Download - Security Teams & Tech In A Cloud World
![Page 1: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/1.jpg)
Security Teams & Tech In A Cloud WorldMark Nunnikhoven, Vice President Cloud Research @marknca
Audience: Public
![Page 2: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/2.jpg)
Security “Facts”
![Page 3: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/3.jpg)
Security “Facts”* About your organization or one just like it
![Page 4: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/4.jpg)
We will respond quickly to an incident
![Page 5: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/5.jpg)
Attackers are on a network an average of 154 days
![Page 6: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/6.jpg)
We need more tools
![Page 7: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/7.jpg)
Canadian companies spend just under 10% on IT security
![Page 8: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/8.jpg)
Canadian companies spend just under 10% on IT security* 60% of companies didn’t mention people or process as an area of focus
![Page 9: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/9.jpg)
Users are a major problem
![Page 10: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/10.jpg)
Security is considered the opposite of usability
![Page 11: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/11.jpg)
Security is everyone’s responsibility
![Page 12: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/12.jpg)
You have one, isolated security team
![Page 13: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/13.jpg)
You have one, isolated security team* …and a wildly unsuccessful “awareness” program
![Page 14: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/14.jpg)
![Page 16: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/16.jpg)
Modern Security
![Page 19: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/19.jpg)
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
![Page 20: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/20.jpg)
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
SIEM / Log Store
![Page 21: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/21.jpg)
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
SIEM / Log StoreMonitoring
![Page 22: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/22.jpg)
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
SIEM / Log StoreMonitoring
Event-driven Function
![Page 23: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/23.jpg)
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
SIEM / Log StoreMonitoring
CSP API Event-driven Function
![Page 24: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/24.jpg)
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
SIEM / Log StoreRestrict Access Monitoring
CSP API Event-driven Function
![Page 25: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/25.jpg)
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
SIEM / Log StoreRestrict Access Monitoring
Web UI
CSP API Event-driven Function
![Page 26: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/26.jpg)
2014
![Page 27: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/27.jpg)
What’s the hold up?
![Page 28: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/28.jpg)
![Page 29: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/29.jpg)
![Page 30: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/30.jpg)
![Page 31: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/31.jpg)
![Page 32: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/32.jpg)
Running in the Cloud
![Page 33: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/33.jpg)
IaaS(Infrastructure)
PaaS(Container)
SaaS(Abstract)
Data
Application
Operating System
Virtualization
Infrastructure
Physical
Data
Application
Operating System
Virtualization
Infrastructure
Physical
Data
Application
Operating System
Virtualization
Infrastructure
Physical
Shared Responsibility Model
![Page 34: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/34.jpg)
Setup
• Lock down operating system, applications, and dataHarden system according to NIST / best practices Encrypt everything
• Enable service health monitoring featuresCheck your CSP’s documentation
• Monitor service API activitiesLook for unauthorized; replication, start up, termination, etc.
Steps:
IaaS
![Page 35: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/35.jpg)
Setup
• Read all the documentationSeriously, RTFM
• Implement strong code quality systemsAutomation is critical to success
• Configure access control and other security featuresCheck your CSP’s documentation
Steps:
PaaS
![Page 36: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/36.jpg)
Setup
• Read all the documentationSeriously, RTFM
• Configure access control and other security featuresCheck your CSP’s documentation
Steps:
SaaS
![Page 37: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/37.jpg)
Setup
• Evaluate controls against acceptable level of risk for data used in serviceI shouldn’t have to say this
• Monitor all service provider status updates and communications channelsRemember to include them in your IR plans
Steps:
Any Cloud Service
![Page 38: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/38.jpg)
IaaS(Infrastructure)
PaaS(Container)
SaaS(Abstract)
Data
Application
Operating System
Virtualization
Infrastructure
Physical
Data
Application
Operating System
Virtualization
Infrastructure
Physical
Data
Application
Operating System
Virtualization
Infrastructure
Physical
Shared Responsibility Model
![Page 39: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/39.jpg)
Opportunity
![Page 40: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/40.jpg)
© Trend Micro, 201627
PhysicalWeeks
VirtualDays
CloudMinutes
ContainerSeconds
FunctionImmediate
{ Time to deploy }
{ Environment }
![Page 41: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/41.jpg)
© Trend Micro, 201628
PhysicalWeeks
VirtualDays
CloudMinutes
ContainerSeconds
FunctionImmediate
{ Time to deploy }
{ Environment }
![Page 42: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/42.jpg)
© Trend Micro, 201629
Move faster Focus on value
Goal
![Page 43: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/43.jpg)
© Trend Micro, 201630
Deploy using the method that delivers the most value
Goal
![Page 44: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/44.jpg)
© Trend Micro, 201631
Every tool adds overhead
Constraint
![Page 45: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/45.jpg)
© Trend Micro, 201632
Automation allows for the speed, scale, and consistency required
Relief
![Page 46: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/46.jpg)
© Trend Micro, 201633
Deploy using the method that delivers the most value
Goal
![Page 47: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/47.jpg)
© Trend Micro, 201634
…with minimal operational impact
Deploy using the method that delivers the most value
Goal
![Page 48: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/48.jpg)
DevOps
![Page 49: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/49.jpg)
Flickr deploys 10+/day
Success
![Page 50: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/50.jpg)
Etsy deploys 50+/day
Flickr deploys 10+/day
Success
![Page 51: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/51.jpg)
Etsy deploys 50+/day
Amazon deploys 11.7 seconds
Flickr deploys 10+/day
Success
![Page 52: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/52.jpg)
Etsy deploys 50+/day
Amazon deploys 11.7 seconds
Adobe +60% app development
Flickr deploys 10+/day
Success
![Page 53: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/53.jpg)
Etsy deploys 50+/day
Amazon deploys 11.7 seconds
Adobe +60% app development
Fidelity $2.3M saved for one app
Flickr deploys 10+/day
Success
![Page 54: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/54.jpg)
Where’s security?
