Protect Outbound Traffic in an AWS Hybrid Environment
Best Practices for Amazon Web Services (AWS) Security: Lesson 2
Outbound traffic rules in AWS Security Groups are, by default, very wide and insecure. In addition, during the set-up process for AWS Security Groups the user is not intuitively guided through a set up process for outbound rules – the user must do this manually. In this lesson, Professor Wool, highlights the limitations and consequences of leaving the default rules in place, and provides recommendations on how to define outbound rules in AWS Security Groups in order to securely control and filter outbound traffic and protect against data leaks.
Learn more about AlgoSec at http://www.algosec.com and read Professor Wool's blog posts at http://blog.algosec.com
Видео Protect Outbound Traffic in an AWS Hybrid Environment канала AlgoSec
Outbound traffic rules in AWS Security Groups are, by default, very wide and insecure. In addition, during the set-up process for AWS Security Groups the user is not intuitively guided through a set up process for outbound rules – the user must do this manually. In this lesson, Professor Wool, highlights the limitations and consequences of leaving the default rules in place, and provides recommendations on how to define outbound rules in AWS Security Groups in order to securely control and filter outbound traffic and protect against data leaks.
Learn more about AlgoSec at http://www.algosec.com and read Professor Wool's blog posts at http://blog.algosec.com
Видео Protect Outbound Traffic in an AWS Hybrid Environment канала AlgoSec
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Managing network objects in hybrid environmentsWhat companies need #seo #finance #business #youtubegrowth #youtubeshorts #digitalmarketingWhy automation matters #finance #seo #youtubegrowth #digitalmarketing #business #youtubeshortsAlgoSec Resilient DemoLesson 17: PCI - Linking Vulnerabilities to Business ApplicationsBridging the gap between cloud security and developmentHow to Integrate Security into the CI ProcessTips for Adding Capacity Without Changing Your Security PoliciesLesson 8: NAT Considerations When Managing Your Security PolicyCloudFlow DemoLesson 2: Bringing Reachability Analysis into Incident ResponseDevOpsifying Network Security: AlgoSec - Ansible DemoAlgoSec security #business #finance #seo #youtubegrowth #youtubeshorts #digitalmarketingNationwide Customer Testimonial - How we manage our applications' security policies with AlgoSecProfessor Wool - Mapping Existing ApplicationsLesson 9: How to Structure Network Objects to Plan for Future Policy GrowthLesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional Firewall Environment5 ways AlgoSec enhances your F5 Security Posture ManagementHow to Intelligently Select the Security Groups to Modify When Managing Changes in AWSCloud application deployment visibilityThe importance of an application-centric approach for fast and secure app delivery