Securing your cloud with CSPM

David Amrani Hernandez
3 min readDec 5, 2019

As companies begin to move their infrastructure and products to cloud environments, attackers’ interest also increases in them. This, coupled with the rise of new technologies such as Docker or Kubernetes makes it difficult to track the assets belonging to a product or organization.

This generates some dangerous situations that, in addition, are the principal attack vector: We don’t know what we have and

--

--

David Amrani Hernandez

Senior Cloud Security | Secdevops @ Telefonica ☕️ Writing about Cloud, Cybersecurity, new technologies and other hobbies 🚀