CloudSec Academy

CloudSec Academy へようこそ。クラウドセキュリティの頭字語と業界用語のアルファベットスープをナビゲートするためのガイドです。 明確で簡潔、かつ専門的に作成されたコンテンツで、基本的なことからベストプラクティスまでをカバーします。

What is dependency scanning in cloud security?

Wiz エキスパートチーム

Dependency scanning is the automated analysis of the third-party libraries, frameworks, and packages that developers use to build applications.

What is Azure container security scanning?

Wiz エキスパートチーム

Azure Container Security Scanning finds vulnerabilities and misconfigurations in container images and workloads in Azure Container Registry and AKS.

What is DAST scanning? A cloud security perspective

Wiz エキスパートチーム

DAST scanning is an automated security testing method that analyzes your running applications from the outside. It interacts with the application just like a real user or attacker would to find security weaknesses.

What is cloud vulnerability scanning? Modern best practices

Wiz エキスパートチーム

Cloud vulnerability scanning is the automated process of identifying security flaws within your cloud infrastructure, workloads, and configurations. Unlike traditional scanning designed for static, on-premises servers, cloud scanning is built to handle the dynamic nature of the cloud.

Wiz の実際の動作を見る

Wiz は、コードからランタイムまで、クラウド全体の点と点をつなぎます。

Wiz がお客様の個人データをどのように取り扱うかについては、当社のプライバシーポリシーをご確認下さい: プライバシーポリシー.

Wiz wand

What is AWS container scanning?

Wiz エキスパートチーム

AWS container scanning is the practice of identifying security issues in your software containers before they run in production.

What does a SOC analyst in cloud security do?

Wiz エキスパートチーム

SOC analysts translate cloud telemetry into actionable decisions by interpreting identity activity, workload behavior, and infrastructure changes in context.

AWS Lambda cost breakdown for 2026

Wiz エキスパートチーム

In this article, we’ll break down the ins and outs of cost management in AWS Lambda. We’ll explore the complexities hidden behind the simple pay-as-you-go model and highlight the overlooked elements that can quietly inflate your bill so that you can optimize with confidence.

9 Best Practices for Stronger Azure Security

Wiz エキスパートチーム

Misconfigurations, weak access controls, and data exposure put your Azure workloads at risk. Follow these 9 proven security best practices to stay protected.

Azure Security Risks & Mitigation Steps

Wiz エキスパートチーム

This article offers an extensive examination of Azure environments’ most pressing security risks along with suggested approaches for effectively mitigating these challenges.

What are Application Security Frameworks?

Wiz エキスパートチーム

Application security frameworks are essential guidelines, best practices, and tools designed to help organizations stay consistent in their security practices, meet compliance requirements, and effectively manage risks associated with application security.

What is a denial of service attack? Types and prevention

Wiz エキスパートチーム

A denial of service (DoS) attack makes an application, service, or network resource unavailable to legitimate users by overwhelming systems with traffic, requests, or state transitions.

What is zero trust architecture? A complete guide for cloud security

Wiz エキスパートチーム

Enterprises have started gradually shifting from perimeter-based defenses to more proactive and identity-centric protection. Zero trust architecture eliminates implicit trust assumptions by requiring continuous verification of every user, device, and transaction.

What is SBOM scanning?

Wiz エキスパートチーム

An SBOM contains an inventory of all software components, libraries, dependencies, versions, licenses, and relationships.

What is Docker vulnerability scanning?

Wiz エキスパートチーム

Docker vulnerability scanning is the automated process of analyzing container images to find known security weaknesses.