<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cloud security and asset inventory in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Cloud-security-and-asset-inventory/m-p/62547#M903</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/441572711"&gt;@JoshuaGabriel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question 1:&amp;nbsp;&amp;nbsp; Try this for starters:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.zluri.com/blog/cloud-asset-management-software/" target="_blank"&gt;https://www.zluri.com/blog/cloud-asset-management-software/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do your own assessment&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question 2:&amp;nbsp; There are many many vendors:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.coresecurity.com/blog/top-14-vulnerability-scanners-cybersecurity-professionals" target="_blank"&gt;https://www.coresecurity.com/blog/top-14-vulnerability-scanners-cybersecurity-professionals&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ServiceNow can do this as well&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question three:&amp;nbsp; Manually using the SP800-R53 V5 or trust the Cloud Providers, SOC 1 and SOC 2 reports or run your own independent Cloud Security Protection Management system - there are many vendors. &amp;nbsp; Ask yourself how often you need to run the scans?&amp;nbsp; When changes occur?&amp;nbsp; Quarterly?&amp;nbsp; Bi-annually?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question four:&amp;nbsp; &lt;A href="https://owasp.org/www-project-ai-security-and-privacy-guide/" target="_blank"&gt;https://owasp.org/www-project-ai-security-and-privacy-guide/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.fairinstitute.org/blog/fair-cyber-risk-analysis-ai-insider-threat-chatgpt" target="_blank"&gt;https://www.fairinstitute.org/blog/fair-cyber-risk-analysis-ai-insider-threat-chatgpt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this assists your thinking?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 05 Sep 2023 20:59:35 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2023-09-05T20:59:35Z</dc:date>
    <item>
      <title>Cloud security and asset inventory</title>
      <link>https://community.isc2.org/t5/Threats/Cloud-security-and-asset-inventory/m-p/62518#M902</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please I have the following concerns:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Are there tools you would recommend for comprehensive cloud assets inventory?&lt;/P&gt;&lt;P&gt;2. Is there any recommended platform to run scans on cloud assets?&lt;/P&gt;&lt;P&gt;3. How do you perform secure configuration reviews in the cloud?&lt;/P&gt;&lt;P&gt;4. Is there a way to assess the security risk of AI integrations?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2023 00:03:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cloud-security-and-asset-inventory/m-p/62518#M902</guid>
      <dc:creator>JoshuaGabriel</dc:creator>
      <dc:date>2023-09-05T00:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud security and asset inventory</title>
      <link>https://community.isc2.org/t5/Threats/Cloud-security-and-asset-inventory/m-p/62547#M903</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/441572711"&gt;@JoshuaGabriel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question 1:&amp;nbsp;&amp;nbsp; Try this for starters:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.zluri.com/blog/cloud-asset-management-software/" target="_blank"&gt;https://www.zluri.com/blog/cloud-asset-management-software/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do your own assessment&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question 2:&amp;nbsp; There are many many vendors:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.coresecurity.com/blog/top-14-vulnerability-scanners-cybersecurity-professionals" target="_blank"&gt;https://www.coresecurity.com/blog/top-14-vulnerability-scanners-cybersecurity-professionals&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ServiceNow can do this as well&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question three:&amp;nbsp; Manually using the SP800-R53 V5 or trust the Cloud Providers, SOC 1 and SOC 2 reports or run your own independent Cloud Security Protection Management system - there are many vendors. &amp;nbsp; Ask yourself how often you need to run the scans?&amp;nbsp; When changes occur?&amp;nbsp; Quarterly?&amp;nbsp; Bi-annually?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question four:&amp;nbsp; &lt;A href="https://owasp.org/www-project-ai-security-and-privacy-guide/" target="_blank"&gt;https://owasp.org/www-project-ai-security-and-privacy-guide/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.fairinstitute.org/blog/fair-cyber-risk-analysis-ai-insider-threat-chatgpt" target="_blank"&gt;https://www.fairinstitute.org/blog/fair-cyber-risk-analysis-ai-insider-threat-chatgpt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this assists your thinking?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2023 20:59:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cloud-security-and-asset-inventory/m-p/62547#M903</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-09-05T20:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud security and asset inventory</title>
      <link>https://community.isc2.org/t5/Threats/Cloud-security-and-asset-inventory/m-p/62649#M906</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It's great that you're concerned about cloud security and asset inventory. Here are some recommendations and insights for your concerns:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;STRONG&gt;1. Cloud Assets Inventory:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;AWS: Use AWS Config.&lt;/LI&gt;&lt;LI&gt;Azure: Try Azure Resource Graph.&lt;/LI&gt;&lt;LI&gt;Google Cloud: Utilize Cloud Asset Inventory.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;2. Scans on Cloud Assets:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;AWS: AWS Inspector.&lt;/LI&gt;&lt;LI&gt;Azure: Azure Security Center.&lt;/LI&gt;&lt;LI&gt;Google Cloud: Security Command Center.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;3. Secure Configuration Reviews:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Use Cloud Security Posture Management (CSPM) tools or Infrastructure as Code (IaC) with Terraform/AWS CloudFormation.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;4. Security Risk of AI Integrations:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Conduct threat modeling.&lt;/LI&gt;&lt;LI&gt;Implement secure development practices.&lt;/LI&gt;&lt;LI&gt;Consider AI-specific security tools like IBM Watson OpenScale or Azure Machine Learning security features.&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 09 Sep 2023 17:59:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cloud-security-and-asset-inventory/m-p/62649#M906</guid>
      <dc:creator>gregbowers</dc:creator>
      <dc:date>2023-09-09T17:59:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud security and asset inventory</title>
      <link>https://community.isc2.org/t5/Threats/Cloud-security-and-asset-inventory/m-p/65770#M1013</link>
      <description>&lt;P&gt;&lt;SPAN&gt;These are two tools for cloud security and asset inventory Azure Policy and Azure environments.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2023 12:44:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cloud-security-and-asset-inventory/m-p/65770#M1013</guid>
      <dc:creator>marcoperson250</dc:creator>
      <dc:date>2023-12-28T12:44:41Z</dc:date>
    </item>
  </channel>
</rss>

