Skip to main content

Scan for vulnerabilities

Description

Many attacks on cloud infrastructure seek to misuse deployed resources, which leads to an unnecessary spike in usage and cost.

Vulnerability scanning and endpoint detection and response (EDR) tools help minimize the window of opportunity for attackers and mitigate any potential malicious usage of resources.

Solution

The EDR capabilities provide advanced attack detections and are able to take response actions to remediate those threats. The unnecessary resource usage created by these common attacks can quickly be discovered and remediated, often without the intervention of a security analyst.

SCI Impact

SCI = (E * I) + M per R Software Carbon Intensity Spec

Scanning for vulnerabilities will impact SCI as follows:

  • M: By preventing heavy misusage of resources, unnecesseary embodied carbon emissions are avoided.

Assumptions

A zero trust security policy is implemented, which covers security controls for infrastructure, applications, data, networking, role-based access control (RBAC), and devices.

Considerations

Leverage cloud native EDR and scanning services, which scale based on demand, to maintain awareness of the carbon impact of the security tooling.

References

Microsoft Azure well architected framework sustainability patterns