How to monitor, detect, and respond to cloud data risks faster with built-in security controls for cloud events

Wiz for DSPM: Additional enhancements to help you correlate suspicious events related to unprotected data in near real-time.

2 분 읽기

Editor’s note: Wiz recently announced the general availability of Wiz for DSPM. Our second blog post talked about why data security should be integrated with CNAPP. 

It takes far too long for organizations to find and respond to data exposure. According to research, unsecured databases can be breached in just 8 hours. Data breaches can result in damage to a company’s brand and potential revenue loss due to customers losing trust, causing them to explore alternative solutions. Organizations need to detect data risks as soon as they occur for faster resolution time. This requires scanning sensitive data in their cloud environment and rapid monitoring and detection to allow security teams to intervene before the damage is done. In this blog post, we are excited to launch new security controls that help you correlate and find interesting cloud events in your environment, before it becomes a costly data breach. 

Since the general availability of Wiz for DSPM, we have added new security controls for suspicious cloud events for unprotected data, providing customers with near real-time monitoring and detection. These capabilities enable dynamic monitoring of cloud environments for faster response times. The new built-in security controls for data security were developed by our threat research team based on information about real-world breaches in which these interesting events lead up to the event. The newly released security controls work out-of-the-box and do not require any configuration. 

For example, you can easily identify data resources with sensitive data that has traffic from an unrecommend IP. Diving a bit deeper into the issue, the attack path visualization on the Wiz Security Graph shows how an attacker would gain access to the critical sensitive data on this Active Directory Federation Services (ADFS4) virtual machine, which contains an employee directory. 

Visualize attack path on the Wiz Security Graph to the sensitive data within an employee directory.

You can easily apply these built-in security controls on your cloud environment to have them trigger issues for your teams to resolve. In this scenario, the next step would be to block this IP address and apply remediation measures such as encryption and access control to prevent unauthorized access to this sensitive data. 

Another useful security control is detecting a virtual machine with sensitive data that was targeted by a SSH brute force attack. As you can see from the attack path visualization, a finance application that contains PII such as email addresses was impacted. In this scenario, Wiz recommends your team ensure that this action was legitimate and apply measures such as encryption, access control and strong passwords to prevent unauthorized access to the sensitive data in this application. 

Visualize attack path on the Wiz Security Graph to the sensitive data on a Finance App.

With the new built-in security controls for Wiz, customers are empowered to correlate suspicious events related to unprotected data in near real-time. Having these shown on the Wiz Security Graph allows you to understand the toxic combinations in your environment, helping you get ahead of sensitive data exposure by monitoring and responding to cloud data risks with integrated data protection. 

Start protecting your cloud data today 

Our goal is to help your organization discover and protect your cloud data. You can learn more by downloading our datasheet or visiting the Wiz docs (login required). If you prefer a live demo, we would love to connect with you. 

계속 읽기

Meet Wiz at KubeCon North America

Wiz will be attending and sponsoring KubeCon for the first time and we have a lot to share regarding how enterprises can better secure their container and Kubernetes environments. Come say hi!

맞춤형 데모 받기

맞춤형 데모 신청하기

“내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다.”
데이비드 에슬릭최고정보책임자(CISO)
“Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다.”
아담 플레처최고 보안 책임자(CSO)
“우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다.”
그렉 포니아토프스키위협 및 취약성 관리 책임자