{"id":58976,"date":"2025-07-16T00:00:00","date_gmt":"2025-07-16T00:00:00","guid":{"rendered":"urn:uuid:28e1d626-bfbf-777c-41cc-688fdf3081c0"},"modified":"2025-07-16T00:00:00","modified_gmt":"2025-07-16T00:00:00","slug":"cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/","title":{"rendered":"CISA&#8217;s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/nimbus-2000-initiative-findings:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/nimbus-2000-initiative-findings.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"52\">\n<p><span class=\"body-subhead-title\"><b>How Trend Vision One\u2122 Cloud Security Aligns with NIMBUS 2000<\/b><\/span><\/p>\n<p>As a committed partner in the cloud security ecosystem,&nbsp;<b>Trend Vision One\u2122 Cloud Security<\/b>&nbsp;directly addresses the challenges outlined in CISA\u2019s findings through its integrated platform capabilities, including the following:<\/p>\n<p><b>Enhanced Token Security and Identity Protection<\/b><\/p>\n<p><b>Trend Vision One\u2122<\/b>&nbsp;strengthens token validation and identity monitoring through:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><b>Trend Vision One\u2122 XDR for Cloud <\/b>(AWS CloudTrail) leverages over 150 advanced detection models, powered by global threat intelligence, to uncover sophisticated cloud-based threats such as:<\/span>\n<ul>\n<li><span class=\"rte-red-bullet\">MFA deactivations<\/span>\n<ul>\n<li><span class=\"rte-red-bullet\">Privilege escalations<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Policy rollbacks<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Master password changes<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><span class=\"rte-red-bullet\"><b>Identity &amp; Access Activity Monitoring<\/b>: Continuously monitors Microsoft Entra ID and Active Directory for suspicious authentication patterns and token misuse.<\/span><\/li>\n<\/ul>\n<p><b>Robust Secrets Management<\/b><\/p>\n<p>To support secure development and operations, Trend Vision One\u2122&nbsp;offers:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><b>Runtime Secret Scanning<\/b>: Detects exposed secrets in containerized environments in real time.<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Trend Vision One\u2122 Cloud Risk Management<\/b>: Monitors for misconfigurations in secrets management systems and automates compliance scanning against CIS benchmarks.<\/span><\/li>\n<\/ul>\n<p><b>Advanced Logging and Forensics<\/b><\/p>\n<p>Trend Vision One enhances visibility and detection with:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><b>Multi-Source Log Integration<\/b>: Ingests logs from AWS CloudTrail, VPC Flow, Amazon Security Lake, Azure Activity Logs, and more.<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Extended Threat Detection<\/b>: Identifies forged tokens, compromised keys, and unauthorized token generation.<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Automated Response<\/b>: Enables real-time containment actions, such as revoking access for suspicious IAM users.<\/span><\/li>\n<\/ul>\n<p><b>Targeted Detection Capabilities<\/b><\/p>\n<p>Trend Vision One includes specific detection models aligned with NIMBUS 2000 priorities, such as:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Detection of \u201cAWS IAM Login MFA Deactivated for a User\u201d<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Identification of \u201cAWS IAM Administrator Access Policy Attached to a Role\u201d<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Real-time alerts for policy rollbacks and privilege escalations<\/span><\/li>\n<\/ul>\n<p><b>The Power of Integrated Security<\/b><\/p>\n<p>Trend Vision One\u2019s XDR approach correlates signals across cloud, identity, endpoint, and network layers, offering:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><b>Comprehensive Visibility<\/b>: Centralized correlation and threat prioritization.<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Operational Efficiency<\/b>: Reduces alert fatigue and accelerates response with automated workflows.<\/span><\/li>\n<\/ul>\n<p><b>Building a Resilient Cloud Security Ecosystem<\/b><\/p>\n<p>CISA\u2019s NIMBUS 2000 initiative is a pivotal step toward enhancing cloud identity security. Trend Vision One\u2122 Cloud Security supports this mission by delivering integrated capabilities that align with federal standards and industry best practices.<\/p>\n<p>By addressing token validation, secrets management, and logging challenges, Trend Vision One empowers organizations to confidently embrace cloud technologies while maintaining robust security.<\/p>\n<\/p><\/div>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/g\/nimbus-2000-initiative-findings.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog explores key findings from CISA\u2019s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One\u2122 Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility\u2014offering insights into how integrated security solutions can help organizations strengthen their cloud identity defenses and meet evolving federal standards. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":58977,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9520,9522],"class_list":["post-58976","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cloud","tag-trend-micro-research-expert-perspective"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA&#039;s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA&#039;s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-16T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/07\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"976\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"CISA&#8217;s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security\",\"datePublished\":\"2025-07-16T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\\\/\"},\"wordCount\":377,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cloud\",\"Trend Micro Research : Expert Perspective\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\\\/\",\"name\":\"CISA's NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security.jpg\",\"datePublished\":\"2025-07-16T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security.jpg\",\"width\":976,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CISA&#8217;s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA's NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/","og_locale":"en_US","og_type":"article","og_title":"CISA's NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-07-16T00:00:00+00:00","og_image":[{"width":976,"height":533,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/07\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"CISA&#8217;s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security","datePublished":"2025-07-16T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/"},"wordCount":377,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/07\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cloud","Trend Micro Research : Expert Perspective"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/","url":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/","name":"CISA's NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/07\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security.jpg","datePublished":"2025-07-16T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/07\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/07\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security.jpg","width":976,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cisas-nimbus-2000-initiative-understanding-key-findings-and-strengthening-cloud-identity-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"CISA&#8217;s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=58976"}],"version-history":[{"count":1,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58976\/revisions"}],"predecessor-version":[{"id":58978,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58976\/revisions\/58978"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/58977"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=58976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=58976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=58976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}