<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>RKON</title>
	<atom:link href="http://www.rkon.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.rkon.com</link>
	<description>Private Equity Services</description>
	<lastBuildDate>Fri, 15 May 2026 15:50:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.rkon.com/wp-content/uploads/2021/04/cropped-favicon-32x32.jpg</url>
	<title>RKON</title>
	<link>https://www.rkon.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Your Deployment Pipeline Ends at a Firewall Ticket</title>
		<link>https://www.rkon.com/articles/your-deployment-pipeline-ends-at-a-firewall-ticket/</link>
					<comments>https://www.rkon.com/articles/your-deployment-pipeline-ends-at-a-firewall-ticket/#respond</comments>
		
		<dc:creator><![CDATA[Ramsha Shakeel]]></dc:creator>
		<pubDate>Mon, 11 May 2026 10:37:36 +0000</pubDate>
				<category><![CDATA[RKON]]></category>
		<guid isPermaLink="false">https://www.rkon.com/?p=7017</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Your team automated the build, the test, and the deploy. Then the whole thing stalled waiting on a firewall ticket change request.</p>
<p>That bottleneck is not a process problem. It is an architecture problem, and it shows up in nearly every hybrid environment we work in. Teams migrating to the cloud carry on-premises network security assumptions that silently fail in cloud and hybrid architectures. Rework, delays, and gaps discovered at the worst possible time are the outcome.</p>
<p>Here is where those assumptions break.</p>
<h2>The Mappings That Don’t Hold</h2>
<p>Every one of these has a gap. The gap is where the breach lives.</p>

		</div>
	</div>

	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img fetchpriority="high" decoding="async" width="934" height="235" src="https://www.rkon.com/wp-content/uploads/2026/05/table-1.png" class="vc_single_image-img attachment-large" alt="" title="table" srcset="https://www.rkon.com/wp-content/uploads/2026/05/table-1.png 934w, https://www.rkon.com/wp-content/uploads/2026/05/table-1-300x75.png 300w, https://www.rkon.com/wp-content/uploads/2026/05/table-1-768x193.png 768w" sizes="(max-width: 934px) 100vw, 934px" /></div>
		</figure>
	</div>

