CloudSec Academy

CloudSec Academy へようこそ。クラウドセキュリティの頭字語と業界用語のアルファベットスープをナビゲートするためのガイドです。 明確で簡潔、かつ専門的に作成されたコンテンツで、基本的なことからベストプラクティスまでをカバーします。

9 Best Practices for Stronger Azure Security

Wiz エキスパートチーム

Misconfigurations, weak access controls, and data exposure put your Azure workloads at risk. Follow these 9 proven security best practices to stay protected.

Azure Security Risks & Mitigation Steps

Wiz エキスパートチーム

This article offers an extensive examination of Azure environments’ most pressing security risks along with suggested approaches for effectively mitigating these challenges.

What are Application Security Frameworks?

Wiz エキスパートチーム

Application security frameworks are essential guidelines, best practices, and tools designed to help organizations stay consistent in their security practices, meet compliance requirements, and effectively manage risks associated with application security.

Wiz の実際の動作を見る

Wiz は、コードからランタイムまで、クラウド全体の点と点をつなぎます。

Wiz がお客様の個人データをどのように取り扱うかについては、当社のプライバシーポリシーをご確認下さい: プライバシーポリシー.

Wiz wand

What is a denial of service attack? Types and prevention

Wiz エキスパートチーム

A denial of service (DoS) attack makes an application, service, or network resource unavailable to legitimate users by overwhelming systems with traffic, requests, or state transitions.

What is zero trust architecture? A complete guide for cloud security

Wiz エキスパートチーム

Enterprises have started gradually shifting from perimeter-based defenses to more proactive and identity-centric protection. Zero trust architecture eliminates implicit trust assumptions by requiring continuous verification of every user, device, and transaction.

What is SBOM scanning?

Wiz エキスパートチーム

An SBOM contains an inventory of all software components, libraries, dependencies, versions, licenses, and relationships.

What is Docker vulnerability scanning?

Wiz エキスパートチーム

Docker vulnerability scanning is the automated process of analyzing container images to find known security weaknesses.

What Is Cloud Incident Response?

Cloud incident response is a strategic approach to detecting and recovering from cyberattacks on cloud-based systems with the goal of minimizing the impact to your workloads and business operation accordingly.

CSPM in AWS

Wiz エキスパートチーム

In this article, we’ll discuss typical cloud security pitfalls and how AWS uses CSPM solutions to tackle these complexities and challenges, from real-time compliance tracking to detailed risk assessment.

SAST vs. SCA: What's the Difference?

SAST (Static Application Security Testing) analyzes custom source code to identify potential security vulnerabilities, while SCA (Software Composition Analysis) focuses on assessing third-party and open source components for known vulnerabilities and license compliance.

What is AWS vulnerability scanning?

Wiz エキスパートチーム

AWS vulnerability scanning identifies security flaws across EC2 instances (including secrets mistakenly stored in user data), containers, Lambda functions, and other compute resources.