Home Applications Gartner: Cloud Security Monitoring for IaaS, PaaS, SaaS

Gartner: Cloud Security Monitoring for IaaS, PaaS, SaaS

0
0

My journey deep into cloud security monitoring continues, with a brief detour into “faith-based monitoring” (as in “we believe our cloud provider takes care of monitoring“).In any case, let’s try to review what types of data we can leverage for security monitoring of resources deployed in each of the cloud service provider (CSP) types: SaaS, PaaS and IaaS.

Cloud modelSecurity monitoring data
IaaS· Logs: OS, database, applications, etc

· Network monitoring: local host traffic only, no promiscuous sniffing

· Host / endpoint activity: HIPS logs, antimalware logs, other agent, etc

· (if lucky and your CSP likes you) Some data from lower layers of the infrastructure such as hypervisor logs, change logs, etc

· (if all access to cloud is through such) Proxy/gateway data

PaaS· Logs: applications (if written by you – then as long as you engineered and enabled logging)

· Some logs from lower layers of the infrastructure such as select platform logs, error logs, etc

· (if all access to cloud is through such) Proxy/gateway data

SaaS· (if CSP provides this) Application logs such as access (often), changes (sometimes), etc

· (if all access to cloud is through such) Proxy/gateway data

· (if applicable) Client-side or browser based monitoring data

To learn more and to read the entire article at its source, please refer to the following page, Cloud Security Monitoring for IaaS, PaaS, SaaS- Gartner

   

More Resources:

DABCC DABCC.com, the world leader in sharing the finest Virtualization & Cloud news and support resources. #Citrix, #VMware, #Microsoft, #Mobility and much more! Brought to you by @douglasabrown & team!
| LATEST RESOURCES

White Papers

    steadyPRINT Data Sheet – centralized printer administration, monitoring and reliability!

    All In One Tool. Organize all tasks of your printer management centrally – intuitively and clearly structured: Management of the printer connections, driverless printing, monitoring & reporting of the complete print environment, print server reliability and migration and many more. Off er your users different options to simply and flexibly print their documents in each […]

    Downloads

      Download Universal Desktop Converter 3 (UDC3) – Turn PC in to Securely Managed End-Point

      The Universal Desktop Converter 3 (UDC3) thin client software provides a highly effective alternative to traditional thin client hardware. Download Universal Desktop Converter 3 (UDC3) The software is installed as the operating system on PCs, notebooks and selected thin clients, and turns the hardware into a powerful software based and universally deployable thin client allowing […]

      On-Demand Webinars

        Monitor Managing the End User Experience with GPU-Powered Insights – Citrix Ready On-Demand Webinar

        An On-Demand Citrix-Ready Webinar GPU technology improves Citrix virtual desktops and applications, but to truly deliver an immersive user experience that scales, organizations need to manage the complete GPU deployment lifecycle – from designing the infrastructure, to managing and optimizing a production environment, to responding to user issues dynamically, in real-time. eG Innovations in partnership with […]

        Latest Videos

          Turbonomic Feature Video #3 – The Supply Chain Navigator

          The Turbonomic Platform can do a whole lot and we decided it would be good to walk you through our customers top 10 favorite features within the platform Feature #3 is our Supply Chain Navigator. The interactive supply chain allows you to click on any entity in your environment and see how it is related […]

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Close