- Man in the Cloud (MITC) Attacks
These MITC attacks rely on common file synchronization services (such as
In the MITC attacks, the attacker gets access to the victim’s account without compromising the victim’s
For the first part of the mitigation strategy, we urge organizations to use a Cloud Access Security Broker (CASB) solution that monitors access and usage of enterprise cloud services by the enterprise users. We believe CASB solutions can
The second part requires that organizations deploy controls such as DAM and FAM around their business data
https://www.imperva.com/docs/HII_Man_In_The_Cloud_Attacks.pdf
- Database Activity Monitoring (DAM)
Database activity monitoring
https://en.wikipedia.org/wiki/Database_activity_monitoring
- File Activity Monitoring (FAM)
File Activity Monitoring discovers the sensitive data on your servers; classifies content using pre-defined or user defined definitions; configures rules and policies about data access, and actions to
File activity monitoring
Discovery includes collecting metadata and entitlements for files and folders.
Classification uses decision plans to identify potentially sensitive data in the files, such as credit card information or personally identifiable information.
Monitoring and collection of audit information and policy rules, and real time alerts or blocking of suspicious users or connections.
https://www.ibm.com/support/knowledgecenter/en/SSMPHH_10.6.0/com.ibm.guardium.doc/getstart/getting_started_fam.html
No comments:
Post a Comment