cycle\/\" target=\"_blank\" rel=\"noopener\"> incident response life cycle<\/a> is a structured guideline that outlines various stages of safeguarding sensitive data and thwarting data breach attempts. The incident response life cycle describes the actions needed to quickly resolve an issue and ensure the continuity of business operations. Effective incident handling is an integral part of security management.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8025f6b elementor-widget elementor-widget-heading\" data-id=\"8025f6b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Let\u2019s look at the four phases of the incident response life cycle in the cloud.<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e1a4ae elementor-widget elementor-widget-image\" data-id=\"8e1a4ae\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1106\" height=\"366\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/img-1-4.png\" class=\"attachment-full size-full wp-image-81673\" alt=\"\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/img-1-4.png 1106w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/img-1-4-300x99.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/img-1-4-1024x339.png 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/img-1-4-768x254.png 768w\" sizes=\"(max-width: 1106px) 100vw, 1106px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fe1bf2 elementor-widget elementor-widget-text-editor\" data-id=\"9fe1bf2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Preparation<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55e7368 elementor-widget elementor-widget-text-editor\" data-id=\"55e7368\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Without predetermined guidelines, response teams cannot effectively address a security breach. Organizations must establish policies, procedures, and agreements for incident response management.<\/p><p>It\u2019s important to create standards to enable seamless operations after an incident. Organizations must also conduct cyber awareness training for their employees as well as assessments to evaluate the efficacy of their incident response measures.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a59baad elementor-widget elementor-widget-text-editor\" data-id=\"a59baad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Detection and Analysis<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8397cce elementor-widget elementor-widget-text-editor\" data-id=\"8397cce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tCybersecurity teams need to monitor security events so that they can detect, alert, and report potential threats. Analysis of this information can help organizations identify vulnerabilities and determine where they need to bolster their security posture.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3a465c elementor-widget elementor-widget-text-editor\" data-id=\"c3a465c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tContainment, Eradication, and Recovery\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-127f3ca elementor-widget elementor-widget-text-editor\" data-id=\"127f3ca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThe goal of this third phase is to minimize damage and restore normal operations as soon as possible. To prevent further breaches, cybersecurity teams must isolate the compromised system or device from the rest of the network, then perform a coordinated shutdown. They should then ensure that all infected devices have been wiped clean, and that all passwords have been changed. Once the incident is contained, security experts can determine the cause of the attack and implement measures to prevent further breaches. The final steps are to check all systems and networks, recover data, and restore business operations.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb15d2d elementor-widget elementor-widget-text-editor\" data-id=\"bb15d2d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tPost-Mortem\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbd82ce elementor-widget elementor-widget-text-editor\" data-id=\"dbd82ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tAfter a security breach, a cloud forensic investigation must be conducted to analyze the incident response steps and, if necessary, determine how the protocol can be improved. Cloud environments rely heavily on continuous improvement, so tracking and analyzing incidents help security teams improve at preventing future attacks.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d80669 elementor-widget elementor-widget-heading\" data-id=\"2d80669\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Best Practices for Cloud Incident Response<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59ae555 elementor-widget elementor-widget-text-editor\" data-id=\"59ae555\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Since millions are at stake, businesses constantly evolve their <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/incident-management-best-practices\/\" target=\"_blank\" rel=\"noopener\">incident response practices<\/a> to thwart cyberattacks. To maintain a strong cybersecurity posture, organizations must constantly iterate their incident management process.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e4d3e9 elementor-widget elementor-widget-heading\" data-id=\"3e4d3e9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Here are some best practices to secure cloud computing:<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9d41e1f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9d41e1f\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-86d54c4\" data-id=\"86d54c4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f26c27d elementor-widget elementor-widget-text-editor\" data-id=\"f26c27d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tFocus on monitoring systems\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d73ae1 elementor-widget elementor-widget-text-editor\" data-id=\"7d73ae1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tFocus more on monitoring systems like applications, users\u2019 behavior, and APIs. Find past information on successfully handling cloud incidents to quickly detect, respond, remove, and prevent attacks.