Cloud Security Podcast by Google cover image

EP109 How Google Does Vulnerability Management: The Not So Secret Secrets!

Cloud Security Podcast by Google

00:00

How to Assess the Risk of a RC Code Execution on a Google Product?

In 2014, Google security learned about the publicly disclosed through multiple vulnerability in Bash that trivially allowed RC code execution on affected systems. In parallel to taking these three steps on these three categories of assets, security team developed software to detect vulnerable systems within Google network parameters. If your company does not contain an asset that is affected by a particular vulnerability, there's no point in adding a signal for that until you actually add it. So monitor your system for port and applications can keep track of DNS registrations of URLs in large viewers. Build a thread intelligence team to study and passively monitor the activities of known and likely threads to your infrastructure.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app