{"id":42620,"date":"2021-08-31T00:00:00","date_gmt":"2021-08-31T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security.html"},"modified":"2021-08-31T00:00:00","modified_gmt":"2021-08-31T00:00:00","slug":"auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/","title":{"rendered":"Auto Apply IPS Rules for Solid Cloud Workload Security Solution Engineer"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security\/auto-apply-ips-rules-for-solid-cloud-workload-security.jpg\"><!-- Begin mPulse library --><!-- END mPulse library --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width\"> <meta name=\"description\" content=\"Learn how to automatically scan APIs for a better Intrusion Prevention System (IPS) and cloud workload security.\"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\" content=\"workload security,azure,article,aws,best practices,multi cloud\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"defaultArticleWithoutHero\"> <meta property=\"article:published_time\" content=\"2021-08-31\"> <meta property=\"article:tag\" content=\"workload security\"> <meta property=\"article:section\" content=\"best practices\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security.html\"> <title>Auto Apply IPS Rules for Solid Cloud Workload Security<\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security.html\"><br \/>\n<meta property=\"og:title\" content=\"Auto Apply IPS Rules for Solid Cloud Workload Security\"><br \/>\n<meta property=\"og:description\" content=\"Learn how to automatically scan APIs for a better Intrusion Prevention System (IPS) and cloud workload security.\"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security\/auto-apply-ips-rules-for-solid-cloud-workload-security.jpg\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"Auto Apply IPS Rules for Solid Cloud Workload Security\"><br \/>\n<meta name=\"twitter:description\" content=\"Learn how to automatically scan APIs for a better Intrusion Prevention System (IPS) and cloud workload security.\"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security\/auto-apply-ips-rules-for-solid-cloud-workload-security.jpg\"> <\/head> <body class=\"articlepage page basicpage context-business context-devops\" id=\"readabilityBody\" readability=\"50.577313249308\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layer *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyNoHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"62290509\">\n<div class=\"col-xs-12 col-md-12 one-column\">\n<div class=\"col-xs-12 col-md-12\" readability=\"7.7437722419929\">\n<div class=\"article-details\" role=\"heading\" readability=\"34.846975088968\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Workload Security<\/p>\n<p class=\"article-details__description\">Learn how to leverage automated and programmable APIs to quickly scan and secure workloads with high or critical severity IPS rules.<\/p>\n<p class=\"article-details__author-by\">By: Amar Babu <time class=\"article-details__date\">August 31, 2021<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-md-8 col-md-push-2\"> <\/p>\n<div class=\"richText\" readability=\"40.200435729847\">\n<div readability=\"27.757443718228\">\n<p>You need an intrusion prevention system (IPS) to secure your workloads, but you don\u2019t want to deal with second-guessing vulnerabilities in your system and outdated IPS rules that slow down your workflows. Using an easily manageable solution with IPS rules backed by industry-leading vulnerability research and automated recommendation scans allows you to continue working securely and quickly.<\/p>\n<p>In this article, we will demonstrate how Trend Micro Cloud One\u2122 \u2013 Workload Security uses customizable APIs to run automated recommendation scans and only apply high and critical severity IPS rules, ensuring your system is properly configured and elevating your overall security posture.<\/p>\n<p><span class=\"body-subhead-title\">Demo overview<\/span><\/p>\n<p>To follow along, sign up for your <a href=\"https:\/\/cloudone.trendmicro.com\/register\" target=\"_blank\" rel=\"noopener\">free, 30-day trial<\/a> of <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud.html\">Trend Micro Cloud One\u2122<\/a> and clone the <a href=\"https:\/\/github.com\/Amar-Babu\/TM-CloudOne-AutoApply-Recommended-IPS\" target=\"_blank\" rel=\"noopener\">GitHub repository<\/a>. The script we are using is easily modifiable, so you can tailor it to your specific use case. The only mandatory variable you need to configure is your API key, you are free to configure the active workloads you want to scan, as well as the total scan time.<\/p>\n<p>Here is a closer look at how we modified our script for this demo:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Active workloads (lines 165-173): In this demo, we are only scanning endpoint 4105. If you\u2019d like to add multiple endpoints\/workloads\/servers, paste the script file from the appropriate hostID on line 171, and then uncomment that line.<\/span><\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security\/main-logic.png\" alt=\"main-logic\"> <\/figure>\n<\/p><\/div>\n<div>\n<div class=\"richText\">\n<div>\n<ul>\n<li><span class=\"rte-red-bullet\">timeInMins (line 34): You can configure the API to scan any endpoints that have called out to your server within a certain time (for example: 10 minutes) for more efficiency.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">sleepTimeInMins (line 35): Here is where you input the length of the recommendation scan. Depending on the size of your server, you may need to adjust the time to make sure the IPS can complete a thorough scan. There\u2019s no magic number for how long the scan will take\u2014so it we advise starting at 10 minutes, as we did in this demo, and working your way up.