CloudSec Academy

CloudSec Academy へようこそ。クラウドセキュリティの頭字語と業界用語のアルファベットスープをナビゲートするためのガイドです。 明確で簡潔、かつ専門的に作成されたコンテンツで、基本的なことからベストプラクティスまでをカバーします。

What is Managed Detection and Response (MDR)?

In this post, we’ll look at some of the differences between MDR and traditional managed services, how MDR functions within organizations, some of the tools it works with for even more effective threat detection and response, and the most important tip for getting the most out of your MDR solution.

Top 9 Open-Source SAST Tools

Wiz エキスパートチーム

In this article, we’ll take a closer look at how you can leverage SAST for code security. We’ll also explore key features of open-source SAST tools, such as language support, integration capabilities, and reporting functionalities.

What is the SLSA Framework?

Wiz エキスパートチーム

In this article, we’ll discuss how DevOps teams can take advantage of this framework to create reliable build pipelines and, more generally, secure the entire software development lifecycle.

What is Threat Intelligence?

Wiz エキスパートチーム

Threat intelligence, also called cyber threat intelligence (CTI), is the practice of gathering and analyzing trends about potential or ongoing cyber threats.

Kubernetes DevSecOps

Wiz エキスパートチーム

In this blog post, we’ll discuss the need for DevSecOps in Kubernetes environments. We'll walk through the reasons behind this approach, the unique challenges of orchestrated platforms, and the Kubernetes security layers that matter most.

What is Detection Engineering?

Detection engineering is a structured approach to developing, implementing, and refining threat detection mechanisms that’s tailored to an organization’s specific environment.

Dissecting Cloud Attacks and Attack Vectors

Wiz エキスパートチーム

Cloud attacks are malicious activities that target cloud data and infrastructure. By exploiting cloud vulnerabilities, attackers try to access and tamper with cloud data by exfiltrating sensitive information or disrupting operations.

NOC vs. SOC

Wiz エキスパートチーム

In this post, we’ll explore similarities and differences between the NOC and SOC. Then we’ll take a look at some tools that help NOCs and SOCs accomplish their core functions—as well as some tips for overcoming the main challenges to their smooth operation within your organization.

AI Compliance in 2025

Wiz エキスパートチーム

Artificial intelligence (AI) compliance describes the adherence to legal, ethical, and operational standards in AI system design and deployment.

10 Open-Source SOC tools

Wiz エキスパートチーム

Cloud security operations center (SOC) tools are the security solutions used by SOC teams to track and triage threats and vulnerabilities in cloud environments.

AI-BOM: Building an AI-Bill of Materials

Wiz エキスパートチーム

An AI bill of materials (AI-BOM) is a complete inventory of all the assets in your organization’s AI ecosystem. It documents datasets, models, software, hardware, and dependencies across the entire lifecycle of AI systems—from initial development to deployment and monitoring.

NIST AI Risk Management Framework: A tl;dr

Wiz エキスパートチーム

The NIST AI Risk Management Framework (AI RMF) is a guide designed to help organizations manage AI risks at every stage of the AI lifecycle—from development to deployment and even decommissioning.

What is CTEM (Continuous Threat Exposure Management)?

Continuous Threat Exposure Management (CTEM) has emerged as a proactive approach to cybersecurity, enabling security teams to identify, assess, and mitigate threats—in real-time, which is key. However, despite its growing popularity, there are still many questions surrounding CTEM. In this blog post, we'll delve into the top seven questions that cybersecurity practitioners often ask about CTEM—see if you’ve been looking for answers to these yourself!

Unified Vulnerability Management (UVM) Explained

Unified Vulnerability Management (UVM) has undergone a significant evolution in recent years, driven by technological advancements, changing threat landscapes, and increased regulatory demands. In this post, we explore how UVM has evolved and where we believe it’s headed in the next few years.

NIST 800-171: A Fast Track Guide

Wiz エキスパートチーム

In this article, we’ll explore the ins and outs of NIST 800-171 compliance, including how it fits within the broader NIST standards and who needs to comply. We’ll also discuss some cloud security best practices to help you keep data safe.

HIPAA Cloud Compliance Essentials for Healthcare Providers

Wiz エキスパートチーム

Although the HIPAA doesn't make any specific reference to the cloud, it is a completely different IT environment from the on-premises data center—with different compliance challenges. Learn some of the key HIPAA considerations when you host your healthcare workloads in the cloud.

クラウドセキュリティとは (cloud security)?

