{"id":18355,"date":"2025-04-12T19:00:18","date_gmt":"2025-04-13T03:00:18","guid":{"rendered":"https:\/\/www.sumologic.com\/?page_id=18355"},"modified":"2026-02-17T15:09:11","modified_gmt":"2026-02-17T23:09:11","slug":"cloud-infrastructure-security","status":"publish","type":"page","link":"https:\/\/www.sumologic.com\/solutions\/cloud-infrastructure-security","title":{"rendered":"Cloud infrastructure security"},"content":{"rendered":"\n<section class=\"e-stn e-stn-123fadf620c2bf68b8019a401fc4bfec370b2069 e-stn--cta-with-content-buttons\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-123fadf620c2bf68b8019a401fc4bfec370b2069 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-096b51b1e70620caaa56b4acea12b5382c8af898 e-col--content-wrapper  col-sm-12 col-lg-6 col-xl-6 d-lg-flex flex-lg-column justify-content-lg-center\">\n<p><a href=\"https:\/\/www.sumologic.com\/solutions\/logs-for-security\/\">\u2039&nbsp;LOGS FOR SECURITY<\/a><\/p>\n\n\n\n<h1 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color wp-elements-10e4bd72404775d65dc9ccbc36307548\" id=\"seamlessly-manage-and-secure-your-cloud-attack-surface\">Seamlessly manage and secure your cloud attack surface<\/h1>\n\n\n\n<p class=\"has-chinese-silver-color has-text-color has-link-color wp-elements-935c9947a9ca75ff78c2554388ffeb81\">Your changing attack surface needs increased threat visibility and deep security context from use-case-driven queries, dashboards and alerts.<\/p>\n\n\n\n<div class=\"e-div e-div-b8650eb23605cc1c3c2b0261ca56a62af47c216e e-div--button-wrapper\"><div class=\"e-btn e-btn--blue-button-small\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/briefs\/security-analytics\" target=\"_self\">\n<p class=\"title\">Download brief<\/p>\n<\/a><\/div>\n\n<div class=\"e-btn e-btn--white-border-button\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/case-studies\/security-resource-group\" target=\"_self\">\n<p class=\"title\">Read case study<\/p>\n<\/a><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-d76ebedf0aa53806a79d83f1e4d6cd64163d40ca  col-sm-12 col-lg-6 col-xl-6 d-lg-flex flex-lg-column justify-content-lg-center\">\n<div id=\"wistia-block_4db1c262b4efde23df0fe2b15603e782\" class=\"wistia-video-block\" data-wistia-video=\"wistia_fol1jit00n\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/fol1jit00n.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='fol1jit00n']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/fol1jit00n\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"fol1jit00n\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_fol1jit00n\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/fol1jit00n\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_fol1jit00n\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n\n\n<div class=\"e-img \"><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-d1199d14c10a22cd9718d8c3b5ffd678a8745d50 e-stn--accordion-white\"><style><\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-b2198d814819fb1dc680a4d10879e48e892964e7  col-sm-8\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-c166e16ea6ceb857a47d9f1b8a73fe6a\" id=\"secure-your-aws-infrastructure-with-a-single-click\">Secure your AWS infrastructure with a single click<\/h2>\n\n\n\n<div class=\"e-div e-div-4811722787c96388d2dddea15778413c93d7cdc1 e-div--content-wrapper\">\n<p class=\"has-text-align-center has-delft-blue-color has-text-color has-link-color wp-elements-d6c6547edca6ef034892fbf8f7f43102\">Cloud infrastructure security for AWS provides enhanced insight into threat activity via a unified security and compliance audit view of your AWS infrastructure. Leveraging AWS-native tools and telemetry, it accelerates development, operations, security, and reliability management teams in maintaining security visibility into their environment, managing their risk and attack surface.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-a8a430092d6301ca0b738e2949102462319d06f7  col-sm-12\"><div class=\"e-acc e-acc--dlt  has-float-panel\" data-settings='{\"forceExpand\":false,\"toggleMode\":true,\"colBreakPoint\":992,\"floatPanel\":true,\"autoSlide\":false,\"autoPlayInterval\":3000,\"pauseOnFocus\":true}' data-accordion='e-acc_69d880b617aa0'><div class=\"e-acc__itms-wrpr\"><div class=\"e-acc__itm-wrpr  active\" data-item-id='e-acc-itm-id-4'><div class=\"e-acc__itm\"><div class=\"e-acc__itm-hdr-wrpr\" data-toggle='collapse' data-target='e-acc-itm-id-4'><div class=\"e-acc__itm-hdr\">\n<h3 class=\"wp-block-heading\" id=\"infrastructure-overview-dashboard\">Infrastructure overview dashboard<\/h3>\n<\/div><\/div><div class=\"e-acc__itm-bdy-wrpr\" id='e-acc-itm-id-4' style='display:block'><div class=\"e-acc__itm-bdy\">\n<p>Quickly review and identify security incidents and threats at a glance with the overview dashboard. Ingest telemetry from essential AWS services for enhanced visibility into your AWS environment with visualizations of critical areas of your cloud infrastructure security posture. Rapidly audit the overall state of security readiness.