{"id":46586,"date":"2022-05-11T00:00:00","date_gmt":"2022-05-11T00:00:00","guid":{"rendered":"urn:uuid:f930b653-894c-89ec-3a90-4be26ecc984e"},"modified":"2022-05-11T00:00:00","modified_gmt":"2022-05-11T00:00:00","slug":"adding-guardrails-to-a-cloud-account-after-the-fact","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/","title":{"rendered":"Adding Guardrails To A Cloud Account After The Fact"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/22\/e\/cloud-configuration-management-guardrails\/adding-gaurdrails-devops-tn.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/22\/e\/cloud-configuration-management-guardrails\/adding-gaurdrails-devops-tn.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"body-subhead-title\">The Challenge<\/span><\/p>\n<p>With a brand-new account, your initial configuration sets the tone. With existing accounts, the challenge is twofold.<\/p>\n<p>The first is the team working with that account will already be used to operating under the existing configuration. And since they\u2019ve been doing it this way for a while and things are working, there\u2019s no motivation to change.<\/p>\n<p>The second challenge is on the technical side. Can these guardrails be implemented without breaking anything inside the active account? What level of testing will be required? How much work is involved overall?<\/p>\n<p>Boiling it down, this is a security feature request that needs to be prioritized. How can we approach this challenge?<\/p>\n<p><span class=\"body-subhead-title\">Getting The Team Onboard<\/span><\/p>\n<p>Everyone wants their systems to be more secure. But security is just one of the pillars of building well in the cloud. When faced with deploying a new feature that directly helps customers or deploying security guardrails that may help in the future, it\u2019s hard to argue against the customer.<\/p>\n<p>That\u2019s completely understandable and one of the key reasons the centralized security monitoring structure is so hard to put in place in an environment that is already working.<\/p>\n<p>The story usually proceeds like this:<\/p>\n<ol>\n<li>Security determines they need visibility into every account now<\/li>\n<li>Security decrees from up high that this work must be done immediately for \u201ccompliance\u201d reasons<\/li>\n<li>A few teams comply grumpily, others dig their heels in and slow down the work<\/li>\n<\/ol>\n<p>No one likes being told they must drop their work and do something different that doesn\u2019t directly advance their goals. This is squarely on the security teams shoulders. They need to adjust their approach.<\/p>\n<p>Until they do, let\u2019s look at this from your team\u2019s point of view. How can centralized security monitoring and audit help you meet your goals?<\/p>\n<p>As much as auditing sounds scary, it\u2019s really just having someone double check your work. If you\u2019re able to get feedback (preferably automated) that your workloads are configured in a strong manner, isn\u2019t that a positive thing?<\/p>\n<p>Similarly, while centralized monitoring always has challenges with context, having another team looking for security issues can add a layer of assurance that your team hasn\u2019t missed anything.<\/p>\n<p>Additionally, centralized monitoring can have added benefits like spotting larger patterns that aren\u2019t visible with only one accounts data.<\/p>\n<p>Evidently, there are positives for your team. They just aren\u2019t as direct or impactful as you may want\u2026which is fine as long as the cost or effort to implement isn\u2019t too high.<\/p>\n<p>That leads to the technical implementation of these guardrails and the associated risks.<\/p>\n<p><span class=\"body-subhead-title\">Digging Up Roots<\/span><\/p>\n<p>The first step:<\/p>\n<p>The root account is locked down, using multi-factor authentication, and not used for anything but the initial configuration of the account (AWS, Microsoft Azure, Google Cloud Platform\u2122)<\/p>\n<p>This is probably the trickiest step to back away from. If you\u2019ve used the root account to create resources or run workloads in your account, you may have to re-launch them with a less privileged account or re-assign ownership.<\/p>\n<p>The good news? Most cloud resources don\u2019t have ownership assigned to a user but to the account. That means any account with sufficient permissions should be able to maintain or remove those resources.<\/p>\n<p>Backing away from root ownership is more an exercise in reducing permissions, not changing ownership. Still, there is potential for downtime here, but the risk of those elevated privileges usually justifies moving this work up as a high priority.<\/p>\n<p>The one area that might be a \u201cgotcha\u201d is if someone is using the root account credentials on their workstation or has them embedded somewhere else like a deployment server.<\/p>\n<p>Use the API call audit tool available in each of the big three clouds to find that access if it does exist.<\/p>\n<p><b>Estimated time to resolve?<\/b> An hour.<\/p>\n<p><b>Level of effort?<\/b> High due to log searches required and possible permission changes.<\/p>\n<p><b>Return on investment?<\/b> Very high. Root accounts are the keys to the kingdom and should be protected at all costs.<\/p>\n<p><span class=\"body-subhead-title\">API Call Auditing<\/span><\/p>\n<p>Of course, in order to check the API call logs, those logs have to be enabled.<\/p>\n<p>The good news is that for most accounts, those logs have been enabled by default since the account was created. That\u2019s true for <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/azure-monitor\/essentials\/activity-log\" target=\"_blank\" rel=\"noopener\">Azure<\/a>, <a href=\"https:\/\/cloud.google.com\/compute\/docs\/logging\/audit-logging\" target=\"_blank\" rel=\"noopener\">Google<\/a>, and AWS.<\/p>\n<p>But each of the clouds does have an exception (or three) that might apply here. There was a time when API calls were either not logged by default or used a different system.