Wiz エキスパートチーム

クラウドセキュリティとは、クラウドベースのシステム、データ、インフラストラクチャを保護するために連携する一連のポリシー、制御、手順、およびテクノロジーを指します。

NIST Cloud Security Standards

Wiz エキスパートチーム

In this post, we'll explore NIST's cloud security standards and how they provide a framework of best practices that enhance the safety and reliability of cloud environments.

What is NIST 800-53? A Fast-Track Guide

Wiz エキスパートチーム

In this post, we’ll explore why NIST 800-53 is an essential part of modern data protection and important to your cloud environment—along with some best practices so you can roll it out smoothly in your organization.

シャドーITとは? 原因、リスク、および例

Wiz エキスパートチーム

シャドーITとは、組織のIT部門によって制御されていない、または認識されていないITサービス、アプリケーション、およびリソースを従業員が不正に使用することです。

What is Data Classification?

Wiz エキスパートチーム

In this post, we’ll explore some of the challenges that can complicate cloud data classification, along with the benefits that come with this crucial step—and how a DSPM tool can help make the entire process much simpler.

What is NIST Compliance?

Wiz エキスパートチーム

NIST compliance is adherence to security standards and guidelines developed by the National Institute of Standards and Technology (NIST).

Data access governance (DAG) explained

Wiz エキスパートチーム

Data access governance (DAG) is a structured approach to creating and enforcing policies that control access to data. It’s an essential component of an enterprise’s overall data governance strategy.

13 Essential Data Security Best Practices in the Cloud

Cloud data security is the practice of safeguarding sensitive data, intellectual property, and secrets from unauthorized access, tampering, and data breaches. It involves implementing security policies, applying controls, and adopting technologies to secure all data in cloud environments.

What is Data Risk Management?

Data risk management involves detecting, assessing, and remediating critical risks associated with data. We're talking about risks like exposure, misconfigurations, leakage, and a general lack of visibility.

8 Essential Cloud Governance Best Practices

Wiz エキスパートチーム

Cloud governance best practices are guidelines and strategies designed to effectively manage and optimize cloud resources, ensure security, and align cloud operations with business objectives. In this post, we'll the discuss the essential best practices that every organization should consider.

What is Data Detection and Response?

Data detection and response (DDR) is a cybersecurity solution that uses real-time data monitoring, analysis, and automated response to protect sensitive data from sophisticated attacks that traditional security measures might miss, such as insider threats, advanced persistent threats (APTs), and supply chain attacks.

What is a Data Risk Assessment?

Wiz エキスパートチーム

A data risk assessment is a full evaluation of the risks that an organization’s data poses. The process involves identifying, classifying, and triaging threats, vulnerabilities, and risks associated with all your data.

AIガバナンス:原則、規制、および実用的なヒント

Wiz エキスパートチーム

このガイドでは、AIガバナンスが組織にとって非常に重要になった理由を解説し、この分野を形作る主要な原則と規制に焦点を当て、独自のガバナンスフレームワークを構築するための実行可能な手順を提供します。

The EU AI Act

Wiz エキスパートチーム

この投稿では、EUがこの法律を施行した理由、その内容、AI開発者またはベンダーとして知っておくべきこと(コンプライアンスを簡素化するためのベストプラクティスなど)についてお伝えします。

SBOMセキュリティ

ソフトウェア部品表(SBOM)は、アプリケーションを構成するすべてのソフトウェアコンポーネントを詳細に説明する包括的なインベントリです。

CSPM in AWS

Wiz エキスパートチーム

In this article, we’ll discuss typical cloud security pitfalls and how AWS uses CSPM solutions to tackle these complexities and challenges, from real-time compliance tracking to detailed risk assessment.

What is Data Flow Mapping?

In this article, we’ll take a closer look at everything you need to know about data flow mapping: its huge benefits, how to create one, and best practices, and we’ll also provide sample templates using real-life examples.

What are Data Security Controls?

Wiz エキスパートチーム

Data security controls are security policies, technologies, and procedures that protect data from unauthorized access, alteration, or loss

Securing Cloud IDEs

Cloud IDEs allow developers to work within a web browser, giving them access to real-time collaboration, seamless version control, and tight integration with other cloud-based apps such as code security or AI code generation assistants.

Secure SDLC

Secure SDLC (SSDLC) is a framework for enhancing software security by integrating security designs, tools, and processes across the entire development lifecycle.

Top OSS SCA tools

Wiz エキスパートチーム

Open-source software (OSS) software composition analysis (SCA) tools are specialized solutions designed to analyze an application's open-source components and dependencies.

The Open-Source CNAPP Toolkit

Wiz エキスパートチーム

With a CNAPP, your team is empowered to pick and choose solutions that best fit your security capability and cost requirements. This article reviews the best open-source CNAPP tools for 2024.