<\/p>\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/platform\" target=\"_self\">\n<p class=\"title\">Learn more<\/p>\n<\/a><\/div><\/div><\/div><div class=\"e-acc__flt-itm-wrpr  active\" data-id='e-acc-itm-id-4'\n        id='float_panel_e-acc-itm-id-4'><div class=\"e-acc__flt-itm\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1808\" height=\"1017\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value1-1.png\" alt=\"Sumo Logic\" class=\"wp-image-18357\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value1-1.png 1808w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value1-1-300x169.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value1-1-1024x576.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value1-1-768x432.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value1-1-1536x864.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value1-1-575x323.png 575w\" sizes=\"auto, (max-width: 1808px) 100vw, 1808px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div><div class=\"e-acc__itm-wrpr\" data-item-id='e-acc-itm-id-5'><div class=\"e-acc__itm\"><div class=\"e-acc__itm-hdr-wrpr\" data-toggle='collapse' data-target='e-acc-itm-id-5'><div class=\"e-acc__itm-hdr\">\n<h3 class=\"wp-block-heading\" id=\"steady-pulse-of-your-risk-profile\">Steady pulse of your risk profile<\/h3>\n<\/div><\/div><div class=\"e-acc__itm-bdy-wrpr\" id='e-acc-itm-id-5' style='display: none'><div class=\"e-acc__itm-bdy\">\n<p>Cloud misconfigurations are one of the most exploited attack vectors bad actors use to gain unrestricted access to applications and data, often with costly results. Understand the risk profile of your AWS environment, pinpointing vulnerabilities and misconfigurations with AWS Security Hub. Using Logs for Security for cloud infrastructure security maintains a constant pulse on potential security gaps in your AWS environment by reviewing and storing telemetry and log data.<\/p>\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/blog\/cloud-infrastructure-security-aws\" target=\"_self\">\n<p class=\"title\">Read blog<\/p>\n<\/a><\/div><\/div><\/div><div class=\"e-acc__flt-itm-wrpr\" data-id='e-acc-itm-id-5'\n        id='float_panel_e-acc-itm-id-5'><div class=\"e-acc__flt-itm\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"608\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value2-1-1024x608.png\" alt=\"Sumo Logic\" class=\"wp-image-18358\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value2-1-1024x608.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value2-1-300x178.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value2-1-768x456.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value2-1-1536x912.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value2-1-575x342.png 575w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value2-1.png 1808w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div><div class=\"e-acc__itm-wrpr\" data-item-id='e-acc-itm-id-6'><div class=\"e-acc__itm\"><div class=\"e-acc__itm-hdr-wrpr\" data-toggle='collapse' data-target='e-acc-itm-id-6'><div class=\"e-acc__itm-hdr\">\n<h3 class=\"wp-block-heading\" id=\"ai-driven-investigation-and-response\">Manage your evolving threat landscape<\/h3>\n<\/div><\/div><div class=\"e-acc__itm-bdy-wrpr\" id='e-acc-itm-id-6' style='display: none'><div class=\"e-acc__itm-bdy\">\n<p>Easily manage your changing cloud attack surface, leveraging AWS GuardDuty data and AWS CloudTrail, analytics and Sumo Logic alerts. Stay one step ahead of cybercriminals, and ensure your business&#8217; critical data is safe.<\/p>\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/demo\/securing-aws-infrastructure\" target=\"_self\">\n<p class=\"title\">View demo<\/p>\n<\/a><\/div><\/div><\/div><div class=\"e-acc__flt-itm-wrpr\" data-id='e-acc-itm-id-6'\n        id='float_panel_e-acc-itm-id-6'><div class=\"e-acc__flt-itm\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1808\" height=\"1074\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value3-1.png\" alt=\"\" class=\"wp-image-18359\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value3-1.png 1808w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value3-1-300x178.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value3-1-1024x608.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value3-1-768x456.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value3-1-1536x912.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value3-1-575x342.png 575w\" sizes=\"auto, (max-width: 1808px) 100vw, 1808px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div><div class=\"e-acc__itm-wrpr\" data-item-id='e-acc-itm-id-7'><div class=\"e-acc__itm\"><div class=\"e-acc__itm-hdr-wrpr\" data-toggle='collapse' data-target='e-acc-itm-id-7'><div class=\"e-acc__itm-hdr\">\n<h3 class=\"wp-block-heading\" id=\"ai-driven-investigation-and-response\">Control access activities<\/h3>\n<\/div><\/div><div class=\"e-acc__itm-bdy-wrpr\" id='e-acc-itm-id-7' style='display: none'><div class=\"e-acc__itm-bdy\">\n<p>Gain central visibility for changes in access and relevant access activities. Knowing exactly who can access what at any point in time, in addition to monitoring changes in access privileges, can be instrumental in stopping identity-based attacks in the cloud.