ABSTRACT

The threat actors seek out vulnerabilities in private cloud implementation and seek to exploit them. There are disruptive attacks and payload-driven attacks. Disruptive attacks, typically launched by hacktivists, are designed to cause downtime and draw attention. To effectively manage threats in private cloud need to rely on layered protection. The two-pronged attack is to prevent breaches and improve early detection of threats. A typical data breach attack is multiphased and happens over time typically. Centralize log storage and heuristics for indexing, filtering, and funneling security data into actionable intelligence. A good security information event manager (SIEM) deployment is at the heart of an effective threat intelligence system. Tying SIEM to communication systems enables to mobilize threat analysts or information technology administrators in short order. The tie-in to ticketing system allows for tracking and time stamping as triage is being done.