Sensitive Data Discovery

Wiz エキスパートチーム

In this post, we’ll find out why the sensitive data discovery process is so important—along with some of the main challenges. We’ll see how companies tackle the daunting task of classifying their data.

Top OSS Incident Response Tools

Open-source software (OSS) incident response (IR) tools are publicly available tools enterprises use to effectively manage and respond to numerous security threats.

Identity Security [Cloud Edition]

Wiz エキスパートチーム

Cloud identity security is the practice of safeguarding digital identities and the sensitive cloud infrastructure and data they gatekeep from unauthorized access and misuse.

Top 9 OSINT tools

Wiz エキスパートチーム

Open-source intelligence (OSINT) is a framework that involves gathering, analyzing, and interpreting publicly available data to gain insights into cyber threats, adversarial activities, and attack techniques. OSINT identifies innocuous-seeming information that, if analyzed with an attacker’s mindset, could reveal critical loopholes in an enterprise’s security posture.

Top OSS Vulnerability Scanners [By Category]

Wiz エキスパートチーム

Vulnerability scanning is an integral component of every vulnerability management program, providing security teams with insights needed to address vulnerabilities before they become attack vectors. When conducted regularly, vulnerability assessments offer asset discovery and visibility, attack surface management, and compliance enforcement.

DFIRとは何ですか

デジタルフォレンジック&インシデントレスポンス(DFIR)は、サイバー攻撃の特定、調査、対応を扱うサイバーセキュリティの分野です。

What is Cloud Data Security? Risks and Best Practices

Wiz エキスパートチーム

Cloud data security is the comprehensive strategy of preventing data loss or leakage in the cloud from security threats like unauthorized access, data breaches, and insider threats.

Effective Permissions: A Security Review

Wiz エキスパートチーム

In this article, we will explore the challenges of managing permissions, the risks associated with improper access controls, and how major cloud providers handle permissions. We’ll also take a look at best practices and advanced solutions like cloud infrastructure entitlement management (CIEM).

Source Code Leaks: Risks, Examples, and Prevention

Wiz エキスパートチーム

In this blog post, we’ll explore security measures and continuous monitoring strategies to prevent these leaks, mitigating the risks posed by security vulnerabilities, human error, and attacks.

What is Cloud Risk Management?

Wiz エキスパートチーム

In this article, we’ll explore what cloud risk management entails and take an in-depth look at the tools that can keep your systems safe.

Defense in Depth: Cloud Edition

Wiz エキスパートチーム

Defense in depth is often considered a basic concept in any effective security strategy.

Secrets Detection: A Fast-Track Guide

Secrets detection is the process of identifying and managing sensitive information like API keys, passwords, and tokens within codebases to prevent unauthorized access and data breaches.

脆弱性スキャン (Vulnerability Scanning)

Wiz エキスパートチーム

脆弱性スキャンは、ITシステム、ネットワーク、およびソフトウェアのセキュリティ上の欠陥を検出して評価するプロセスです。

LLM Security for Enterprises: Risks and Best Practices

Wiz エキスパートチーム

LLM models, like GPT and other foundation models, come with significant risks if not properly secured. From prompt injection attacks to training data poisoning, the potential vulnerabilities are manifold and far-reaching.

Data Security Compliance Explained

Data security compliance is a critical aspect of data governance that involves adhering to the security-centric rules and regulations set forth by supervisory and regulatory bodies, including federal agencies.

Top 9 OSS API Security Tools

Wiz エキスパートチーム

A guide on the 9 best OSS API security tools that protect sensitive data, infrastructure, and business logic from unauthorized access, data theft, and other attacks.

Data Leakage:リスク、原因、防止

データ漏洩とは、組織データが第三者に対して野放しに持ち出されることです。 これは、データベースの設定ミス、ネットワークサーバーの保護が不十分な、フィッシング攻撃、さらには不注意なデータ処理など、さまざまな手段で発生します。

Vulnerability Prioritization in the Cloud: Strategies + Steps

Vulnerability prioritization is the practice of assessing and ranking identified security vulnerabilities based on critical factors such as severity, potential impact, exploitability, and business context. This ranking helps security experts and executives avoid alert fatigue to focus remediation efforts on the most critical vulnerabilities.

AI Risk Management: Essential AI SecOps Guide

AI risk management is a set of tools and practices for assessing and securing artificial intelligence environments. Because of the non-deterministic, fast-evolving, and deep-tech nature of AI, effective AI risk management and SecOps requires more than just reactive measures.

SAST vs. SCA: What's the Difference?