<\/p>\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/events\/cloud-infrastructure-security-for-aws\" target=\"_self\">\n<p class=\"title\">Watch webinar<\/p>\n<\/a><\/div><\/div><\/div><div class=\"e-acc__flt-itm-wrpr\" data-id='e-acc-itm-id-7'\n        id='float_panel_e-acc-itm-id-7'><div class=\"e-acc__flt-itm\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1808\" height=\"1074\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value4-1.png\" alt=\"Sumo Logic\" class=\"wp-image-18360\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value4-1.png 1808w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value4-1-300x178.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value4-1-1024x608.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value4-1-768x456.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value4-1-1536x912.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cis-Value4-1-575x342.png 575w\" sizes=\"auto, (max-width: 1808px) 100vw, 1808px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div><\/div> <div class=\"e-acc__flt-itms-wrpr\" ><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-7\" class=\"e-stn e-stn-0a4d04e509d285e023233a0e8d32dca0a6820859 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-0a4d04e509d285e023233a0e8d32dca0a6820859 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #ffffff; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-pure-black-color has-text-color has-link-color wp-elements-4313e28f2647f9c75342fd7a7d989fb0\" id=\"know-your-cloud-attack-surface\">Know your cloud attack surface<\/h2>\n\n\n\n<p class=\"has-text-align-center has-pure-black-color has-text-color has-link-color wp-elements-6dd3c88c69c025056d250d1e5a8c7034\">Cut through the noise of complex cloud environments to manage your attack surface with Sumo Logic\u2019s cloud-scale collection, storage and security analytics. Easily pinpoint vulnerabilities created by aging or drifting configuration, access rights, or software with cloud infrastructure security for AWS.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row justify-content-center e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icon-collect-and-centralize-2-color-1-1.svg\" alt=\"\" class=\"wp-image-10072\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-pure-black-color has-text-color has-link-color has-medium-font-size wp-elements-4ab63211f18a248005872d7f589333bc\" id=\"automated-insights\">Combat complexity<\/h3>\n\n\n\n<p class=\"has-pure-black-color has-text-color has-link-color wp-elements-dbb9f5d51a7daad6a6b712b1e0fcd108\">Distill insights from across your entire microservices architecture and enable teams to collaborate and resolve the hardest questions facing digital companies.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"42\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icon-get-valuable-security-insights-2-color.svg\" alt=\"\" class=\"wp-image-16444\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-pure-black-color has-text-color has-link-color has-medium-font-size wp-elements-643f319452f586e4258acbd930dee00b\" id=\"cloud-native-architecture\">Increase visibility<\/h3>\n\n\n\n<p>Accelerate security and reliability management workflows across development and operations, maintaining security visibility, and managing your risk and cloud attack surface.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row justify-content-center e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icon-alerts.svg\" alt=\"\" class=\"wp-image-9137\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-pure-black-color has-text-color has-link-color has-medium-font-size wp-elements-9a6c160e7c8b48add65a4b54c60585ed\" id=\"automated-insights\">Maximize efficiency<\/h3>\n\n\n\n<p class=\"has-pure-black-color has-text-color has-link-color wp-elements-de65563a16b9c56d2ddf12193f0bce47\">Enable practitioners of all skill levels to manage their cloud attack surface easily with curated, out-of-the-box security content. Security personnel can share dashboards and jointly resolve security issues as they arise from anywhere.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icon-monitor-and-visualize.svg\" alt=\"\" class=\"wp-image-3862\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-pure-black-color has-text-color has-link-color has-medium-font-size wp-elements-a5c3820e8c454936fae03baae16c8b5a\" id=\"cloud-native-architecture\">Optimize costs<\/h3>\n\n\n\n<p class=\"has-pure-black-color has-text-color has-link-color wp-elements-4e3566dcb7429684b136dd6de417c22b\">With Flex Licensing, you get unlimited ingest and unlimited users. Store all your data for compliance, consistent with an extensive list of regulatory frameworks, without the need for cold storage or data rehydration.