![Page 55: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/55.jpg)
…can have a much stronger security posture in AWS and the cloud than they can on-premises
Andy Jassy, AWS CEO
* From an interview with the Wall Street Journal, http://www.wsj.com/articles/amazons-andy-jassy-on-the-promise-of-the-cloud-1477880220
![Page 56: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/56.jpg)
Security is everyone’s responsibility
![Page 57: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/57.jpg)
Security Everyone
![Page 58: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/58.jpg)
Team Challenges
![Page 59: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/59.jpg)
![Page 60: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/60.jpg)
New Skills Needed
• Basic understanding of development practices & ability to write simple code Everything in the cloud is an API. Security MUST BE automated
• Puts the user f irst We make the tech that they “can’t use right” … not their fault
• Perspective & understanding of practical securityNo more “the sky is falling”
• EducatorsWritten, video, presentations, Slack,…anywhere teams are working
Steps:
Security Specialist
![Page 61: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/61.jpg)
![Page 62: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/62.jpg)
Your Org Chart Is Wrong
![Page 63: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/63.jpg)
Typical Org Chart
CISO Dev
GRC Ops
Infrastructure
CIO
Ops
![Page 64: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/64.jpg)
Updated Org Chart
CISO Dev
GRC Ops
Infrastructure
CIO
Ops
![Page 65: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/65.jpg)
Updated Org Chart
CISO Dev
GRC
OpsInfrastructure
CIO
Ops
![Page 66: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/66.jpg)
Updated Org Chart
CISO Dev
GRC
OpsInfrastructure
CIO
Ops
GrC
![Page 67: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/67.jpg)
@petermePeter Merholz Kristin Skinner
@bettay
![Page 68: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/68.jpg)
Specialist Distribution
![Page 69: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/69.jpg)
Specialist Distribution
![Page 70: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/70.jpg)
Specialist Distribution
![Page 71: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/71.jpg)
Specialist Distribution
![Page 72: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/72.jpg)
Specialist Distribution
![Page 73: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/73.jpg)
Specialist Distribution
![Page 74: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/74.jpg)
Specialist Distribution
![Page 75: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/75.jpg)
![Page 76: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/76.jpg)
Coffee Shadowing Teaching
Bridges
![Page 77: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/77.jpg)
Goal
![Page 78: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/78.jpg)
Fabric
![Page 79: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/79.jpg)
![Page 80: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/80.jpg)
1 min
![Page 81: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/81.jpg)
1 min
Slow lane
![Page 82: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/82.jpg)
1 min
Slow lane
Fast lane
![Page 83: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/83.jpg)
1 min
Slow lane
Fast lane
![Page 84: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/84.jpg)
1 min
![Page 85: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/85.jpg)
1 min
![Page 86: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/86.jpg)
1 min
Is this bad?
![Page 87: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/87.jpg)
1 min
Is this bad?
![Page 88: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/88.jpg)
1 min
Is this bad?
Is this malicious?and
![Page 89: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/89.jpg)
1 min
Is this bad?
Is this malicious?and
![Page 90: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/90.jpg)
1 min
Is this bad?
Is this malicious?and
![Page 91: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/91.jpg)
1 min
Is this bad?
![Page 92: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/92.jpg)
1 min
Aggregate information
Is this bad?
![Page 93: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/93.jpg)
1 min
Aggregate information
Is this bad?
1m, h, d, w, m Trends
![Page 94: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/94.jpg)
1 min
Aggregate information1m, h, d, w, m Trends
![Page 95: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/95.jpg)
1 min
Aggregate information1m, h, d, w, m Trends
Evidence of compliance
![Page 96: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/96.jpg)
1 min
Aggregate information1m, h, d, w, m Trends
Evidence of complianceConfiguration Processes
![Page 97: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/97.jpg)
1 min
Aggregate information1m, h, d, w, m Trends
Evidence of complianceConfiguration Processes
Deployment data
![Page 98: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/98.jpg)
1 min
Aggregate information1m, h, d, w, m Trends
Evidence of complianceConfiguration Processes
Deployment dataPerformance Debug
![Page 99: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/99.jpg)
1 min
![Page 100: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/100.jpg)
1 min
SecOps
![Page 101: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/101.jpg)
1 minAggregate Evidence Deployments
SecOps
![Page 102: Security Teams & Tech In A Cloud World](https://reader034.vdocuments.mx/reader034/viewer/2022051708/5899d5011a28ab4a0b8b5541/html5/thumbnails/102.jpg)
Get stuff done