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6b2c57c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6b2c57c\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-fc0265d\" data-id=\"fc0265d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd7fd69 elementor-widget elementor-widget-text-editor\" data-id=\"dd7fd69\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tUse the best alerting tools\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-932cd36 elementor-widget elementor-widget-text-editor\" data-id=\"932cd36\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tUse popular alerting tools like PagerDuty and Slack to enable the existing security system and alternate between devices on demand.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6b71984 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6b71984\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-a8b388a\" data-id=\"a8b388a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e274d1 elementor-widget elementor-widget-text-editor\" data-id=\"4e274d1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tFollow shared responsibility model\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe63e43 elementor-widget elementor-widget-text-editor\" data-id=\"fe63e43\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThough most cloud providers have their incident response team, users add an extra security system that matches with the vendor\u2019s system. Both parties need to work under a shared responsibility model.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e4992ea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e4992ea\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3a54d84\" data-id=\"3a54d84\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cd062a elementor-widget elementor-widget-text-editor\" data-id=\"8cd062a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tManage Access to Cloud Applications\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8650286 elementor-widget elementor-widget-text-editor\" data-id=\"8650286\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThere is usually more than one user in a cloud application who has access. To protect sensitive data, set up passwords, and manage access within the core group.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ba3a116 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ba3a116\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5fb674c\" data-id=\"5fb674c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bf3c93 elementor-widget elementor-widget-text-editor\" data-id=\"7bf3c93\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tProtect your cloud logs\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e7c2a0 elementor-widget elementor-widget-text-editor\" data-id=\"6e7c2a0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tMost cloud providers allow their customers to have access to cloud logs to some insight about basic service operations, such as cloud access logs. For extra fees, some cloud providers will allow their customers to get full logs, such as cloud audit logs and errors logs. Such logs can be stored on customer on-premises devices, which is ideal. The log is the most important element in any digital investigation, and this is why attackers always try to compromise the logs and delete them to clear their traces. Always ensure your cloud logs are stored in a secure location and make them only accessible to authorized personnel.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2b3281 elementor-widget elementor-widget-heading\" data-id=\"e2b3281\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is SOAR?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf3d648 elementor-widget elementor-widget-text-editor\" data-id=\"cf3d648\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThe term \u201csecurity orchestration, automation, and response\u201d (SOAR), originally coined by the research firm Gartner, refers to a set of software programs that collect threat information, automate routine responses, and triage more complex threats, minimizing the need for human intervention.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6838a08 elementor-widget elementor-widget-text-editor\" data-id=\"6838a08\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tSOAR platforms allow organizations to streamline security operations in three key areas:\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fc8fbcb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fc8fbcb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-8f59663\" data-id=\"8f59663\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f5f06d elementor-widget elementor-widget-image\" data-id=\"1f5f06d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"145\" height=\"145\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Incident-response.png\" class=\"attachment-full size-full wp-image-81674\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-363a674 elementor-widget elementor-widget-text-editor\" data-id=\"363a674\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIncident response\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-98e2196\" data-id=\"98e2196\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d69910f elementor-widget elementor-widget-image\" data-id=\"d69910f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"145\" height=\"145\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Orchestration-and-automation.png\" class=\"attachment-full size-full wp-image-81675\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-955d7fb elementor-widget elementor-widget-text-editor\" data-id=\"955d7fb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tOrchestration and automation\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-93b2a9a\" data-id=\"93b2a9a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c8f271 elementor-widget elementor-widget-image\" data-id=\"8c8f271\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"145\" height=\"145\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Threat-intelligence-TI-management-capabilities.png\" class=\"attachment-full size-full wp-image-81676\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b6032e elementor-widget elementor-widget-text-editor\" data-id=\"6b6032e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThreat intelligence (TI) management capabilities\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bd5a5b elementor-widget elementor-widget-text-editor\" data-id=\"3bd5a5b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThe main objective of a SOAR solution is to streamline security operations. In simplest terms, it\u2019s the automatic handling of tasks related to security operations.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31c9bac elementor-widget elementor-widget-text-editor\" data-id=\"31c9bac\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Let\u2019s take a closer look at each of the elements of a SOAR platform:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3ad357 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b3ad357\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/elementor\/assets\/css\/widget-icon-list.min.css\">\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security Orchestration: Facilitates seamless operation among multiple software and hardware components<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Automation: Executes security-related tasks, such as vulnerability scans and log searches, without human intervention and uses customized automations to handle organization-specific security risks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Response: Uses pre-programmed strategies to respond to security threats\u2014for example, by automatically isolating devices or interrupting transfers<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06d6690 elementor-widget elementor-widget-text-editor\" data-id=\"06d6690\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Automation is a vital component of responding to security incidents in a cloud environment. Automating incident response helps organizations scale their capabilities, rapidly reduce the scope of compromised resources, and eliminate repetitive work by security teams. For instance, SOAR technology can be used as part of Amazon Web Services (AWS) Cloud incident response to unify workflows across cloud and on-premises infrastructures.<\/p><p>In today\u2019s environment of widespread and sophisticated cyberthreats, SOAR platforms are key to managing the seemingly endless stream of cyberattack attempts that many organizations face. The main drivers for the rise in the adoption of SOAR technologies are the shortage of skilled <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/about-certified-cloud-security-professionals\/\" target=\"_blank\" rel=\"noopener\">cloud security professionals<\/a>, the evolution of advanced cyberthreats, and increases in the number of security alerts.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d63972c elementor-widget elementor-widget-heading\" data-id=\"d63972c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Benefits of SOAR<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53c8ad0 elementor-widget elementor-widget-text-editor\" data-id=\"53c8ad0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>For analysts overwhelmed by the growing volume of threat alerts received each day, SOAR platforms are an invaluable resource. The main purpose of a SOAR solution is to provide a standardized process for data aggregation that automates threat detection and response processes, reducing analysts\u2019 workload and allowing them to focus on other mission-critical tasks.<\/p><p>For analysts overwhelmed by the growing volume of threat alerts received each day, SOAR platforms are an invaluable resource. The main purpose of a SOAR solution is to provide a standardized process for data aggregation that automates threat detection and response processes, reducing analysts\u2019 workload and allowing them to focus on other mission-critical tasks.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1885e93 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1885e93\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-dee7d12\" data-id=\"dee7d12\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eac3605 elementor-widget elementor-widget-text-editor\" data-id=\"eac3605\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tImproves efficiency\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e01da1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3e01da1\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-block-end:0;flex-grow:1;border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider--element-align-start .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-start .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-start .elementor-divider__element{margin-inline-start:0}.elementor-widget-divider--element-align-end .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-end .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-end .elementor-divider__element{margin-inline-end:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1801e99 elementor-widget elementor-widget-text-editor\" data-id=\"1801e99\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Monitoring many security technologies can create enormous strain on security analysts. Instead of spending time on mundane tasks such as gathering and sorting through metrics and reports, cybersecurity personnel can relegate much of this work to the automation capabilities of SOAR platforms.<\/p><p>Automated <a href=\"https:\/\/www.eccouncil.org\/cybersecurity\/what-is-incident-response\/\" target=\"_blank\" rel=\"noopener\">incident response<\/a> takes the heat-of-the-moment guesswork out of event handling, limiting cyberattack dwell time and overall business impact. SOAR platforms can help organizations improve their productivity and capacity to address more threats by allowing security staff to work smarter, not harder.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fb8cf7b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fb8cf7b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6969291\" data-id=\"6969291\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d76b528 elementor-widget elementor-widget-text-editor\" data-id=\"d76b528\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tReduces response time\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4122a7f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4122a7f\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fca87cd elementor-widget elementor-widget-text-editor\" data-id=\"fca87cd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tWith the increasing volume of aggressive cyberthreats, a rapid security response is vital in minimizing the risk associated with a breach. SOAR solutions help organizations reduce the time needed to validate potential threats and respond to alerts without human intervention, and help facilitate accurate incident assessment and prioritization.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-45473ff elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"45473ff\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ad52f02\" data-id=\"ad52f02\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-decd8e6 elementor-widget elementor-widget-text-editor\" data-id=\"decd8e6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tOptimizes Threat Intelligence\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efda833 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"efda833\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d08ecdc elementor-widget elementor-widget-text-editor\" data-id=\"d08ecdc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tSOAR platforms provide immediately actionable, high-quality information that incident response teams can use to identify and respond to risks. SOAR software aggregates and validates data from various sources, such as threat intelligence and incident response platforms and security solutions like intrusion detection systems (IDSs) and intrusion prevention systems (IPSs). This helps security professionals contextualize incidents, make better-informed decisions, and accelerate incident detection and response.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b6cb8d1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b6cb8d1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-9069f1e\" data-id=\"9069f1e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96cbad6 elementor-widget elementor-widget-text-editor\" data-id=\"96cbad6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIncreases Flexibility, Extensibility, and Collaboration\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42b5148 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"42b5148\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5506890 elementor-widget elementor-widget-text-editor\" data-id=\"5506890\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tSOAR solutions provide organizations with the flexibility to either adapt the templated use case workflows or build new workflows which offer additional opportunities for collaboration. They collate all data and make it accessible in a centralized location, which makes collaboration, problem-solving, and resolution easier and more effective.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b4da874 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b4da874\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d1ed846\" data-id=\"d1ed846\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e3148b elementor-widget elementor-widget-text-editor\" data-id=\"3e3148b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tReduces Business Costs\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4b1dc1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e4b1dc1\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8e7aa2 elementor-widget elementor-widget-text-editor\" data-id=\"c8e7aa2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tSOAR platforms can lead to significant cost savings when it comes to reporting and alert handling, as they play a significant role in automating security procedures and reducing the impact of breaches. Consequently, SOAR tools can minimize staffing expenses, costs associated with disruptions to business operations, and other financial losses.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9630ab7 elementor-widget elementor-widget-heading\" data-id=\"9630ab7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Is SOAR Different from SIEM?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-74d9645 elementor-widget elementor-widget-text-editor\" data-id=\"74d9645\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Security information and event management (SIEM) tools are software solutions that collect, analyze, and store security-related log data from various tools (e.g., firewall, IDS, IPS, antivirus software) and networking appliances (e.g., proxies) for compliance or auditing purposes. In simpler terms, SIEM platforms help organizations recognize potential threats and vulnerabilities before they can disrupt business operations, thereby enhancing data security in the cloud.<\/p><p>Though SOAR and SIEM platforms have a lot in common, there are differences in their capabilities. While both solutions collect data, they differ in the quantity and type of data they collect as well as the type of response they facilitate. Let\u2019s take a closer look at some of the differences between SOAR and SIEM solutions:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2ed1c19 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2ed1c19\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-9c68f58\" data-id=\"9c68f58\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f160ea8 elementor-widget elementor-widget-text-editor\" data-id=\"f160ea8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a style=\"background-color: transparent; letter-spacing: var(--the7-base-letter-spacing); text-align: var(--bs-body-text-align); text-transform: var(--the7-base-text-transform); word-spacing: normal;\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/security-operation-center\/siem-tools-soc-analysts\/\" target=\"_blank\" rel=\"noopener\">SIEM tools<\/a>\u00a0only raise an alert when a potential threat is discovered. Security analysts need to intervene to investigate more closely, analyze the threat, and remediate any damage. This requires constant fine-tuning and development and often ends up being time-consuming. On the other hand, SOAR platforms reduce human intervention, as they automate the response process and filter out false positives, allowing security teams to handle the alert load quickly and efficiently.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-28f7e28 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"28f7e28\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-479e673\" data-id=\"479e673\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b29f28 elementor-widget elementor-widget-text-editor\" data-id=\"2b29f28\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tSIEM platforms examine various logs and event data from traditional infrastructure component sources, while SOAR software analyzes data from endpoint security software, external threat intelligence feeds, and third-party sources.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-b21b67b elementor-widget elementor-widget-text-editor\" data-id=\"b21b67b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tBoth SOAR and SIEM solutions help security teams improve their efficiency, however, SIEM platforms are better positioned to handle larger volumes of data with varied sources and formats. SOAR tools are superior when it comes to their automation capabilities, flexibility, and integrations library, making them ideal for scenarios where the need for human intervention must be minimized.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45dd51b elementor-widget elementor-widget-heading\" data-id=\"45dd51b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Incident Response in AWS Cloud<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd48961 elementor-widget elementor-widget-text-editor\" data-id=\"fd48961\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Organizations using AWS Cloud should be prepared to detect and respond to security incidents and outline remediation methods that leverage automation to improve response speed.<\/p><p>AWS Cloud uses a shared responsibility model, meaning that AWS is responsible for securing the underlying infrastructure while customers are expected to protect their data and networks. Security experts must continuously monitor the AWS Cloud environment and be ready to respond to and mitigate the impact of potential breaches.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3d46c9 elementor-widget elementor-widget-heading\" data-id=\"f3d46c9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The following steps provide the framework for AWS incident management:<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bc3608 elementor-widget elementor-widget-image\" data-id=\"4bc3608\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"967\" height=\"560\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/img-5-1.png\" class=\"attachment-full size-full wp-image-81677\" alt=\"\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/img-5-1.png 967w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/img-5-1-300x174.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/img-5-1-768x445.png 768w\" sizes=\"(max-width: 967px) 100vw, 967px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04b5577 elementor-widget elementor-widget-text-editor\" data-id=\"04b5577\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tFor a successful <span style=\"color: #428bca;\">AWS cloud incident response strategy<\/span>, it is important to train security teams on cloud technologies, create policies to detect and respond to threats, run penetration tests, and fix the security gaps uncovered in security assessments.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2400b2d elementor-widget elementor-widget-heading\" data-id=\"2400b2d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Incident Response in Microsoft Azure<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8808795 elementor-widget elementor-widget-text-editor\" data-id=\"8808795\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tTo secure the workspace environment in Microsoft Azure, it is of paramount importance to set up an effective incident response process. Running incident response in the cloud can seem daunting, but defining roles and responsibilities in advance can improve efficiency.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbadd4c elementor-widget elementor-widget-heading\" data-id=\"cbadd4c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Azure\u2019s incident response life cycle is a five-step process:<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-121b2ca elementor-widget elementor-widget-image\" data-id=\"121b2ca\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"789\" height=\"556\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Azure-infographic.png\" class=\"attachment-full size-full wp-image-81678\" alt=\"\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Azure-infographic.png 789w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Azure-infographic-300x211.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Azure-infographic-768x541.png 768w\" sizes=\"(max-width: 789px) 100vw, 789px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ecec346 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ecec346\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2bfc829\" data-id=\"2bfc829\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2a8259 elementor-widget elementor-widget-text-editor\" data-id=\"f2a8259\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tDetect\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68e72d6 elementor-widget elementor-widget-text-editor\" data-id=\"68e72d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tSecurity analysts need to be equipped with intelligence capabilities, detection tools, and incident management solutions to accurately and promptly identify potential threats and suspicious activity.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cee0f6 elementor-widget elementor-widget-text-editor\" data-id=\"2cee0f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tAssess\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afd5edd elementor-widget elementor-widget-text-editor\" data-id=\"afd5edd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tConduct a preliminary assessment. The on-call member of the security response team will evaluate the threat and assess whether there is a risk. It\u2019s imperative to assign the investigation an appropriate priority level; events wherein data is at imminent risk should be treated as high severity and fixed as soon as possible. Assign a security incident manager to ensure that the incident response process is handled correctly throughout each stage, and that cross-dependencies are tracked.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe51baf elementor-widget elementor-widget-text-editor\" data-id=\"fe51baf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tDiagnose\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e91889 elementor-widget elementor-widget-text-editor\" data-id=\"1e91889\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tAt this stage, analysts examine the collected data to better understand the security event. At this point, the security incident manager can bring in additional subject matter experts to aid in the investigation.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bbb5d7 elementor-widget elementor-widget-text-editor\" data-id=\"5bbb5d7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tStabilize\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53472e2 elementor-widget elementor-widget-text-editor\" data-id=\"53472e2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tStabilization and recovery processes are designed to repair and restore the services affected by a security breach. In this stage, the security team aims to take mitigation steps to resolve immediate security risks, ensure that the threat has been successfully contained and that corrective measures are being implemented, and identify additional mitigation strategies if needed. The process is tested to ensure that corrective measures are applied effectively to maintain operational success.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73a618f elementor-widget elementor-widget-text-editor\" data-id=\"73a618f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tClose\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76c6bea elementor-widget elementor-widget-text-editor\" data-id=\"76c6bea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tAfter the security breach, an internal post-mortem is conducted to identify any technical or communications lapses, procedural failures, manual errors, or process flaws that might have caused the incident. Response procedures are evaluated for sufficiency and completeness.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c04dcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c04dcf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-da58b1e\" data-id=\"da58b1e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d8d859 elementor-widget elementor-widget-text-editor\" data-id=\"5d8d859\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tReferences\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-602b03c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"602b03c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-c6930bf\" data-id=\"c6930bf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a227480 elementor-widget elementor-widget-text-editor\" data-id=\"a227480\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tAWS. (2020). AWS Security Incident Response Guide. AWS. Retrieved May 27, 2022, from\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-827e7bc elementor-widget elementor-widget-text-editor\" data-id=\"827e7bc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/aws-security-incident-response-guide\/welcome.html<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e2f3078 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e2f3078\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-de258f7\" data-id=\"de258f7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82a2297 elementor-widget elementor-widget-text-editor\" data-id=\"82a2297\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tBhargava, R. (2016, September 2). Best practices for incident response in the age of cloud. NetworkWorld. Retrieved May 24, 2022, from\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e979a96 elementor-widget elementor-widget-text-editor\" data-id=\"e979a96\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>https:\/\/www.networkworld.com\/article\/3116011\/best-practices-for-incident-response-in-the-age-of-cloud.html<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-67992e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"67992e1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-556f19b\" data-id=\"556f19b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c952bff elementor-widget elementor-widget-text-editor\" data-id=\"c952bff\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tCabot Technology Solution. (2017, June 21). 7 effective tips to secure your data in the cloud. HackerNoon. Retrieved May 23, 2022, from\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-864cac3 elementor-widget elementor-widget-text-editor\" data-id=\"864cac3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>https:\/\/hackernoon.com\/7-effective-tips-to-secure-your-data-in-the-cloud-820bfe438d2<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a9d26fc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9d26fc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-adb7010\" data-id=\"adb7010\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2278364 elementor-widget elementor-widget-text-editor\" data-id=\"2278364\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tCloud Security Alliance. (2021, April 8). CSA CXO trust working group charter. Cloud Security Alliance. Retrieved May 23, 2022, from\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-934dd03 elementor-widget elementor-widget-text-editor\" data-id=\"934dd03\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>https:\/\/cloudsecurityalliance.org\/artifacts\/csa-cxo-trust-working-group-charter\/<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b0708c0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b0708c0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2aceac1\" data-id=\"2aceac1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd547aa elementor-widget elementor-widget-text-editor\" data-id=\"cd547aa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tCloud Security Alliance. (2021, November 13). How the incident response lifecycle changes for cloud. Cloud Security Alliance. Retrieved May 27, 2022, from\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9200cce elementor-widget elementor-widget-text-editor\" data-id=\"9200cce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>https:\/\/cloudsecurityalliance.org\/blog\/2021\/11\/13\/how-the-incident-response-lifecycle-changes-for-cloud\/<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-106a8c9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"106a8c9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1d53fd3\" data-id=\"1d53fd3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a800af4 elementor-widget elementor-widget-text-editor\" data-id=\"a800af4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tFugue &#038; Sonatype. (2022). The state of cloud security 2021 report. Fugue. Retrieved May 20, 2022, from\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf6c04f elementor-widget