References
Jadhav, R. (2023, May 22). Zero Trust: The Absolute Solution to Cloud Security Challenges.
Accuknox. https://www.accuknox.com/blog/zero-trust-cloud-security-future
Juviler, J. (2023, June 12). API Security Best Practices: 10+ Tips to Keep Your Data Safe.
Hubspot. https://blog.hubspot.com/website/api-security#types-of-cyberattacks
Tran, D. (2023, March 31). Best Practices For Secure Software Development.
Perforce. https://www.perforce.com/blog/sca/best-practices-secure-software-
development#three
Hi Siva,
Thank you for your post. I agree with you that in order to protect the AIP and libraries, one must
implement encryption, access restrictions, and check for code integrity to protect and prevent against
threat agents who install malicious software or modify the source code. Apart from encrypting the code
and implementing access restrictions, one must follow secure software development practices to ensure
the code is resistant to attacks. In addition, Agent monitoring and event logging can help detect any
malicious activity over the network. This can help in restricting the impact of an attack. Also, to add to
your post, implementing Run time self-protection can help monitor the application behavior and track
abnormal activities.
Hi Afolabi,
Thank you for your post. I am of the same opinion that digital diskus should implement robust security
measures in order to protect itself from threat agents. Implementing secure coding techniques and
limiting access can certainly help in limiting the attack surface drastically. Also, Agent monitoring and
authentication can help the organization check for malicious activity while being confident that only
authorized agents access the resources. Agent isolation is another way of improving the security posture,
as it limits the spread of malware to other systems.