CloudSec Academy
CloudSec Academy へようこそ。クラウドセキュリティの頭字語と業界用語のアルファベットスープをナビゲートするためのガイドです。 明確で簡潔、かつ専門的に作成されたコンテンツで、基本的なことからベストプラクティスまでをカバーします。
Top 9 OSS API Security Tools
A guide on the 9 best OSS API security tools that protect sensitive data, infrastructure, and business logic from unauthorized access, data theft, and other attacks.
What is zero trust data security?
Zero trust data security extends traditional zero trust principles to data protection by requiring continuous verification.
Wiz の実際の動作を見る
Wiz は、コードからランタイムまで、クラウド全体の点と点をつなぎます。
What is code auditing? A complete security guide
Code auditing is the systematic examination of source code to identify security vulnerabilities, bugs, performance issues, and compliance violations.
What are GDPR security controls?
GDPR security controls are the mandatory technical and organizational safeguards you must implement to protect the personal data you process.
What are Snort rules? Examples and best practices
Snort rules are the detection logic that powers Snort, an open-source intrusion detection and prevention system.
The Top 11 Open-Source SBOM tools
This article will start with a quick refresher on SBOMs and then list the top SBOM-generation tools available.
CI/CD security tools
CI/CD security tools automate security checks in development pipelines to identify vulnerabilities and misconfigurations during code changes, ensuring continuous security.
Top 9 OSINT tools
Open-source intelligence (OSINT) is a framework that involves gathering, analyzing, and interpreting publicly available data to gain insights into cyber threats, adversarial activities, and attack techniques. OSINT identifies innocuous-seeming information that, if analyzed with an attacker’s mindset, could reveal critical loopholes in an enterprise’s security posture.
SecOps Explained
SecOps is the collaborative integration of IT security and operations teams to protect and manage an organization's digital assets more efficiently.
SAST vs DAST: How to Use Both Testing Tools for App Security
In this Academy article, we'll dig into SAST and DAST security testing methods, exploring how they work and their core aspects
Using eBPF in Kubernetes: A security overview
eBPF provides deep visibility into network traffic and application performance while maintaining safety and efficiency by executing custom code in response to the kernel at runtime.
AI-BOM: Building an AI Bill of Materials
An AI bill of materials (AI-BOM) is a complete inventory of all the assets in your organization’s AI ecosystem. It documents datasets, models, software, hardware, and dependencies across the entire lifecycle of AI systems—from initial development to deployment and monitoring.
How to Create an Incident Response Policy: An Actionable Checklist and Template
Build a strong incident response policy to manage cybersecurity crises with clear roles, compliance steps, and hands-on training.
How to Make Your Incident Response Framework Actionable
An incident response framework is a blueprint that helps organizations deal with security incidents in a structured and efficient way. It outlines the steps to take before, during, and after an incident, and assigns roles and responsibilities to different team members.
AWSセキュリティベストプラクティス:10ステップで環境を健康診断
クラウド環境を守り、リスクを軽減し、コンプライアンスを容易に確保するための必須のAWSセキュリティベストプラクティスをご紹介します。
Serverless Security Explained
Serverless security is the extra layer of protection designed for applications built on a serverless architecture. In this type of cloud computing, you write the code (functions) but the cloud provider handles the servers. This creates a different security approach.
GitOps vs. DevOps: How GitOps Keeps You Aligned
While DevOps delineates collaboration and automation practices that emphasize infrastructure provisioning and continuous monitoring, GitOps extends its concepts by employing Git as the single source of truth for both application and infrastructure settings.