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"page-section resource-card-section gsbp-585e707 alignfull\" id=\"section-6\">\n<div>\n<div class=\"box-container resource-card-section__container\">\n<div class=\"resource-card-section__heading-wrapper\">\n<h2 class=\"resource-card-section__heading\">Additional resources<\/h2>\n<\/div>\n\n\n\n<div class=\"grid--l-3 grid--m-2 grid--s-1 gap--l resource-block-wrapper mt-3 grid--3\">\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/briefs\/idc-sumo-logic-roi\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-IDC_ROI_Meta_1200x628_TINY-v2.jpg\" alt=\"\" width=\"1114\" height=\"625\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Report<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">IDC\u2019s ROI report: The business value of Sumo Logic<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Download report<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/sumo-logic.wistia.com\/medias\/teoeeglf22\" target=\"_blank\" rel=\"noopener\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-JD9tNfCW7uo-HD.jpg\" alt=\"\" width=\"1280\" height=\"720\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">video<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Micro Lesson: cloud infrastructure security for AWS<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Watch video<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/help.sumologic.com\/docs\/send-data\/kubernetes\/security-best-practices\/\" target=\"_blank\" rel=\"noopener\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cs-siem.png\" alt=\"\" width=\"798\" height=\"448\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Docs<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Security best practices<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Learn more<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/case-studies\/hashicorp\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Hashicorp_326x183_Resources.svg\" alt=\"\" width=\"326\" height=\"183\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Case study<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Monitor and secure 10,000 clouds<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Read case study<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/case-studies\/trust-bank\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-TrustBank_Color_Logo_652x366px.jpg\" alt=\"\" width=\"704\" height=\"396\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Case study<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Data is at the heart of cloud-native bank<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Read case study<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/case-studies\/singletrack\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Singletrack_Color_Hero-Logo-652-366-1.jpg\" alt=\"\" width=\"1302\" height=\"731\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Case study<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Faster incident detection and response with Cloud SIEM<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Read case study<\/div>\n<\/div>\n<\/a>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section id=\"section-7\" class=\"e-stn e-stn-6c51ddd2b8dd9ec12d632c35a61b62586cd316c6 e-stn--faq-accordion\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-029c01502d78b7cff6900cd3b2a145337ca3a946  col-sm-12 col-md-4\">\n<h2 class=\"wp-block-heading has-delft-blue-color has-text-color has-link-color wp-elements-152c54c72ad88816c8399a2df60d129e\" id=\"faqstill-have-questions\">FAQ<br>Still have questions?<\/h2>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/request-demo\" target=\"_self\">\n<p class=\"title\">Get a demo<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-1535be63930f7ed2ef76cc949c67e8736d5f40d3  col-sm-12 col-md-8\">\n<div class=\"faq-accordion\"><div class=\"faq-item\">\n                        <button class=\"faq-question\">What is cloud infrastructure security?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>Cloud infrastructure security is a set of practices designed to protect cloud environments, sensitive data, and supporting systems from unauthorized access and security threats. This includes measures for cloud data security, identity and access management (IAM), application security, network security, and the protection of cloud resources and services.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">What are the different types of cloud infrastructure?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>Cloud infrastructure consists of the hardware and software needed to support cloud services for customers. It includes three main models:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Private cloud:<\/strong>\u00a0Exclusively used by a single organization. Private cloud infrastructure may be managed by on-site IT staff or an external provider and requires organizations to invest in their own hardware.<\/li>\n\n\n\n<li><strong>Public cloud:<\/strong>\u00a0Operated by third-party providers, such as Google Cloud, AWS, and Microsoft Azure, and uses a multi-tenant model. Customers pay on a per-use basis for storage and computing power.<\/li>\n\n\n\n<li><strong>Hybrid cloud:<\/strong>\u00a0Combines private and public cloud environments, allowing sensitive data to be stored on private servers while less critical applications run in the public cloud.<\/li>\n<\/ul>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">What are some best practices for securing cloud environments?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>I<strong>dentity and Access Management (IAM):<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use multi-factor authentication (MFA) and role-based access controls (RBAC).<\/li>\n\n\n\n<li>Regularly review permissions based on the principle of least privilege.<\/li>\n<\/ul>\n\n\n\n<p><strong>Data encryption:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Encrypt data both in transit and at rest, using tools like AWS KMS or Azure Key Vault for key management.