This is an excellent report for all IT Pros and Engineers.
Highlights:
- Storage is most impacted solution
- Open security groups or network configuration
- Secrets are not so secret
- Unused resources are not secure.
Take a look at these. Look again. These are not highly skilled problems. They just need guidelines and proactive management. The article uses policy as code as a solution for many of the problems. I will drill into each of these more in the future. I wanted to get the awareness out first and then, come back to solutions.
Comments