SAST (Static Application Security Testing) analyzes custom source code to identify potential security vulnerabilities, while SCA (Software Composition Analysis) focuses on assessing third-party and open source components for known vulnerabilities and license compliance.

Top 9 OSS CSPM Tools

Wiz エキスパートチーム

In this article, we’ll explore the top 9 OSS CSPM tools available today, each with its unique capabilities and benefits for helping organizations identify cloud misconfigurations, prevent security breaches, and ensure compliance with industry standards.

Database Security Explained

Database security is the process of identifying, assessing, and mitigating risks that can compromise the confidentiality, integrity, and availability of data.

MTTD and MTTR in Cybersecurity Incident Response

Most incident response teams measure both MTTD and MTTR to not only shorten attackers’ dwell times in their systems but also to gauge the team’s readiness to combat future security incidents and then optimize response times.

The Vulnerability Management Lifecycle in 6 Stages

Wiz エキスパートチーム

The vulnerability management lifecycle consists of six key stages: identification and assessment, prioritization, remediation and mitigation, verification and validation, reporting, and monitoring and improvement.

The Threat of Adversarial AI

Wiz エキスパートチーム

Adversarial artificial intelligence (AI), or adversarial machine learning (ML), is a type of cyberattack where threat actors corrupt AI systems to manipulate their outputs and functionality.

What is a Vulnerability Management Program?

Wiz エキスパートチーム

A vulnerability management program is a structured, continuous approach to identifying, evaluating, and mitigating security weaknesses across an organization's IT ecosystem.

What Is Cloud Incident Response?

Cloud incident response is a strategic approach to detecting and recovering from cyberattacks on cloud-based systems with the goal of minimizing the impact to your workloads and business operation accordingly.

Incident Response Team Depth Chart: Roles & responsibilities

Wiz エキスパートチーム

An incident response team is a specialized security unit within an organization whose primary duties involve responding to cyber incidents and addressing compromised systems, applications, and data.

SecOps Explained

Wiz エキスパートチーム

SecOps is the collaborative integration of IT security and operations teams to protect and manage an organization's digital assets more efficiently.

What is Cloud Threat Modeling?

Cloud threat modeling is a systematic approach designed to uncover, evaluate, and rank the potential security vulnerabilities and dangers unique to cloud-based systems and infrastructure.

Security logs

Cloud security logs are formatted text records that capture events and activities as they occur in a cloud environment, providing insight into what’s happening within that environment in real time.

The SOC Team Roster: Roles & responsibilities

Wiz エキスパートチーム

A security operations center (SOC) team is a group of highly skilled professionals responsible for scanning IT environments and identifying and remediating cybersecurity threats and incidents

What is Cloud Network Security?

Wiz エキスパートチーム

Cloud network security is a combination of tools, processes, and policies that protect your cloud environments.

What is Security as Code (SaC)?

Security as Code (SaC) is a methodology that integrates security measures directly into the software development process. It involves codifying security policies and decisions, and automating security checks, tests, and gates within the DevOps pipeline.

What is Cloud Forensics?

Cloud forensics is a branch of digital forensics that applies investigative techniques to collecting and evaluating critical evidence in cloud computing environments following a security incident.

What is LLM Jacking?

LLM jacking is an attack technique that cybercriminals use to manipulate and exploit an enterprise’s cloud-based LLMs (large language models).

What is Credential Access (TA0006)?

Wiz エキスパートチーム

Credential access is a cyberattack technique where threat actors access and hijack legitimate user credentials to gain entry into an enterprise's IT environments.

What is Cloud Visibility? + Best Practices

Wiz エキスパートチーム

As cloud adoption grows, the only way to mitigate risks and access the full spectrum of cloud capabilities is to prioritize visibility. Read on to learn more about cloud visibility—and how to achieve it.

Using eBPF in Kubernetes: A security overview

Wiz エキスパートチーム

eBPF provides deep visibility into network traffic and application performance while maintaining safety and efficiency by executing custom code in response to the kernel at runtime.

Navigating Incident Response Frameworks: A Fast-Track Guide

Wiz エキスパートチーム

An incident response framework is a blueprint that helps organizations deal with security incidents in a structured and efficient way. It outlines the steps to take before, during, and after an incident, and assigns roles and responsibilities to different team members.

What is a Data Poisoning Attack?

Wiz エキスパートチーム

Data poisoning is a kind of cyberattack that targets the training data used to build artificial intelligence (AI) and machine learning (ML) models.

