Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud

Quick Install of Forseti Security on Google Cloud Platform

Forseti Security is open source security tool built for Google Cloud Platform. It can keep track of your environment, monitor your policies and even enforce in the future. The install is pretty simple since it’s contained within a Deployment Manager template. Deployment Manager automates infrastructure deployments of Google Cloud Platform resources. I’m going to highlight some of the notes from the official Forseti documentation in this post for completeness.

20 Most Common CASB Use Cases

As people and organizations adopt cloud services, Cloud Access Security Brokers (CASBs) have become a must-have for any information security team. CASBs provide critical capabilities such as governing access and activities in sanctioned and unsanctioned cloud services, securing sensitive data and preventing its loss, and protecting against internal and external threats.

With Forseti, Spotify and Google release GCP security tools to open source community

Being able to secure your cloud resources at scale is important for all Google Cloud Platform users. To help ensure the security of GCP resources, you need to have the right tools and processes in place. Spotify and Google Cloud worked together to develop innovative security tools that help organizations protect GCP projects, and have made them available in an open source community called Forseti Security. Forseti is now open to all GCP users!

EU GDPR Cloud-Readiness and Compliance Checklist

The new set of European Union laws regarding personal data security in organisations, the EU General Data Protection Regulation (GDPR), has passed and requires organisations be compliant by 2018. As organisations start taking action to comply with the GDPR within the deadline, one of the most difficult areas is the cloud.

Allow is the New Block - 10 Requirements to Safely Say "Yes" to Shadow IT

Given the lack of visibility and control, what does the security team do about shadow IT? Do they take extreme security measures and try to block them using legacy security tools or do they allow their use and hope users stay secure from threats and don't leak sensitive data?