From the course: Certificate of Cloud Security Knowledge (CCSK) Cert Prep

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Runtime defense and monitoring

Runtime defense and monitoring

- [Instructor] In a high-velocity CI/CD application production environment, the runtime defense and monitoring must keep pace with emerging threats in real time. To accomplish adequate real-time protection, the CCSK recommends applying two controls. The first is the web application firewall. The firewall can enable rules to secure workloads hosting website traffic based on HTTP/S and HTTP traffic. You can also manage additional application and protocol lists for what the web portal connects to, like database backend systems. As we have seen before, the web application firewall is a feature of the virtual network, but it can also be retrieved as a standalone resource. API gateways can manage the connection and access to data, business logic, and functionality from backend services, such as workloads. It provides granular control of basic authentication and authorization actions, rate limiting, and request response transformations to assist in reducing blast radius of attacks from…

Contents