Security professionals often attach a packet capture security appliance to a span port on hardware network equipment to capture network packets in a data center. On AWS customers do not have access to span ports and physical networking equipment. This led some security professionals to believe it is not possible to implement a packet capture solution on AWS. In fact, packet … [Read more...]
How to Automate Deployment of a WatchGuard Firebox Cloud on AWS
The last Secplicity blog post in this series on cloud security described the security benefits of CloudFormation for automated deployments. CloudFormation can deploy security appliances in AWS accounts that help protect applications and data in cloud environments. UTM (or Next-Gen Firewall) on AWS Deploying a WatchGuard Firebox Cloud is one way to increase security in an … [Read more...]
CloudFormation Benefits for Secure AWS Deployments
As discussed in a prior Secplicity blog post, automation can help improve security by reducing the potential for human error. Security automation includes programmatic deployments of infrastructure and applications. But how do you automate cloud deployments? If you are using AWS, CloudFormation is one of your options. CloudFormation has some features that help secure the AWS … [Read more...]
How Can Automation Improve Security?
A prior Secplicity blog post explored the potential of cloud security. Automation is one of the most important reasons to move applications to the cloud. By design, third-party cloud platforms can automate manual tasks to deploy, monitor and maintain systems. The AWS Architecting for the Cloud whitepaper explains best practices for cloud applications driven by automation. How … [Read more...]
Can The Cloud Be “More Secure”?
The CIO of Capital One, one of the largest banks in the US, made a bold statement in 2015 at a major cloud conference. “We can operate more securely on AWS than we can in our own data center.” Is this really possible? In your own data center or on your own physical servers, you have complete control over everything. You install the software, network, and hardware so you know … [Read more...]