	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p><strong>Security groups </strong>do port, protocol, and IP allow/deny at Layer 3/4. No application awareness, no threat signatures, no built-in logging. If you need L7 inspection, you need AWS Network Firewall or Azure Firewall Premium, explicitly routed through.</p>
<p><strong>VPC subnets </strong>are a routing construct, not an enforcement boundary. Traffic between subnets in the same VPC routes directly by default with no firewall in the path. East-west lateral movement from a compromised workload can be completely invisible without additional controls.</p>
<p><strong>NAT gateways </strong>handle outbound address translation. They do not inspect sessions, enforce inbound policy, or provide anything equivalent to bidirectional DMZ controls.</p>
<p><strong>Cloud load balancers </strong>balance load. A WAF must be explicitly attached to every public ALB and is not on by default. Without it, there is no OWASP rule coverage and no bot mitigation.</p>
<h2>SD-WAN Makes It Worse</h2>
<p>SD-WAN direct internet breakout eliminates your centralized inspection chokepoint. Branch traffic reaches cloud workloads without crossing the data center firewall stack, and that is by design. SSL inspection at branch appliances is rarely performed because the performance cost is too high.</p>
<p>What follows is a split-brain problem: your SD-WAN dashboard shows traffic as tunneled and secure, while your VPC flow logs show direct traffic from those same source IPs. The DC firewall sees nothing. CISA Emergency Directive 26-03 (February 2026) confirmed active exploitation of Cisco Catalyst SD-WAN infrastructure, calling it a high-value target with known compromise in the wild, so this is not a theoretical concern.</p>
<p>Stop relying on the traffic path as your security control. <a href="https://www.rkon.com/articles/your-deployment-pipeline-ends-at-a-firewall-ticket/" target="_blank" rel="noopener">Enforce security</a> at the destination using cloud firewall ticket rules and security groups at the workload level.</p>
<h2>Four Things to Do This Week for Firewall Ticket</h2>
<ol>
<li><strong>Enable VPC Flow Logs everywhere. </strong>All VPCs, all traffic, version 3+, retained 90 days minimum. Everything else on this list depends on it.</li>
<li><strong>Audit public ALBs for WAF coverage. </strong>AWS Console &gt; WAF &gt; check which ALBs have a Web ACL attached. Any that don&#8217;t are unprotected. Attach AWS Managed Rules Core Rule Set &#8212; it takes about 20 minutes.</li>
<li><strong>Run the split-brain test. </strong>Pull SD-WAN path analytics for your most sensitive traffic and cross-reference with VPC flow logs for the same source IPs. Gaps between the two mean broken routing.</li>
<li><strong>Audit security group rules. </strong>Flag every 0.0.0.0/0 inbound rule. AWS Config rule &#8216;restricted-common-ports&#8217; does this automatically.</li>
</ol>
<p>Fix the network architecture and your teams ship faster, without firewall tickets blocking deployments or rearchitecting mid-migration.</p>
<p>Join Tyler at GrassRootz for the full talk on June 4<sup>th</sup> for more: <a href="https://grassr00tz.com/" rel="noopener">https://grassr00tz.com/</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element vc_custom_1778495481574">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img decoding="async" width="150" height="150" src="https://www.rkon.com/wp-content/uploads/2026/05/presenter_tyler_coady-150x150.png" class="vc_single_image-img attachment-thumbnail" alt="" title="presenter_tyler_coady" srcset="https://www.rkon.com/wp-content/uploads/2026/05/presenter_tyler_coady-150x150.png 150w, https://www.rkon.com/wp-content/uploads/2026/05/presenter_tyler_coady-75x75.png 75w, https://www.rkon.com/wp-content/uploads/2026/05/presenter_tyler_coady-600x600.png 600w" sizes="(max-width: 150px) 100vw, 150px" /></div>
		</figure>
	</div>
<p style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Author: Tyler Coady, Senior Cloud Security Consultant, RKON</p></div></div></div></div><div class="vc_row wpb_row vc_row-fluid rkon-flip-cols-on-mobile"><div class="wpb_column vc_column_container vc_col-sm-4"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_row wpb_row vc_inner vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-1 vc_hidden-sm vc_hidden-xs"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element wpb_animate_when_almost_visible wpb_fadeInLeft fadeInLeft rkon-animation-delay-3" >
		<div class="wpb_wrapper">
			<i class="fab fa-linkedin"></i>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-11"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element wpb_animate_when_almost_visible wpb_fadeInLeft fadeInLeft rkon-animation-delay-3" >
		<div class="wpb_wrapper">
			<p><a href="https://www.linkedin.com/in/tylercoady/" rel="noopener">https://www.linkedin.com/in/tylercoady/</a></p>

		</div>
	</div>
</div></div></div></div></div></div></div><div class="wpb_animate_when_almost_visible wpb_fadeInRight fadeInRight wpb_column vc_column_container vc_col-sm-8"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div></div>
</div>]]></content:encoded>
					
					<wfw:commentRss>https://www.rkon.com/articles/your-deployment-pipeline-ends-at-a-firewall-ticket/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Project Glasswing and the Cyber Frontier</title>
		<link>https://www.rkon.com/articles/project-glasswing-and-the-cyber-frontier/</link>
					<comments>https://www.rkon.com/articles/project-glasswing-and-the-cyber-frontier/#respond</comments>
		
		<dc:creator><![CDATA[Ramsha Shakeel]]></dc:creator>
		<pubDate>Wed, 06 May 2026 11:54:49 +0000</pubDate>
				<category><![CDATA[Cybersecurity Articles]]></category>
		<guid isPermaLink="false">https://www.rkon.com/?p=7000</guid>

