Google Cloud now has Microsoft Defender for Cloud

Microsoft’s Defender for Cloud security technology has been deployed on Google Cloud Platform to identify and fix configuration flaws in workloads (GCP).

Microsoft’s Defender for Cloud security solution has been extended to include workloads Now Web Services, bringing it in line with Microsoft’s existing offerings (AWS).

One of the most important Defenders for Cloud services is the cloud Security Posture Management (CSPM) and the cloud Workload Protection (CWP).

Corporate Vice President of Cloud Security at Microsoft Eric Doerr observed that Google’s own tools are not required, simple onboarding from GCP workloads and more than 80 suggestions for hardening an environment in GCP or AWS are available. Defend for Cloud already incorporates Microsoft’s own Azure.

In addition to providing an overview of several clouds, the dashboard provides a Secure Score for each of the environments hosted in those clouds. When multi-factor authentication (MFA) is not enabled for all non-service accounts or cloud SQL database instances don’t restrict incoming connections to utilise SSL encryption, these suggestions are included.

For Google Kubernetes Engine (GKE) Standard clusters, there is also substantial support for containers and servers.

Additional security for Google Compute virtual machines is provided by Defender for Endpoint, which encompasses vulnerability assessments, behavioural alarms, anti-malware, and operating system upgrades that must be deployed.

With regard to multi-cloud security, Microsoft thinks it’s the ideal moment for solutions that span several clouds, given the continuous lack of cybersecurity resources.

“Customers are increasingly telling us that they want simplicity and don’t want to be utilising 10 different products. Defending the cloud infrastructure they have is becoming difficult for them “Doerr made the statement.

“Multi-cloud adoption has also shifted from accidental to intentional. Increasing numbers of clients are relying on it as part of their overall strategy. Security teams have a good purpose for doing what they’re doing, but it’s very difficult for them to do so.”

Organizations need to do more to keep up with the dangers that sparked the Biden Administration’s new cybersecurity policy for federal agencies, according to Doerr’s assessment of the current situation. However, most firms’ IT systems are attacked because they don’t do the easy things, like patching or adopting multi-factor authentications.

“In the vast majority of cases when we’re helping customers respond to in a breach, even the the most sophisticated attackers, an awful lot of those start with something very simple like not using MFA, not having a good password policy, leaving a management port open on a piece of cloud infrastructure, patches not up to date,” said Doerr.

“Sophisticated attackers have a toolkit that includes the basic stuff and they try that first and if it works then they don’t need to spend the time on more advanced techniques. Part of the journey here as an industry is how do we raise the minimum bar. If we can get to the place where most organizations are nailing the basics of security, it will make a really big difference.”