<\/li>\n<\/ul>\n\n\n\n<p><strong>Network security:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use virtual private clouds (VPCs) and security groups to control traffic.<\/li>\n\n\n\n<li>Monitor network traffic for suspicious activities.<\/li>\n<\/ul>\n\n\n\n<p><strong>Monitoring and logging:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable comprehensive logging and use tools like security information and event management (SIEM) solutions for monitoring.<\/li>\n\n\n\n<li>Set up alerts for potential security incidents.<\/li>\n<\/ul>\n\n\n\n<p><strong>Incident response and recovery:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Develop and test an incident response plan.<\/li>\n\n\n\n<li>Regularly back up critical data and test restoration processes.<\/li>\n<\/ul>\n\n\n\n<p><strong>Patch management:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regularly update software and implement automated patching.<\/li>\n\n\n\n<li>Conduct vulnerability assessments and penetration testing.<\/li>\n<\/ul>\n\n\n\n<p><strong>Compliance and governance:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Adhere to industry-specific compliance requirements and conduct regular audits.<\/li>\n<\/ul>\n\n\n\n<p><strong>API security:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secure APIs with authentication, use API gateways, and implement Web Application Firewalls (WAFs).<\/li>\n<\/ul>\n\n\n\n<p><strong>Container security (if applicable):<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use container security practices, such as scanning images and using secure orchestration tools like\u00a0<a href=\"https:\/\/www.sumologic.com\/glossary\/kubernetes-monitoring\" data-type=\"glossary\" data-id=\"11017\" target=\"_blank\" rel=\"noreferrer noopener\">Kubernetes<\/a>.<\/li>\n<\/ul>\n<\/div>\n                    <\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 e-stn--events-main-banner e-pt-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color wp-elements-bac0a417dece33e26e8d7bac6f968189\" id=\"safely-store-monitor-and-analyze-all-your-security-data\">Safely store, monitor, and analyze all your security data<\/h2>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-db948e59308c132e74c666c60cac2bca\" style=\"color:#ffffff\">Start your free trial today and begin improving the security posture of your modern apps and cloud infrastructure.<\/p>\n\n\n<div class=\"e-btn e-btn--white-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/sign-up\" target=\"_self\">\n<p class=\"title\">Start free trial<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sumo-wp-marketing-site-assets.s3.amazonaws.com\/uploads\/2024\/10\/Frame-1073715737.svg\" alt=\"\" class=\"wp-image-1151\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":24836,"parent":11298,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"3","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":".gsbp-9713641{display:flex;justify-content:center;flex-direction:column;align-items:center;padding-right:var(--wp--custom--spacing--side, min(3vw, 20px));padding-left:var(--wp--custom--spacing--side, min(3vw, 20px));margin-top:0;margin-bottom:0;position:relative;padding-top:var(--cf-space-xl);padding-bottom:var(--cf-space-xl)}.gsbp-1581a8b{max-width:100%;width:1380px}.related-items__left-col{display:flex;flex-direction:column;column-gap:var(--cf-space-m);row-gap:var(--cf-space-3xs)}body .related-items__heading:is(h1,h2,h3,h4,h5,h6){font-size:var(--cf-text-2xl)}.related-items__right-col{display:flex;column-gap:var(--space-l);row-gap:var(--space-l)}.related-items__item{padding-top:var(--cf-space-s);padding-bottom:var(--cf-space-s);padding-left:var(--cf-space-s);padding-right:var(--cf-space-s);display:flex;flex-direction:column;row-gap:var(--cf-space-xs);text-decoration:none;border-width:1px;border-style:solid;border-color:var(--cf-primary-30)}.related-items__item .relate-items__item-img{max-width:100%;height:auto;object-fit:cover}body .relate-items__item-title:is(h1,h2,h3,h4,h5,h6){text-decoration:none;color:var(--cf-primary)}.related-items__item .relate-items__item-img{text-decoration:none;margin-bottom:var(--cf-space-4xs)}.related-items__item .relate-items__item-title{text-decoration:none;font-size:var(--cf-text-l)}.related-items__item .related-items__item-btn{color:var(--cf-primary);padding-top:var(--cf-space-xs);padding-bottom:var(--cf-space-xs);padding-left:var(--cf-space-xs);padding-right:var(--cf-space-xs);border-width:1px;border-style:solid;max-width:150px;display:flex;justify-content:center}.related-items__item .related-items__item-text{color:var(--cf-primary)}","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"class_list":["post-18355","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/18355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/comments?post=18355"}],"version-history":[{"count":29,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/18355\/revisions"}],"predecessor-version":[{"id":69959,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/18355\/revisions\/69959"}],"up":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/11298"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media\/24836"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=18355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}