<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cloud Security Posture Management - Aqua</title>
	<atom:link href="https://www.aquasec.com/category/cloud-security-posture-management/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Cloud Native Security, Container Security &#38; Serverless Security</description>
	<lastBuildDate>Mon, 06 Jan 2025 19:18:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Discover Cloud Security Issues Faster with Event-based Scanning</title>
		<link>https://www.aquasec.com/blog/discover-cloud-security-issues-faster-with-event-based-scanning/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 23 Apr 2024 14:35:28 +0000</pubDate>
				<category><![CDATA[Cloud Security Posture Management]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=19794</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/discover-cloud-security-issues-faster-with-event-based-scanning/" title="Discover Cloud Security Issues Faster with Event-based Scanning" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2024/04/blog-main-event-based-scanning-1200x628-2023.png" alt="Discover Cloud Security Issues Faster with Event-based Scanning" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>In today&#8217;s cloud security landscape, the challenge of keeping pace with evolving threats is daunting for security practitioners. Meanwhile, malicious actors operate at lightning speed, often breaching organizations and extracting valuable data within minutes, if not seconds. Imagine what they could accomplish in 24 hours — can any modern organization afford such a gap in&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Infographic: What is CSPM and Why You Need It</title>
		<link>https://www.aquasec.com/blog/what-is-cspm-why-you-need-it-infographic/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 07 Jan 2021 15:45:00 +0000</pubDate>
				<category><![CDATA[Cloud Security Posture Management]]></category>
		<category><![CDATA[AWS Security]]></category>
		<category><![CDATA[CSPM]]></category>
		<category><![CDATA[Google cloud security]]></category>
		<category><![CDATA[Hybrid Cloud Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=15374</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/what-is-cspm-why-you-need-it-infographic/" title="Infographic: What is CSPM and Why You Need It" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2021/01/CSPMGuideTeaserblog-image-Final.jpg" alt="Infographic: What is CSPM and Why You Need It" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>As a major trend in 2020, enterprises have been increasingly adopting multi-cloud to elevate efficiency and maintain flexibility and independence. But multi-cloud environments are more complex and harder to secure, leading to more cloud service misconfigurations and breaches. Making matters worse, many organizations still believe that their cloud provider will protect them, but the truth&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Auto-Remediation for Secure Configuration in Azure Cloud</title>
		<link>https://www.aquasec.com/blog/auto-remediation-azure-cloud/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 17 Nov 2020 11:57:44 +0000</pubDate>
				<category><![CDATA[Cloud Security Posture Management]]></category>
		<category><![CDATA[Azure security]]></category>
		<category><![CDATA[CSPM]]></category>
		<category><![CDATA[Security Automation]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=15434</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/auto-remediation-azure-cloud/" title="Auto-Remediation for Secure Configuration in Azure Cloud" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2020/11/CSPM-Azure-Remediations-Blog-Image-CTA.jpg" alt="Auto-Remediation for Secure Configuration in Azure Cloud" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Each day, Aqua monitors millions of cloud infrastructure changes for misconfigurations, and control-plane events for security issues or malicious activity in our users’ cloud accounts. But we’ve learned that just identifying misconfigurations is not enough to protect cloud assets in a modern fast-paced environment. Operating efficiently at scale requires fixing security issues on the fly.&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>CloudSploit Delivers Best Practices for Oracle Cloud Security</title>
		<link>https://www.aquasec.com/blog/oracle-cloud-security/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Mon, 16 Mar 2020 10:15:00 +0000</pubDate>
				<category><![CDATA[Cloud Security Posture Management]]></category>
		<category><![CDATA[CSPM]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=15624</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/oracle-cloud-security/" title="CloudSploit Delivers Best Practices for Oracle Cloud Security" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2020/03/Oracle-Cloud-and-CS-Blog-Image.jpg" alt="CloudSploit Delivers Best Practices for Oracle Cloud Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Our customers challenged us to add Oracle Cloud Infrastructure (OCI) security to the list of public clouds that Aqua CSPM (aka CloudSploit) covers – and make it seamless. That meant giving our customers a singular view into the public cloud platforms they use, while maintaining the same level of control with easy-to-use interfaces. Well, we&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>What You Need to Know About AWS Lambda Functions Risk Mitigation</title>
		<link>https://www.aquasec.com/blog/aws-lambda-security/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 30 Jan 2020 13:17:43 +0000</pubDate>
				<category><![CDATA[Cloud Security Posture Management]]></category>
		<category><![CDATA[AWS Security]]></category>
		<category><![CDATA[Cloud Native Security]]></category>
		<category><![CDATA[CSPM]]></category>
		<category><![CDATA[Serverless-Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=15651</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/aws-lambda-security/" title="What You Need to Know About AWS Lambda Functions Risk Mitigation" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2020/01/Aqua-CSP-Secures-AWS-Lambda-Blog-Image.jpg" alt="What You Need to Know About AWS Lambda Functions Risk Mitigation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>With serverless functions architecture gaining in popularity, it is also becoming clear that the architecture is not without its security drawbacks. Overly permissive permissions, vulnerability in the functions’ code, and embedded secrets could all be exploited. Despite being event-triggered and ephemeral by nature, serverless functions can still be subject to unauthorized activity such as event&#160;&mldr;]]></description>
		
		
		
			</item>
	</channel>
</rss>
