Register now for better personalized quote!

HOT NEWS

Learn How to Secure Your Cloud-native Applications and Infrastructure -Part 3, Cisco Stealthwatch Cloud

Nov, 19, 2020 Hi-network.com

Welcome,|to|Part 3 of our Cisco Application-First Security blog series! The aim of the series is to prepare you to tackle the new DevNet learning track, where you'll learn how to secure your cloud-native applications and infrastructure using:

  • Application segmentation
  • Application monitoring
  • Public cloud threat detection
  • Multi-factor authentication

InPart 1of the blog series we introduced you to the new DevNet learning track and accompanying DevNet Sandbox, and to the docs and other resources you can find on the new Cisco Application-First Security website. We also introduced you to the "Sock Shop" e-commerce scenario you'll be working with in the learning track. [link]

Part 2focused on Cisco Duo to add multi-factor authentication (MFA) to protect both your build-environment and Sock Shop app from unintended access. [link to Duo blog: https://blogs.cisco.com/developer/secure-cloud-native-apps-infra-duo]

Now in Part 3, we'll focus on whatCisco Stealthwatch Cloudcan do to give you visibility to your public cloud resources and detect threats in your application environment.

Improve security and incident response across the distributed networks

Cisco Stealthwatch Cloudimproves security and incident response across the distributed network, from the private network and branch office to the public cloud. This solution addresses the need for digital businesses to quickly identify threats posed by their network devices and cloud resources, and to do so with minimal management, oversight, and security manpower.

Stealthwatch CloudPublic Cloud Monitoring (PCM) is avisibility, threat identification, and compliance servicefor Amazon Web Services (AWS). It can also protect other public cloud environments like Azure and GCP. Stealthwatch Cloud consumes network traffic data, including Virtual Private Cloud (VPC) flow logs, from your AWS public cloud network. It then performs dynamic entity modeling by running analytics on that data to detect threats and indicators of compromise.

Stealthwatch Cloud consumes VPC flow logs directlyfrom your AWS account using a cross-account IAM role with the proper permissions. In addition, Stealthwatch Cloud can consume other sources of data, like CloudTrail and IAM, for additional context and monitoring. These native AWS integration make Stealthwatch Cloud an easy plug and play security solution for the Sock Shop!

The Stealthwatch Cloud service can evenmonitor network traffic between pods running in Kubernetesclusters. This is perfect for your e-commerce unicorn, which is completely build on Kubernetes using AWS EKS! In order to have visibility into inter-pod traffic, each node needs a Stealthwatch Cloud sensor pod. A Kuberentes DaemonSet is used to ensure that those pods always exist on those nodes.

Stealthwatch Cloud uses all of this data from AWS and Kubernetes tomodel the behavior of each cloud resource, a method called entity modeling. It is then able to detect and alert on sudden changes in behavior, malicious activity, and signs of compromise.

Now you cansleep more soundlyknowing that Stealthwatch Cloud is providing public cloud visibility and threat detection for your vibrant Sock Shop business.

Give the new learning track a try

Want to give it a whirl? You'll find it all, including:

  • The Sock Shop lab, "Cisco App-First Security Lab in AWS"
  • Dedicated Stealthwatch Cloud labs covering APIs and alerting

You'll find everything you need to try it here in thenew DevNet learning track.

Related resources:

  • Visit the DevNet Security Dev Center. Find open APIs and integration points to support 3rd party integrations.
  • Learn about DevNet professional certifications for Cisco Certified DevNet Specialist -Security Automation and Programmability, including exam topics and study materials.

 


We'd love to hear what you think. Ask a question or leave a comment below.
And stay connected with Cisco DevNet on social!

Twitter @CiscoDevNet | Facebook | LinkedIn

Visit the new Developer Video Channel


tag-icon Hot Tags : Network security Cisco DevNet Cisco Stealthwatch Cloud

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.