INTELLIGENT ENTERPRISE SECURITY
instances so that you can see all instances
that are running.
One of the challenges of public cloud is
that it is so convenient to spin up new VMs
and containers that you may forget to shut
them down later. These so-called zombies
are latent security threats because they
present potential attack vectors into more
business or mission critical systems.
If you plan to use containers, as a growing
number of enterprises are, be diligent about
the level of security protection they offer.
The market for containers is still immature,
and security while improving is considered
one of the technology’s weakest areas.
Remember, you are responsible for
system-level security in your Infrastructure
as a Service and Platform as a Server
instances.
Application security
This level is primarily about identity and
access management. Your best investment
here is not financial. It is a policy that
limits the ability of users to deploy cloud
applications without IT’s knowledge.
After ensuring policies are in place that
offer IT visibility, the next ste