<\/span><br \/>&nbsp;<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security\/config_2.png\" alt=\"config\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\">\n<div>\n<ul>\n<li><span class=\"rte-red-bullet\">IPRuleList = highCriticalIPRuleIDList (line 217): This line is critical to our demo as it will override any base IPS policies and apply the IP rule list you want.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">IPRuleList = list (set(recommendedIPRuleList) &amp; set (highCriticalIPRuleIDList)) (line 221): This tells Workload Security which rule list to apply. In this case, we are only applying high and critical severity rules.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Enforce IPS rule isolation to the endpoint\/compute instance (lines 226-235): Here we isolate the application of the IPS rule list to only the endpoint scanned.<br \/><\/span><br \/>&nbsp;<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security\/endpoint-scanned.png\" alt=\"endpoint-scanned\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"33\">\n<div readability=\"11\">\n<p>Over in the Workload Security console, we have already integrated the test compute instance <b>3.133.117.141 (am-1) [i-0575fd46c0872f563]<\/b>. Now that your instance is installed, let\u2019s review its configurations:<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security\/computer-config.png\" alt=\"computer-config\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"36\">\n<div readability=\"17\">\n<p>As you can see, <b>Intrusion Prevention<\/b> is currently off and when you click into it, there are no rules in the <b>Assigned Intrusion Prevention Rules<\/b> box. In the <b>Recommendations <\/b>section, dropdown menu beside <b>Automatically implement Intrusion Prevention Recommendations (when possible) <\/b>is set to <b>Inherited (No).<\/b> If you didn\u2019t run this script and just selected <b>Yes<\/b>, it would apply all the IPS rules, regardless of severity, and you will be back at square one trying to prioritize thousands of alerts. The script we\u2019re using is flexible enough that you can modify it to override your base policies and replace the IPS rules <i>or<\/i> override your base policies and augment your existing IPS rules. In our demo, the script will override and replace the rules.&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security\/computer-config2.png\" alt=\"computer-config2\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"42\">\n<div readability=\"29\">\n<p>If you click <b>Scan For Recommendations<\/b>, it will do just that and generate a consolidated log of recommendations and its severity (low to critical), priority level (0 as the lowest, 4 as the highest), and application impacted (browser, mail, etc.) across pre-set endpoints. No more manual hunting, gathering, and prioritizing threat information and alerts.<\/p>\n<p><span class=\"body-subhead-title\">Demo<\/span><\/p>\n<p>Alright, now that we\u2019ve covered the basics of our setup, let\u2019s trigger the recommendation scan.<\/p>\n<p>1. Open your IDE of choice (in this demo we are using Visual Studio Code) and enter the script. You can also run it as a Python script on command line. Modify as you wish for your use case and then run it. When it starts to run, you will see all the active endpoints listed, but the recommendation scan will only push the policy on the specified endpoint.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security\/specified-endpoint.png\" alt=\"specified-endpoint\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"34.5\">\n<div readability=\"14\">\n<p>2. After the scan is complete, you will see the total number of high and critical rules found. Don\u2019t panic, this scary number refers to all the rules found and published by vulnerability disclosure programs such as the Trend Micro\u2122 Zero Day Initiative\u2122. Since our script dictated that recommendations will only be applied endpoint <b>4105<\/b>, the irrelevant rules are filtered out, and now we are down to 12.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security\/filtered.png\" alt=\"filtered\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"36\">\n<div readability=\"17\">\n<p>3. That seems more manageable, right? Go to your Workload Security console, select the test instance, and you\u2019ll see that <b>Intrusion Prevention<\/b> is now says <b>On, Prevent, 8 Rules.<\/b> Remember that we configured our script to only apply high and critical alerts, therefore, we narrowed the list down even further by eliminating the medium-level recommendations.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security\/computer-config3.png\" alt=\"computer-config3\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"32\">\n<div readability=\"9\">\n<p>4. Click <b>Intrusion Prevention<\/b> to view the full list of detected vulnerabilities. Now you have a comprehensive list of detected vulnerabilities that can be sorted by severity and priority level. How easy was that?<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security\/computer-config4.png\" alt=\"computer-config4\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"36.667042889391\">\n<div readability=\"21.624153498871\">\n<p>Note that under <b>Recommendations<\/b>, you will see <b>Unresolved Recommendations: Assign 4 additional rule(s)<\/b>. That doesn\u2019t mean Workload Security missed something\u2014those are the four recommendations that weren\u2019t high or critical severity.