Blog Categories Application Security Cloud Security Compliance Container Security & Orchestration DevSecOps General Professional Development SOC Threat Intel Threat Stack Uncategorized Subscribe Now x Subscribe to Our Blog! Threat Stack < 1 Min Read The Cloud Security Use Cases Playbook Venkat Pothamsetty December 15, 2016 Over the last year, we have published a number of playbooks that, together, deliver strategic and tactical information to guide you from high-level planning down to effective implementation, day-to-day operations, and ongoing improvement of security across your cloud infrastructure. One of our earlier publications, The Cloud Security Playbook, focused on the need for companies to develop a comprehensive cloud security strategy if they are operating in or migrating to the cloud. We’re excited to be launching the next Playbook in this series that is shifting from strategy to tactics. Given Cloud Security’s relatively short history and interdisciplinary nature, it’s important for us to share practical, real-world information that will guide organizations as they start to implement security measures across their modern infrastructure — or if already established — improve their operations and strengthen their security. The Cloud Security Use Cases Playbook is written for Security and Dev Operations teams to better identify, understand, and manage important security use cases, ensuring optimal workflows and best security outcomes. From all the possible use cases related to security vulnerabilities, we have focused on those that will help you build a foundation of good practices and strengthen your organization’s security posture in the shortest amount of time! Throughout the playbook, we have included examples of how Threat Stack’s Cloud Security Platform® automates security practices to provide continuous host-level monitoring and alerting, deep visibility into your environment, and context-based data that can be used to investigate and resolve issues quickly. Individual use cases cover the following areas: User monitoring Network connection monitoring Host level monitoring Infrastructure level monitoring Vulnerability management Incident response Download your free copy of The Cloud Security Use Cases Playbook now and let us know if you have any specific questions about what we’ve covered. Tags:Cloud SecurityCloud Security Use CasesUse Cases About Venkat Pothamsetty As Vice President of Products & Customer Advocacy, Venkat Pothamsetty is responsible for technology innovation and strategic alignment with customer business requirements. Venkat previously led products for two startups, Tollgrade and Industrial Defender, and was a major part of the successful exits for both companies. As Products Lead, Pothamsetty took several products from prototypes to successful mainstream products and, in many cases, defined market categories. Pothamsetty has also led services, pre-sales, solutions, and architecture teams at Cisco and Accenture. View more posts by Venkat Pothamsetty Request a Demo Share this Blog