Está en la página 1de 5

Best Practice Guide for

Multi-Cloud Security
Advanced Vulnerability Management with Tripwire IP360

FOUNDATIONAL CONTROLS FOR 
SECURITY, COMPLIANCE & IT OPERATIONS
When you opt to use multiple cloud providers, you’re implementing a
multi-cloud strategy. This practice is increasingly common, and can refer 80% of IT decision-makers
to mixing SaaS (software as a service) and PaaS (platform as a service) say new approaches are
offerings as well as public cloud environments that fall under the IaaS needed to successfully
(infrastructure as a service) category. The most common public cloud operate in multi-cloud
environments today are Amazon Web Services (AWS), Microsoft Azure and environments.
Google Cloud. ——What the New Multi-Cloud
World Means to IT,
Security professionals responsible for securing multi-cloud environments BMC infographic
are often stuck trying to apply the old principles of vulnerability
management (VM) to these new environments with varying success. The
truth is, multi-cloud environments require special consideration when
Scanning
deploying VM tools.
Vulnerability management functions
by way of continuous, scheduled scan-
This best practice guide outlines the methods of deploying and using ning. These scans can pick up known
vulnerabilities, misconfigured assets,
Tripwire® IP360™ in a multi-cloud environment with public cloud
uninventoried endpoints, slips in compli-
providers. ance and many other network instances
that hackers see as an invitation.

Multi-Cloud Benefits and In addition to the benefits, multi-cloud


strategies do create additional chal-
Scanning can be performed via agent-
based or agentless methods—and
Challenges lenges as well: there are pros and cons to both
Organizations and agencies have an approaches. Agents can provide access
unprecedented range of options for »» It can be difficult to assess where to to environments, including some cloud
data storage. You can manage your allot your resources for maximum environments, where remote network
data on-premises, fully in the cloud, or ROI. scanning is difficult or prohibited. They
in a hybrid environment wherein both »» It’s harder to stay compliant with also reduce the requirement to maintain
on-premises and cloud computing are regulatory standards while operating and track endpoint credentials required
used. A multi-cloud strategy doesn’t in multiple clouds. for agentless scanning, and may provide
mean you have to do away with your better tracking in a dynamic IP environ-
»» Most organizations lack the necessary
on-premises or hybrid cloud setup, ment. Agentless scans can also identify
tools to run successful multi-cloud
either; you can have both a hybrid and information that isn’t stored on network
vulnerability management.
multi-cloud approach at once. There devices, like SSL certificates. However,
are a number of reasons a multi-cloud
strategy is becoming more popular:
Vulnerability Management it’s not a matter of choosing one over the
other. The strongest vulnerability man-
Basics agement strategy will employ both types
»» Multi-cloud approaches reduce Cyber attacks generally exploit known of vulnerability assessment.
reliance on a single vendor, also vulnerabilities. The way to make sure
known as “vendor lock-in.” that you know about your system’s In a multi-cloud environment, you’ll
»» This also mitigates fears of data loss vulnerabilities before your adversar- want a solution that builds agents into
or downtime if there’s an issue in any ies do is the practice of vulnerability the deployment pipeline for virtual
one environment. management. images. That means a robust vulnerabil-
ity management solution will already be
»» Multi-cloud strategies allow you to present when when an image spins up,
take advantage of the perks of several to feed scan results back to your device
providers at once. profiler.
Prioritization Tripwire VnE Manager
Once your scanning operations flag Regardless of your type of cloud envi- The Rise of Multi-
vulnerabilities and provide vulnerability ronment and your decisions around
risk assessments, how do you take agentless or agent-based vulnerability Cloud Computing
action? It’s crucial that your vulnerability management scans, the information you
management solution delivers your scan collect will end up on your Tripwire® According to a 2017 Cloudify
results in order of priority so you know VnE Manager. This is the centralized survey, 50 percent of
which vulnerabilities to tackle first. management appliance that utilizes a
fully-hardened Linux-based operating
organizations already have
more than one IaaS vendor
Tripwire IP360 in system, strong encryption for com-
munications and frequent system and in play. A similar survey by
Multi-cloud Environments vulnerability signature updates provided Enterprise Management
Tripwire IP360 not only provides com- by Tripwire VERT (Vulnerability and
prehensive asset discovery, inventory Exposure Research Team). Tripwire
Associates puts that
and prioritization—it also does so VnE Manager is optimized for asset number at 61 percent, with
across your entire multi-cloud environ- discovery, vulnerability scanning and 35 percent of organizations
ment. That means you can stay within reporting for fast, easy and cost-effec- using four or more public
regulatory compliance and maintain tive deployment.
a stringent cybersecurity posture no clouds at once.
matter how many public cloud vendors How Tripwire Device Profilers work
you’re using at once. Tripwire IP360
virtual appliances can be deployed in in
in multi-cloud environments Generally, you can’t have a scan engine
AWS, Azure and Google Cloud. You can deploy Tripwire’s scan engine, scanning from one cloud into another—
the Tripwire Device Profiler (DP), in each Tripwire DPs generate a lot of outbound
type of cloud environment discussed traffic that can look like an attack when
above. Tripwire DPs can perform both transmitted from one cloud environment
agentless or agent-based scanning. to another. With Tripwire technology
designed for multi-cloud environments,
DP virtual images collect data and route
it back your VnE Manager.

