Which technique uses the management plane to detect various activities, such as file uploads or configuration changes?
Which technique uses the management plane to detect various activities, such as file uploads or configuration changes?
The technique that uses the management plane to detect various activities, such as file uploads or configuration changes, is auditing and logging. Auditing and logging involve the systematic tracking of activities and changes within a system to ensure security and compliance. This process utilizes the management plane to monitor and record events, which can then be analyzed to detect unauthorized activities or configuration changes, triggering appropriate responses.
SG 10.1.5 page117 : Event driven security: Certain cloud providers support event-driven code execution. In these cases, the management plane detects various activities—such as a file being uploaded to a designated object storage location or a configuration change to the network or identity management—which can in turn trigger code execution through a notification message, or via serverless hosted code. Security can define events for security actions and use the event-driven capabilities to trigger automated notification, assessment, remediation, or other security processes.
Event driven security: Certain cloud providers support event-driven code execution. In these cases, the management plane detects various activities—such as a file being uploaded to a designated object storage location or a configuration change to the network or identity management—which can in turn trigger code execution through a notification message, or via serverless hosted code. Security can define events for security actions and use the event-driven capabilities to trigger automated notification, assessment, remediation, or other security processes.