Cyber threat actors are targeting cloud user deployments with bootkits and rootkits. Fortunately, Google Cloud Platform is taking action to augment customer security. Credit: CIS Today, attackers use various types of malware to target organizations’ cloud environments. Those threats include rootkits and bootkits. According to Malwarebytes, rootkits are tools through which cyber threat actors (CTAs) can achieve root (i.e. the highest level) permissions on an infected system for conducting reconnaissance, moving laterally to other network devices, and/or stealing sensitive information. Bootkits are similar to rootkits, noted Positive Technologies, the major difference being that bootkits activate before an operating system (OS) and, by extension, its various security mechanisms finish booting up.Cloud service providers (CSPs) are well aware of the threats that bootkits and rootkits pose to their customers. That’s why they’re constantly exploring new ways of helping users secure their cloud-based systems and data. In this spirit, working on Google Cloud Platform (GCP) is safer and more secure than ever thanks to CIS Hardened Images that are built on GCP Shielded Virtual Machine (VM) base images.Advanced hardening with Shielded VMsShielded VMs are hardened by a set of security controls that help defend against rootkits and bootkits. They leverage advanced platform security capabilities, such as secure and measured boot.Shielded VMs on GCP also: Protect VMs against advanced threatsEnsure workloads are trusted and verifiableProtect confidential data against exfiltration and replayProvide live migration and patchingThere is no additional cost for using a Shielded VM on GCP. Shielded VMs also support bring your own license (BYOL).CIS Hardened Images on Shielded VMsCIS Hardened Images are virtual machine images that are pre-configured to the security recommendations of the CIS Benchmarks. A CIS Hardened Image incorporates all the security recommendations outlined in the CIS Benchmark that’s applicable to the operating system. CISCIS Hardened Images on Google Cloud Platform are now built on Google Cloud’s Shielded VM base images. Using Shielded VMs helps protect your system from attack vectors and ensures your organization is only using supported images.GCP Marketplace offers more than 20 CIS Hardened Images on Shielded VMs for CentOS Linux, Ubuntu Linux, Microsoft Windows, and more.Click here to see the full list of CIS Hardened Images. Related content brandpost Sponsored by CIS Three Ways Security in the Azure Cloud Just Got Simpler In ongoing partnership with Microsoft Azure, CIS has released three CIS Benchmarks, two updated and one new, for Microsoft Azure. By CIS Sep 21, 2022 3 mins Internet Security brandpost Sponsored by CIS Foundational Cloud Security with CIS Benchmarks Not all organizations understand their security responsibilities in the cloud. That's why having foundational cloud security guidelines is so crucial. By CIS Sep 01, 2022 3 mins Internet Security brandpost Sponsored by CIS Free Trials of Hardened VMs in AWS Marketplace Free trials of several CIS Hardened Images in the AWS Marketplace give customers a way of exploring how to best secure their cloud-based systems. By CIS Sep 01, 2022 5 mins Internet Security brandpost Sponsored by CIS How to Meet STIG Compliance and Achieve OS Security Public sector organizations can use industry-trusted configuration standards to simplify their DISA STIG compliance journey. By CIS Sep 01, 2022 4 mins Internet Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe