The NSA released a list of ten recommended security strategies for cloud customers. The advisory, published on March 7, 2024, includes ten strategies for cloud security, identity and access management, data security practices, and network segmentation.
CISA supported the NSA with six out of ten strategies for cybersecurity and infrastructure security in the US.
By infosecbulletin
/ Friday , March 21 2025
IBM has resolved two critical vulnerabilities in its AIX operating system that could allow command execution. The list of shortcomings,...
Read More
By infosecbulletin
/ Wednesday , March 19 2025
WhatsApp has patched a zero-click, zero-day vulnerability used to install Paragon's Graphite spyware following reports from security researchers at the...
Read More
By infosecbulletin
/ Wednesday , March 19 2025
CISA has issued a critical alert about a critical vulnerability in Fortinet’s FortiOS and FortiProxy systems. CVE-2025-24472, an authentication bypass...
Read More
By infosecbulletin
/ Wednesday , March 19 2025
11 nation-state groups from North Korea, China, and Russia are exploiting a vulnerability in a common feature of Microsoft Windows....
Read More
By infosecbulletin
/ Tuesday , March 18 2025
Attackers are actively targeting OpenAI, exploiting CVE-2024-27564, a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s ChatGPT infrastructure. Veriti’s latest research...
Read More
By infosecbulletin
/ Tuesday , March 18 2025
A critical vulnerability, CVE-2024-540385, has been found in HPE Cray XD670 servers using the AMI BMC Redfish API, allowing remote...
Read More
By infosecbulletin
/ Tuesday , March 18 2025
CVE-2025-24813, a critical remote code execution vulnerability, is actively exploited, enabling attackers to control vulnerable Apache Tomcat servers with a...
Read More
By infosecbulletin
/ Monday , March 17 2025
MIST Cyber Security Club hosted an exciting MIST CyberTron 2025, featuring a CTF competition, hacking sessions, live demonstrations, and real-world...
Read More
By infosecbulletin
/ Monday , March 17 2025
Cybersecurity researchers unveil a critical remote code execution vulnerability (CVE-2025-24016) in Wazuh, a popular open-source SIEM platform. The vulnerability has...
Read More
By infosecbulletin
/ Monday , March 17 2025
A recent report from Elastic reveals that threat actors misuse Amazon Web Services (AWS) Simple Notification Service (SNS) for malicious...
Read More
The top 10 cloud security mitigation strategies are:
* Uphold the Cloud Shared Responsibility Model
* Use Secure Cloud Identity and Access Management Practices
* Use Secure Cloud Key Management Practices
* Implement Network Segmentation and Encryption in Cloud Environments
* Secure Data in the Cloud
* Defending Continuous Integration/Continuous Delivery (CI/CD) Environments
* Enforce Secure Automated Deployment Practices through Infrastructure as Code
* Account for Complexities Introduced by Hybrid Cloud and Multi-Cloud Environments
* Mitigate Risks from Managed Service Providers in Cloud Environments
* Manage Cloud Logs for Effective Threat Hunting
* Each strategy comes with an additional cybersecurity information sheet detailing how to implement it.
The sheets offer recommended steps and best practices from the NSA and CISA for cloud security, along with links for further details and resources.