					<description><![CDATA[Author: Gerard Onorato, CISO, RKON On the cyber frontier, the fastest gun has become the fastest model. That thought has [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignnone wp-image-6805" src="https://www.rkon.com/wp-content/uploads/2025/11/Gerald-Ornorato-8-1-300x300.png" alt="" width="201" height="201" srcset="https://www.rkon.com/wp-content/uploads/2025/11/Gerald-Ornorato-8-1-300x300.png 300w, https://www.rkon.com/wp-content/uploads/2025/11/Gerald-Ornorato-8-1-1024x1024.png 1024w, https://www.rkon.com/wp-content/uploads/2025/11/Gerald-Ornorato-8-1-150x150.png 150w, https://www.rkon.com/wp-content/uploads/2025/11/Gerald-Ornorato-8-1-768x768.png 768w, https://www.rkon.com/wp-content/uploads/2025/11/Gerald-Ornorato-8-1-75x75.png 75w, https://www.rkon.com/wp-content/uploads/2025/11/Gerald-Ornorato-8-1-600x600.png 600w, https://www.rkon.com/wp-content/uploads/2025/11/Gerald-Ornorato-8-1.png 1200w" sizes="(max-width: 201px) 100vw, 201px" /></p>
<p><strong>Author:</strong> Gerard Onorato, CISO, RKON</p>
<p>On the cyber frontier, the fastest gun has become the fastest model. That thought has stuck with me since Anthropic announced Project Glasswing. I just watched Once Upon a Time in the West, great movie, but I’ll skip the analogies. I’m no Leone when it comes to dramatic showdowns.</p>
<p>Back to shop talk. Glasswing isn’t a one-off. It’s the latest, and from what we hear, the greatest, entry in what is now, very clearly, a category. Frontier capability is being aimed straight at the heart of <a href="https://www.rkon.com/" target="_blank" rel="sponsored">cybersecurity</a>, and what that means for the rest of us trying to stay a half-step ahead of the next breach is being worked out in production, not in the lab.</p>
<h2><strong>This Is Now a Category, Not an Announcement</strong></h2>
<p>If Glasswing felt like a singular moment, it isn’t. Singular moments in our profession are getting very rare. If something hits you on the head, get your hard hat, because something else is coming.</p>
<p>Think back to when OpenAI launched Aardvark, their agentic security researcher, in 2025. It became Codex Security in 2026 when it was released for enterprise use. Theori followed right after with its own AI discovery platform, Xint. More are on the way, just watch for the signs. What matters most isn’t the tools themselves, but how quickly we move from noticing something new to actually finding new CVEs in real code.</p>
<p>In its first 30 days of beta, OpenAI reported that Codex Security identified 792 critical findings, including 14 CVEs across key projects such as PHP, libssh, and Chromium (<a href="https://openai.com/index/codex-security-now-in-research-preview/" target="_blank" rel="noopener">OpenAI, March 2026</a>) attackers, nor could we achieve that kind of scanning a year ago.</p>
<h2><strong>The Economics Already Shifted</strong></h2>
<p>I’m less interested in these tools as cool technical milestones, though they are, and I wish I could be more fascinated by that… I really do. I’m trying to do the math. The economics of vulnerability discovery have changed. Past tense, not will, they have.</p>
<p>We’ve benefited from an imbalance all our careers. Sure, a zero-day can be catastrophic, but finding weaknesses was slow, expensive, and heavily dependent on human expertise. Of course, exploiting them usually took far less effort. Frontier AI is narrowing that gap the moment it lands in the wrong hands. Systems that can search code, reason over complex environments, and identify exploitable conditions scale offensive capability in ways most security teams aren’t built to handle.</p>
<p>Sure, AI helps us defenders, too. The honest question is whether defensive capability can outpace the governance, controls, and operational discipline needed to keep it pointed in the right direction. If the model can help your team find flaws faster, it can do the same for the other side, and attackers won’t be slowed down by your change advisory board, procurement cycle, or quarterly risk review.</p>
<h2><strong>Credit Where It’s Due</strong></h2>
<p>Credit goes to the labs. Anthropic is presenting Glasswing as a real defensive tool, and OpenAI is doing the same with Codex Security and their Trusted Access for Cyber program, which is an identity and trust framework (OpenAI, February 2026). Whatever you think of these companies, they’re not being naive. Both are taking the dual-use issue seriously.</p>