elementor-widget-text-editor\" data-id=\"cf6c04f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\thttps:\/\/resources.fugue.co\/state-of-cloud-security-2021-report\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7f84023 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f84023\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0c32637\" data-id=\"0c32637\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ea73573 elementor-widget elementor-widget-text-editor\" data-id=\"ea73573\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tGoogle. (2022, February 18). Data incident response process. Google Cloud. Retrieved May 27, 2022, from\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07570bc elementor-widget elementor-widget-text-editor\" data-id=\"07570bc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>https:\/\/cloud.google.com\/docs\/security\/incident-response<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b40a50b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b40a50b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-9efa825\" data-id=\"9efa825\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-16d82b8 elementor-widget elementor-widget-text-editor\" data-id=\"16d82b8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tGrand View Research. (2022, February). Cloud computing market size report, 2022-2030. Grand View Research. Retrieved May 20, 2022, from\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6df4d51 elementor-widget elementor-widget-text-editor\" data-id=\"6df4d51\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>https:\/\/www.grandviewresearch.com\/industry-analysis\/cloud-computing-industry<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-200514b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"200514b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5624663\" data-id=\"5624663\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c69f2b elementor-widget elementor-widget-text-editor\" data-id=\"2c69f2b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIeong, R., Lim, S.T., Roza, M., Siow, A., Vandendriessche, S. (2021). Cloud incident response (CIR) framework. Cloud Security Alliance. Retrieved May 23, 2022, from\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7297861 elementor-widget elementor-widget-text-editor\" data-id=\"7297861\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>https:\/\/cloudsecurityalliance.org\/artifacts\/cloud-incident-response-framework\/<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4e948e2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e948e2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8acd756\" data-id=\"8acd756\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-019cd18 elementor-widget elementor-widget-text-editor\" data-id=\"019cd18\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tKatrenko, A. (2020, February 26). Cloud computing attacks: a new vector for cyber attacks. Apriorit. Retrieved May 23, 2022, from\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27a6835 elementor-widget elementor-widget-text-editor\" data-id=\"27a6835\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"wp-embedded-content\" data-secret=\"bjmL40bMOR\"><a href=\"https:\/\/www.apriorit.com\/dev-blog\/523-cloud-computing-cyber-attacks\">Cloud Computing Attacks: Types, Examples, and Prevention Tips<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Cloud Computing Attacks: Types, Examples, and Prevention Tips&#8221; &#8212; Apriorit\" src=\"https:\/\/www.apriorit.com\/dev-blog\/523-cloud-computing-cyber-attacks\/embed#?secret=Tlv7Jt68Ug#?secret=bjmL40bMOR\" data-secret=\"bjmL40bMOR\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4ab94ad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ab94ad\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7d10f82\" data-id=\"7d10f82\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6cfdf6b elementor-widget elementor-widget-text-editor\" data-id=\"6cfdf6b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tLucid Content Team. (n.d.). Cloud incident response best practices. Lucidchart. Retrieved May 27, 2022, from\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a9f7ed elementor-widget elementor-widget-text-editor\" data-id=\"7a9f7ed\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>https:\/\/www.lucidchart.com\/blog\/cloud-incident-response-best-practices<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3d78185 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d78185\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2305fac\" data-id=\"2305fac\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-08c59c2 elementor-widget elementor-widget-text-editor\" data-id=\"08c59c2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tPicotte, A. (2020, February 6). Best intrusion detection techniques in cloud computing. Uptycs. Retrieved May 24, 2022, from\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5494f1 elementor-widget elementor-widget-text-editor\" data-id=\"a5494f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>https:\/\/www.uptycs.com\/blog\/intrusion-detection-in-cloud-computing<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>An organization\u2019s incident response plan is the set of measures and procedures it has in place to respond to and protect against a cyberattack. An effective incident response plan can reduce the damage experienced after a security breach and ensure faster systems recovery. As the rates of cybercrime continue to increase, incident response plans have&hellip;<\/p>\n","protected":false},"author":32,"featured_media":81669,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11722],"tags":[],"class_list":{"0":"post-81666","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cloud-security"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v23.