<\/p>\n<p>With Azure, \u201c<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-machines\/classic-vm-deprecation\" target=\"_blank\" rel=\"noopener\">Classic<\/a>\u201d resources may or may not log to the activity log. For Google, some services use the <a href=\"https:\/\/cloud.google.com\/compute\/docs\/logging\/activity-logs\" target=\"_blank\" rel=\"noopener\">activity logs<\/a> and not the newer audit logs. In AWS, older accounts simply didn\u2019t <a href=\"https:\/\/docs.aws.amazon.com\/awscloudtrail\/latest\/userguide\/turn-on-cloudtrail-in-additional-accounts.html\" target=\"_blank\" rel=\"noopener\">have AWS CloudTrail enabled<\/a> and weren\u2019t logging those calls in any form.<\/p>\n<p>For older accounts, taking a few minutes to enable this logging is a smart move.<\/p>\n<p>The configuration is minimal and essentially boils down to providing a place to store the logs. This should not impact any production resources or result in any downtime.<\/p>\n<p>The only downside is the possible costs associated with storing the logs. Though, again, all of the clouds have ways to easily reduce that cost over time.<\/p>\n<p><b>Estimated time to resolve?<\/b> Five minutes.<\/p>\n<p><b>Level of effort?<\/b> Minimal. These features are probably already one.<\/p>\n<p><b>Return on investment?<\/b> High. These logs are a fantastic source of troubleshooting information for any operational issue (including security).<\/p>\n<p><span class=\"body-subhead-title\">You Spent What?<\/span><\/p>\n<p>Billing alerts are something that should be enabled on all cloud accounts by default. The CSPs won\u2019t enable them by default because what I am willing to spend on the account hosting my personal website is significantly different from what I\u2019m willing to spend on my workload supporting paying customers.<\/p>\n<p>That means it\u2019s up to you to setup billing alerts that match your risk tolerance.<\/p>\n<p>Again, the good news here is that this is a non-breaking change. These alerts don\u2019t stop resources in your accounts, they highlight spending that might be higher than you expect.<\/p>\n<p>Ask any team out there, it\u2019s always better to get a notification early in the month that something is off versus a bill that is thousands and thousands of dollars higher than you expect.<\/p>\n<p>A simple billing alert can help avoid that disaster, and alert you to any suspiciously high charges due to an attack like crypto mining. There\u2019s no reason not to apply these to your account immediately. It\u2019s five minutes that could save you thousands.<\/p>\n<p><b>Estimated time to resolve?<\/b> Ten minutes.<\/p>\n<p><b>Level of effort?<\/b> Moderate. You have to decide not only where to send the alerts but what to do if you receive one.<\/p>\n<p><b>Return on investment?<\/b> High. It doesn\u2019t take a lot of searching to find horror stories of very large and very unexpected cloud spending bills.<\/p>\n<p><span class=\"body-subhead-title\">Centralized Visibility<\/span><\/p>\n<p>This is the step that typically meets with the most pushback. The truly interesting part of that is the reason for the pushback. This step is usually fought against because of the idea of someone looking over your shoulder.<\/p>\n<p>The technical side of this step is relatively simple. The centralized accounts need to be already setup and then provided a role in your accounts that has read access only.<\/p>\n<p>This means there won\u2019t be any production impact and this setup should be completely automated. The centralized teams should be able to provide a cloud-specific script that sets up the needed permissions.<\/p>\n<p>The true issue here is the relationship between your team and the centralized services. This can be tricky waters.<\/p>\n<p><b>Estimated time to resolve?<\/b> Five minutes.<\/p>\n<p><b>Level of effort?<\/b> Minimal. This should be completely scripted and have zero production impact.<\/p>\n<p><b>Return on investment?<\/b> Low for your team. High for the overall organization. The idea behind centralized security and audit accounts is to get a handle on the overall risk the organization faces. This is one you take for the team.<\/p>\n<p><span class=\"body-subhead-title\">Organizing Access Control Permissions<\/span><\/p>\n<p>Despite the high level of pushback in the previous step, this recommendation is by far the hardest to pull off.<\/p>\n<p>For some reason, permissions almost always gradually drift towards \u201cadministrator\u201d levels.<\/p>\n<p>It\u2019s often little changes here and there over time and before you know it, a resource needlessly had full administrator access to your cloud account. Therefore you need to regularly review and maintain the permissions in your cloud account.<\/p>\n<p>Remember, the goal is to manage these permissions using a higher-level abstraction. Creating policies or roles for various tasks is a great first step.<\/p>\n<p>There\u2019s a lot of information out there to help get you started. Here are a few examples:<\/p>\n<p>Unfortunately, the tooling that would help you monitor which permissions are actually being used isn\u2019t nearly as mature as I\u2019d like to see. Leading the way is the <a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/what-is-access-analyzer.html\" target=\"_blank\" rel=\"noopener\">AWS IAM Access Analyzer<\/a> which I\u2019m hoping other clouds will copy.<\/p>\n<p>It should be very simple to find out which permissions assigned have never been used. Sadly, it still takes a lot of effort.<\/p>\n<p><b>Estimated time to resolve?<\/b> Ongoing.<\/p>\n<p><b>Level of effort?<\/b> Hard. This is a complicated and constant activity and if you remove a critical permission, the consequences could be dire.<\/p>\n<p><b>Return on investment?<\/b> High. Almost all the public security breaches in the cloud stem from misconfigured permissions. This is the top security issue by far.<\/p>\n<p><span class=\"body-subhead-title\">What\u2019s Next?