<\/p>\n<p><span class=\"body-subhead-title\">Next steps<\/span><\/p>\n<p>Not all IPS are equal. Choose a IPS solution backed by world-leading vulnerability research to ensure that your systems are safe from the latest threats lurking in the wild. Workload Security uses customizable APIs that allow you to automatically scan and apply the most up-to-date IP rules across endpoints of your choosing. It also integrates with your cloud services from AWS, Microsoft Azure, Google Cloud Platform\u2122, and more.<\/p>\n<p>To learn more about the capabilities of Workload Security for DevOps, watch <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/business\/products\/hybrid-cloud\/cloud-one\/workload-security\/cloud-one-workload-security-devops.mp4\"><span class=\"bs-modal\">this video<\/span><\/a>. You can also explore more Workload Security use cases by checking out <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/h\/automate-malware-quarantining-for-workloads.html\">Automate Malware Quarantining for Workloads<\/a>.<br \/>&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <a id=\"devopsrc-1bc48f\" href=\"https:\/\/cloudone.trendmicro.com\/register\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/trial-banners\/cloud-one-trial-banner.jpg\" alt=\"cloud-one-trial\"> <\/a> <\/figure>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <!-- Go to www.addthis.com\/dashboard to customize your tools --> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/h\/auto-apply-ips-rules-for-solid-cloud-workload-security.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to leverage automated and programmable APIs to quickly scan and secure workloads with high or critical severity IPS rules. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42621,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9503,9505,9502,9530,9507,9500],"class_list":["post-42620","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-devops-article","tag-trend-micro-devops-aws","tag-trend-micro-devops-azure","tag-trend-micro-devops-best-practices","tag-trend-micro-devops-multi-cloud","tag-trend-micro-devops-workload-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Auto Apply IPS Rules for Solid Cloud Workload Security Solution Engineer 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Auto Apply IPS Rules for Solid Cloud Workload Security Solution Engineer 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-31T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer.png\" \/>\n\t<meta property=\"og:image:width\" content=\"709\" \/>\n\t<meta property=\"og:image:height\" content=\"148\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Auto Apply IPS Rules for Solid Cloud Workload Security Solution Engineer\",\"datePublished\":\"2021-08-31T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\\\/\"},\"wordCount\":1044,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer.png\",\"keywords\":[\"Trend Micro DevOps : Article\",\"Trend Micro DevOps : AWS\",\"Trend Micro DevOps : Azure\",\"Trend Micro DevOps : Best Practices\",\"Trend Micro DevOps : Multi Cloud\",\"Trend Micro DevOps : Workload Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\\\/\",\"name\":\"Auto Apply IPS Rules for Solid Cloud Workload Security Solution Engineer 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer.png\",\"datePublished\":\"2021-08-31T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer.png\",\"width\":709,\"height\":148},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro DevOps : Article\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-devops-article\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Auto Apply IPS Rules for Solid Cloud Workload Security Solution Engineer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Auto Apply IPS Rules for Solid Cloud Workload Security Solution Engineer 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/","og_locale":"en_US","og_type":"article","og_title":"Auto Apply IPS Rules for Solid Cloud Workload Security Solution Engineer 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-31T00:00:00+00:00","og_image":[{"width":709,"height":148,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Auto Apply IPS Rules for Solid Cloud Workload Security Solution Engineer","datePublished":"2021-08-31T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/"},"wordCount":1044,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer.png","keywords":["Trend Micro DevOps : Article","Trend Micro DevOps : AWS","Trend Micro DevOps : Azure","Trend Micro DevOps : Best Practices","Trend Micro DevOps : Multi Cloud","Trend Micro DevOps : Workload Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/","url":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/","name":"Auto Apply IPS Rules for Solid Cloud Workload Security Solution Engineer 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer.png","datePublished":"2021-08-31T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer.png","width":709,"height":148},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/auto-apply-ips-rules-for-solid-cloud-workload-security-solution-engineer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro DevOps : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-article\/"},{"@type":"ListItem","position":3,"name":"Auto Apply IPS Rules for Solid Cloud Workload Security Solution Engineer"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42620"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42620\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42621"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}