Tuesday, December 22, 2020

Infrastructure Protection

Vulnerability scanning and management — Open source databases track vulnerabilities in applications. The best application vulnerability management solutions do more than provide a risk score; they provide a remediation strategy and can even automatically remediate some issues for you.
Static application security testing — You can also analyze your applications for security issues.
Penetration testing — Pen testing analyzes your infrastructure from the viewpoint of a malicious It is particularly helpful for detection of misconfiguration and access management issues.
Software composition — Gather insight on the open-source applications in your network.
Change and configuration auditing — Monitoring all changes that could affect who can use particular applications and what those applications can access is also critical to security.


Cloud providers typically provide some tools for infrastructure protection, such as:
Log management
Anti-malware updates
Host-based intrusion detection
System integrity monitoring
Network segmentation (firewalls and antivirus)

To get a holistic view of your network from physical layer to application layer, you can use a network traffic analyzer, which bundles together:

More Info: jobs you can get with comptia a+

No comments:

Post a Comment