Auditing and Threat Management in Cloud Environments
In Chapters 2, Securing Compute Services – Virtual Machines to 9, Effective Strategies for Implementing IAM Solutions, we covered the fundamental building blocks of cloud services (from compute, storage, and networking services to identity and access management services).
All services and security controls send their audit logs to a central audit service for alerts and further analysis.
This chapter will cover various concepts of monitoring and auditing from a security perspective – from audit trails to threat detection in cloud environments.
In this chapter, we will cover the following topics:
- Maintaining audit trails
- Controlling access to CSP support engineers
- Conducting threat detection and response
- Managing cloud-native SIEM