Editor’s note:Wiz recently announced the general availability of Wiz for DSPM. Our second blog posttalked about why data security should be integrated with CNAPP.
It takes far too long for organizations to find and respond to data exposure. According to research, unsecured databases can be breached in just 8 hours. Data breaches can result in damage to a company’s brand and potential revenue loss due to customers losing trust, causing them to explore alternative solutions. Organizations need to detect data risks as soon as they occur for faster resolution time. This requires scanning sensitive data in their cloud environment and rapid monitoring and detection to allow security teams to intervene before the damage is done. In this blog post, we are excited to launch new security controls that help you correlate and find interesting cloud events in your environment, before it becomes a costly data breach.
Since the general availability of Wiz for DSPM, we have added new security controls for suspicious cloud events for unprotected data, providing customers with near real-time monitoring and detection. These capabilities enable dynamic monitoring of cloud environments for faster response times. The new built-in security controls for data security were developed by our threat research team based on information about real-world breaches in which these interesting events lead up to the event. The newly released security controls work out-of-the-box and do not require any configuration.
For example, you can easily identify data resources with sensitive data that has traffic from an unrecommend IP. Diving a bit deeper into the issue, the attack path visualization on the Wiz Security Graph shows how an attacker would gain access to the critical sensitive data on this Active Directory Federation Services (ADFS4) virtual machine, which contains an employee directory.
You can easily apply these built-in security controls on your cloud environment to have them trigger issues for your teams to resolve. In this scenario, the next step would be to block this IP address and apply remediation measures such as encryption and access control to prevent unauthorized access to this sensitive data.
Another useful security control is detecting a virtual machine with sensitive data that was targeted by a SSH brute force attack. As you can see from the attack path visualization, a finance application that contains PII such as email addresses was impacted. In this scenario, Wiz recommends your team ensure that this action was legitimate and apply measures such as encryption, access control and strong passwords to prevent unauthorized access to the sensitive data in this application.
With the new built-in security controls for Wiz, customers are empowered to correlate suspicious events related to unprotected data in near real-time. Having these shown on the Wiz Security Graph allows you to understand the toxic combinations in your environment, helping you get ahead of sensitive data exposure by monitoring and responding to cloud data risks with integrated data protection.
Start protecting your cloud data today
Our goal is to help your organization discover and protect your cloud data. You can learn more by downloading our datasheet or visiting the Wiz docs (login required). If you prefer a live demo, we would love to connect with you.
The release of the National Cybersecurity Strategy by the Biden-Harris Administration is a significant development that will have an impact on security teams across the United States. What does it say?