Google Cloud, Google Clou,d Google Cloud, Google Cloud,


Azure AWS or Azure AWS or Azure AWS or Azure AWS or Azure

Google AWS

TRIPWIRE® TRIPWIRE® TRIPWIRE®


IP360 IP360 IP360

Fig. 1 Regardless of which services you use, Tripwire provides flexible multi-cloud deployment options for VnE Managers and
Device Profilers.
Eight Steps to a Successful 5. Decide where you want to collect this
info in the VnE Manager—on-prem, in
Multi-Cloud Deployment one of the cloud environments, or one REQUEST A DEMO
When you’re ready to leverage the for each cloud environment.
benefits of a multi-cloud approach with Visit tripwire.com/contact/
6. Enable remote scanning Tripwire DP
Tripwire IP360’s powerful vulnerability
virtual images in your public cloud request-demo and learn
management, follow these best practice
environments.
steps to get started: more about how Tripwire
7. Regularly review the results from IP360 is the perfect
1. Review the concept of the shared your cloud assessments and follow
security model in the cloud with your remediation instructions.
vulnerability management
business partners to make sure they solution for on-prem, cloud
8. Assess the security of your cloud
understand the benefits and risks of
services with a tool like Tripwire Cloud and hybrid environments.
moving to the cloud. Reinforce that VM
Management Assessor.
and security controls are an essential
part of a cloud strategy.
Summary
2. Inventory which cloud environments Multi-cloud environments call for
are being used or planned by your sophisticated vulnerability management
organization and choose your cloud solutions. Whether your organization
vendors. or agency uses on-premises, cloud or
3. Understand the accounts and hybrid systems, Tripwire IP360 provides
deployment zones where you need comprehensive asset discovery and
visibility to monitor for vulnerabilities. inventory. Take advantage of the most
Deploy Tripwire DP scanning granular risk scoring and prioritiza-
resources to get the needed coverage. tion reporting on the market in order
to address vulnerabilities quickly and
4. Understand the nature of the
thoroughly.
application in the cloud. Server
replacement IaaS may be a good fit
for network scanning. Highly dynamic
environments will need agents or
integration with the cloud tools.
Tripwire is a leading provider of security, compliance and IT operations solutions for enterprises, industrial
organizations, service providers and government agencies. Tripwire solutions are based on high-fidelity
asset visibility and deep endpoint intelligence combined with business context; together these solutions
integrate and automate security and IT operations. Tripwire’s portfolio of enterprise-class solutions
includes configuration and policy management, file integrity monitoring, vulnerability management,
log management, and reporting and analytics. Learn more at tripwire.com

The State of Security: Security News, Trends and Insights at tripwire.com/blog


Follow us on Twitter @TripwireInc » Watch us at youtube.com/TripwireInc

©2018 Tripwire, Inc. Tripwire, Log Center/LogCenter, IP360 and Tripwire Axon are trademarks or registered trademarks of Tripwire, Inc.
All other product and company names are property of their respective owners. All rights reserved. BRMCSBPG1a 1807

También podría gustarte