Secure Cloud: Complete - Uncover Risks in the Cloud
In this blog
We help many organizations through the challenges of having a cloud presence. One of the main concerns from all verticals is a lack of visibility across all aspects of the cloud environment. It is increasingly difficult to view and manage activity across the cloud as users from entirely different departments are taking advantage of the many self-service options available to them. Not only is there a disconnect between security teams and cloud users, but there is a gap in gathering relevant data across all potential risk surfaces. To gain this level of visibility, multiple tools and a full team of security professionals are required.
Secure Cloud: Complete offers a 21-day, point-in-time analysis of your cloud environment, evaluating cloud posture, data posture and workload segmentation for customers to lay a solid foundation for their cloud security journey. With no impact on existing operations and no product commitments, it provides leaders with the clarity needed to guide cloud strategy and accelerate digital initiatives.
How will it work?
At the beginning of the engagement, WWT will collaborate with the customer to connect our suite of tools to your cloud account(s). Each tool will require a separate API-based, non-intrusive connection. We will allow the tools to gather data for the next 21 days. At the end of the engagement, WWT experts from each domain will pull reports, analyze the data, and produce a report for easy consumption. After the assessment concludes, all resources that were created during the process will be fully removed, leaving the existing infrastructure unaffected.
Secure Cloud: Complete combines three preexisting assessments from three different tools, each in separate domains. The specific vendors selected provide native integrations and can provide context across platforms, enriching the findings with stronger accuracy and impact. We see the value in each tool independently, but we believe that a unified solution-based accelerator will bring an enhanced view of the cloud environment to help teams focus on cloud initiatives using actionable data gained for your estate.
Cloud security
Wiz is the core of this accelerator. When evaluating cloud security posture, many data points across multiple cloud environments need to be taken into consideration; misconfigurations, compliance adherence, vulnerabilities, entitlement management, and more. While this data would typically come from separate feeds, Wiz is able to correlate across these risk domains to provide a consolidated, prioritized list of toxic combinations, which are a group of varying findings affecting the same resources. Wiz uses its unified policy engine and Security Graph to create these toxic combinations based on the extensive context it has access to, allowing security teams to save time when assessing the full risk a resource may be exposed to.
Much of Wiz's strategy revolves around context. This is prevalent within its own capabilities, but one of its biggest differentiators is its network of third-party integrations that add even more data points to enrich vulnerability and misconfiguration context. Currently, no single tool addresses all cloud security concerns; Wiz recognizes this and embraces it, making it easier for its customers to enrich their Security Graph with data from other tools in their security stack.
Data security
Organizations utilizing Wiz can leverage Cyera's direct integration to gain a deeper data security context. It will allow security teams visibility into what sensitive data exists in their environment and then provide important insights such as where it is, how it is being accessed, where it is being accessed from, when it is being used, how often it is being used and what factors might be exposing it to risk. An important piece to note is that all this context is tied together automatically, providing a baseline of the state of data, whether it is in use or at rest, allowing the tool to then track any anomalous or suspicious behavior that indicates a threat and provides an appropriate response. Having a clear understanding of all data in an environment, as well as the activity surrounding it, is crucial to a comprehensive cloud security strategy.
Network segmentation
Illumio gives organizations a clear view into how their cloud environments operate by showing how workloads communicate across platforms, including AWS, Azure and GCP. By mapping traffic flows and dependencies in real time, Illumio makes it easier to identify potential vulnerabilities, misconfigurations, or unusual communication patterns that might otherwise go unnoticed. This visibility provides teams with the context they need to understand their cloud estate, where risks may exist, how applications interact, and what pathways attackers could take, making it a strong starting point for assessing and improving security in complex and dynamic cloud environments. Integrating Illumio with Wiz provides powerful context when assessing attack paths and toxic combinations.
Conclusion
Wiz, Illumio CloudSecure and Cyera each play distinct yet complementary roles in delivering risk-based visibility for public cloud environments. Wiz's Security Graph harnesses deep context across several domains to prioritize exploitable risks, while Illumio CloudSecure is adept at visualizing real-time traffic and automating segmentation to prevent lateral movement. Cyera augments both platforms by mapping sensitive data, access paths, and business impact, bridging technical risks to regulatory priorities.
Integrating these three solutions into the Secure Cloud: Complete accelerator provides end-to-end visibility empowering security teams to address cloud risks with comprehensive visibility and actionable precision.