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Cloud Security? | Understanding Cloud Incident Response &amp; Handling | EC-Council<\/title>\n<meta name=\"description\" content=\"EC-Council offers the most comprehensive training on cloud security, including how to respond to incidents in AWS Cloud. This page provides an in-depth look at the best practices for incident detection, handling, and response in the cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cloud Security? | Understanding Cloud Incident Response &amp; Handling | EC-Council\" \/>\n<meta property=\"og:description\" content=\"EC-Council offers the most comprehensive training on cloud security, including how to respond to incidents in AWS Cloud. This page provides an in-depth look at the best practices for incident detection, handling, and response in the cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-11T02:11:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-11T02:18:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cloud-security-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What is Cloud Security? | Understanding Cloud Incident Response &amp; Handling | EC-Council\" \/>\n<meta name=\"twitter:description\" content=\"EC-Council offers the most comprehensive training on cloud security, including how to respond to incidents in AWS Cloud. This page provides an in-depth look at the best practices for incident detection, handling, and response in the cloud.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cloud-security-feature.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\/\/eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"What is Cloud Security\",\"datePublished\":\"2024-03-11T02:11:59+00:00\",\"dateModified\":\"2024-03-11T02:18:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/\"},\"wordCount\":2691,\"publisher\":{\"@id\":\"https:\/\/eccouncil.org\/cybersecurity-exchange\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cloud-security-thumb.jpg\",\"articleSection\":[\"Cloud Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/\",\"url\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/\",\"name\":\"What is Cloud Security? | Understanding Cloud Incident Response & Handling | EC-Council\",\"isPartOf\":{\"@id\":\"https:\/\/eccouncil.org\/cybersecurity-exchange\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cloud-security-thumb.jpg\",\"datePublished\":\"2024-03-11T02:11:59+00:00\",\"dateModified\":\"2024-03-11T02:18:25+00:00\",\"description\":\"EC-Council offers the most comprehensive training on cloud security, including how to respond to incidents in AWS Cloud. This page provides an in-depth look at the best practices for incident detection, handling, and response in the cloud.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#primaryimage\",\"url\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cloud-security-thumb.jpg\",\"contentUrl\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cloud-security-thumb.jpg\",\"width\":521,\"height\":521},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"EC-Council\",\"item\":\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Cloud Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eccouncil.org\/cybersecurity-exchange\/#website\",\"url\":\"https:\/\/eccouncil.org\/cybersecurity-exchange\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/eccouncil.org\/cybersecurity-exchange\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/eccouncil.org\/cybersecurity-exchange\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\/\/eccouncil.org\/cybersecurity-exchange\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\/\/eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Cloud Security? | Understanding Cloud Incident Response & Handling | EC-Council","description":"EC-Council offers the most comprehensive training on cloud security, including how to respond to incidents in AWS Cloud. This page provides an in-depth look at the best practices for incident detection, handling, and response in the cloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/","og_locale":"en_US","og_type":"article","og_title":"What is Cloud Security? | Understanding Cloud Incident Response & Handling | EC-Council","og_description":"EC-Council offers the most comprehensive training on cloud security, including how to respond to incidents in AWS Cloud. This page provides an in-depth look at the best practices for incident detection, handling, and response in the cloud.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-03-11T02:11:59+00:00","article_modified_time":"2024-03-11T02:18:25+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cloud-security-feature.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"What is Cloud Security? | Understanding Cloud Incident Response & Handling | EC-Council","twitter_description":"EC-Council offers the most comprehensive training on cloud security, including how to respond to incidents in AWS Cloud. This page provides an in-depth look at the best practices for incident detection, handling, and response in the cloud.","twitter_image":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cloud-security-feature.jpg","twitter_misc":{"Written by":"EC-Council","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/"},"author":{"name":"EC-Council","@id":"https:\/\/eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"What is Cloud Security","datePublished":"2024-03-11T02:11:59+00:00","dateModified":"2024-03-11T02:18:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/"},"wordCount":2691,"publisher":{"@id":"https:\/\/eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cloud-security-thumb.jpg","articleSection":["Cloud Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/","name":"What is Cloud Security? | Understanding Cloud Incident Response & Handling | EC-Council","isPartOf":{"@id":"https:\/\/eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cloud-security-thumb.jpg","datePublished":"2024-03-11T02:11:59+00:00","dateModified":"2024-03-11T02:18:25+00:00","description":"EC-Council offers the most comprehensive training on cloud security, including how to respond to incidents in AWS Cloud. This page provides an in-depth look at the best practices for incident detection, handling, and response in the cloud.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cloud-security-thumb.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cloud-security-thumb.jpg","width":521,"height":521},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/what-is-cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"EC-Council","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":2,"name":"What is Cloud Security"}]},{"@type":"WebSite","@id":"https:\/\/eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81666"}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81666"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81666\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81669"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}