インシデント対応とは? SOCのファストトラックガイド

Wiz エキスパートチーム

インシデント対応は、サイバー攻撃を検出して対応するための戦略的なアプローチであり、サイバー攻撃がITシステムやビジネス全体に与える影響を最小限に抑えることを目的としています。

Dark AI Explained

Wiz エキスパートチーム

Dark AI involves the malicious use of artificial intelligence (AI) technologies to facilitate cyberattacks and data breaches. Dark AI includes both accidental and strategic weaponization of AI tools.

What is Policy as Code? 

Policy as code (PaC) is the use of code to define, automate, enforce, and manage the policies that govern the operation of cloud-native environments and their resources.

CISベンチマークとは?

Wiz エキスパートチーム

CISベンチマークは、サイバー脅威に対するITシステムの強化について組織を導くための主要な推奨事項を提供する、公開されているセキュリティロードマップです。

GitOps vs. DevOps

While DevOps delineates collaboration and automation practices that emphasize infrastructure provisioning and continuous monitoring, GitOps extends its concepts by employing Git as the single source of truth for both application and infrastructure settings.

Kubernetes Namespaces: Security Best Practices

Kubernetes namespaces divide a given cluster into virtual clusters, helping to separate and manage resources while still keeping them within the same physical cluster. By segregating workloads and applying policies per namespace, you can create boundaries that keep your multi-tenant environments safe and organized.

Linux containers: A security review

Understanding the nuances of Linux containers is crucial for building robust, secure applications. This blog post provides insights into the practical implementation of containers, focusing on both their strengths and potential pitfalls.

Cloud Investigation and Response Automation (CIRA)

Cloud investigation and response automation (CIRA) harnesses the power of advanced analytics, artificial intelligence (AI), and automation to provide organizations with real-time insights into potential security incidents within their cloud environments

セキュリティ・バイ・デザインとは? [Security by Design]

Wiz エキスパートチーム

セキュリティ・バイ・デザインは、セキュリティを後付けではなく柱として確立することを目的としたソフトウェア開発アプローチです。つまり、設計段階からセキュリティ制御をソフトウェア製品に統合することです。

Guide to Standard SBOM Formats

Wiz エキスパートチーム

Two major formats dominate the SBOM ecosystem: Software Package Data Exchange (SPDX) and CycloneDX (CDX). Let’s review!

Kubernetes Security Context: Best practices

In Kubernetes, a security context defines privilege and access control settings for a Pod or Container. It allows you to specify security configurations such as user and group IDs, filesystem permissions, and capabilities.

Azure Security Risks & Mitigation Steps

Wiz エキスパートチーム

This article offers an extensive examination of Azure environments’ most pressing security risks along with suggested approaches for effectively mitigating these challenges.

7 AI Security Risks You Can't Ignore

Wiz エキスパートチーム

Learn about the most pressing security risks shared by all AI applications and how to mitigate them.

Remote Code Execution Attacks Explained

Wiz エキスパートチーム

Remote code execution refers to a security vulnerability through which malicious actors can remotely run code on your systems or servers.

Cloud Sprawl Explained

Wiz エキスパートチーム

Cloud sprawl is a phenomenon that involves the unmanaged growth of cloud-based resources and services.

CSPM vs DSPM: Why You Need Both

Wiz エキスパートチーム

Discover the similarities between CSPM and DSPM, what factors set them apart, and which one is the best choice for your organization’s needs.

Container monitoring explained

Container monitoring is the process of collecting, analyzing, and reporting metrics and data related to the performance and health of containerized applications and their hosting environments.

Data Exfiltration Explained

Wiz エキスパートチーム

Data exfiltration is when sensitive data is accessed without authorization or stolen. Just like any data breach, it can lead to financial loss, reputational damage, and business disruptions.

Cloud Migration Security Explained

Cloud migration security is a facet of cybersecurity that protects organizations from security risks during a transition to cloud environments from legacy infrastructure, like on-premises data centers.

Kubernetes RBAC Explained

Kubernetes role-based access control (RBAC) serves as a foundational security layer within Kubernetes. It is essential for regulating access to the K8s API and its resources, allowing organizations to define user roles with specific permissions to effectively control who can see or interact with what resources within a cluster.

CWPP とは? [クラウド ワークロード保護プラットフォーム]

Wiz エキスパートチーム

クラウド ワークロード保護プラットフォーム (CWPP) は、さまざまな種類のクラウド環境にわたるクラウド ワークロードに対する継続的な脅威の監視と保護を提供するセキュリティ ソリューションです。

コードセキュリティ (Code Security)

コードセキュリティは、セキュアコーディングとも呼ばれ、アプリケーションやシステム用に記述されたコードが脆弱性や脅威から保護されるように設計されたプラクティス、方法論、およびツールを指します。