<\/span><\/p>\n<p>We have gone through each of the sample checklist ideas and determined the level of effort required to implement them along with a ballpark return. Check out this relevant article on <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/c\/guardrail-against-common-cloud-misconfiguration-avoid-breaches.html\">how to set up guardrails to avoid cloud misconfigurations<\/a> to continue to build the foundation of great architecture.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/22\/e\/cloud-configuration-management-guardrails.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article outlines a priority checklist of which guardrails need to be applied to an existing cloud account. Answering questions like, can these guardrails be implemented without breaking anything? What level of testing is required? Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46587,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9503,9505,9502,9501,9542,9571,9507],"class_list":["post-46586","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-devops-article","tag-trend-micro-devops-aws","tag-trend-micro-devops-azure","tag-trend-micro-devops-cloud-native","tag-trend-micro-devops-google-cloud-platform","tag-trend-micro-devops-how-to","tag-trend-micro-devops-multi-cloud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Adding Guardrails To A Cloud Account After The Fact 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adding Guardrails To A Cloud Account After The Fact 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-11T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/22\/e\/cloud-configuration-management-guardrails\/adding-gaurdrails-devops-tn.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adding-guardrails-to-a-cloud-account-after-the-fact\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adding-guardrails-to-a-cloud-account-after-the-fact\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Adding Guardrails To A Cloud Account After The Fact\",\"datePublished\":\"2022-05-11T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adding-guardrails-to-a-cloud-account-after-the-fact\\\/\"},\"wordCount\":1628,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adding-guardrails-to-a-cloud-account-after-the-fact\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/adding-guardrails-to-a-cloud-account-after-the-fact.jpg\",\"keywords\":[\"Trend Micro DevOps : Article\",\"Trend Micro DevOps : AWS\",\"Trend Micro DevOps : Azure\",\"Trend Micro DevOps : Cloud Native\",\"Trend Micro DevOps : Google Cloud Platform\",\"Trend Micro DevOps : How To\",\"Trend Micro DevOps : Multi Cloud\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adding-guardrails-to-a-cloud-account-after-the-fact\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adding-guardrails-to-a-cloud-account-after-the-fact\\\/\",\"name\":\"Adding Guardrails To A Cloud Account After The Fact 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adding-guardrails-to-a-cloud-account-after-the-fact\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adding-guardrails-to-a-cloud-account-after-the-fact\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/adding-guardrails-to-a-cloud-account-after-the-fact.jpg\",\"datePublished\":\"2022-05-11T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adding-guardrails-to-a-cloud-account-after-the-fact\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adding-guardrails-to-a-cloud-account-after-the-fact\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adding-guardrails-to-a-cloud-account-after-the-fact\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/adding-guardrails-to-a-cloud-account-after-the-fact.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/adding-guardrails-to-a-cloud-account-after-the-fact.jpg\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adding-guardrails-to-a-cloud-account-after-the-fact\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro DevOps : Article\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-devops-article\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Adding Guardrails To A Cloud Account After The Fact\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Adding Guardrails To A Cloud Account After The Fact 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/","og_locale":"en_US","og_type":"article","og_title":"Adding Guardrails To A Cloud Account After The Fact 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-05-11T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/22\/e\/cloud-configuration-management-guardrails\/adding-gaurdrails-devops-tn.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Adding Guardrails To A Cloud Account After The Fact","datePublished":"2022-05-11T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/"},"wordCount":1628,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/adding-guardrails-to-a-cloud-account-after-the-fact.jpg","keywords":["Trend Micro DevOps : Article","Trend Micro DevOps : AWS","Trend Micro DevOps : Azure","Trend Micro DevOps : Cloud Native","Trend Micro DevOps : Google Cloud Platform","Trend Micro DevOps : How To","Trend Micro DevOps : Multi Cloud"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/","url":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/","name":"Adding Guardrails To A Cloud Account After The Fact 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/adding-guardrails-to-a-cloud-account-after-the-fact.jpg","datePublished":"2022-05-11T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/adding-guardrails-to-a-cloud-account-after-the-fact.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/adding-guardrails-to-a-cloud-account-after-the-fact.jpg","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/adding-guardrails-to-a-cloud-account-after-the-fact\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro DevOps : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-article\/"},{"@type":"ListItem","position":3,"name":"Adding Guardrails To A Cloud Account After The Fact"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46586"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46586\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46587"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}