<p>We can’t afford to be naïve about it either. Once a capability like this exists, and now there are several, the race is about adoption and execution. We get to decide whether these tools become a force multiplier for our defenses or an accelerant for the people trying to kick the doors in. Well, actually, we just get to decide if we want to ignore the boot sounds banging on the outside of the door, or do something about them.</p>
<h2><strong>The Implications Are Immediate</strong></h2>
<ul>
<li>Vulnerability management has to become faster and more risk-driven. The monthly patch cycle is already on borrowed time, and the cadence is getting worse, not better.</li>
<li>Detection engineering needs to account for automated reconnaissance and much faster exploit iteration than anything in your current threat model.</li>
<li>Incident response needs to assume attackers will test more paths, more quickly, and with less human friction than your playbook assumes.</li>
<li>“Patch later” is becoming a more dangerous habit by the month. When public agents are surfacing CVEs at the rates we’re now seeing, the gap between disclosure and weaponization shrinks for everybody.</li>
</ul>
<p>Security teams are very good at playing the game against our usual foes. We’re less comfortable and slower to admit when the rules of the game change. This year is one of those moments, new rule book folks.</p>
<h2><strong>Two Bad Instincts</strong></h2>
<p>Right now, we need to avoid two common mistakes: getting too excited or being too skeptical. Overconfidence and complacency are both easy traps. Vendors will promise miracle solutions, and your board will want to know why you haven’t bought one. But that’s not a real strategy.</p>
<h2><strong>What You Can Do</strong></h2>
<p>Focus on the basics and get ready. The threat landscape is speeding up, even if it’s not glamorous work.</p>
<ul>
<li>Inventory your assets. You probably can’t, fully, and that’s a problem. But your threat environment needs to be managed, and you can’t shrink what you don’t inventory.</li>
<li>Tighten identity controls. Phishing-resistant MFA on your privileged accounts, now, seriously, now. While you’re at it, zero-trust and access reviews. You know what? Review your entire IAM program, and read my new paper on it.</li>
<li>Improve logging and monitoring with identity context. Don’t just add more telemetry.</li>
<li>Implement or test segmentation so one compromise doesn’t cascade across the enterprise.</li>
<li>Minimize time to patch. Assume the window is shorter than it used to be.</li>
<li>Tabletop your response plan, and stress-test it against a scenario where the attacker iterates at machine speed.</li>
<li>Use AI where it genuinely strengthens your defense. Evaluate tools now on the market with clear eyes. Keep humans in the loop for production decisions. Keep their hands on the triggers.</li>
<li>Make sure your business continuity plans are tight, and your risk picture is honest.</li>
</ul>
<p>In other words, make sure your own house is in order before a fight breaks out.</p>
<h2><strong>One More Thought</strong></h2>
<p>Here’s what I keep thinking about: Anthropic, OpenAI, and at least one other outside company have all released similar capabilities at the same time. This is what responsible disclosure looks like in this field. That’s what we can see.</p>
<p>This makes the silence from the other categories of actors a lot more conspicuous. State-backed programs. Well-funded criminal operations. The quiet end of the private offensive-security market. If three or four public labs converged on this capability within a year, the working assumption that nobody less talkative got there first or got further stops looking conservative. A bit of me fears that Anthropic and OpenAI were only the first, ethical or commercial enough to disclose. Quiet capability beats public capability every time in this line of work, and the quiet kind doesn’t come with a press release. Or maybe I’m paranoid, but maybe I’m not. Time will tell</p>
<h2><strong>Closing</strong></h2>
<p>Speed has always mattered in the cyber world, but never this much. That’s the main takeaway. Glasswing, Codex Security, and whatever comes next aren’t just more AI news, they’re signs that the landscape has already changed.</p>
<p>For CISOs, the job now is to recognize these changes, respond calmly, and make sure the best tools are working for your team, not for attackers.</p>
<p>Focus less on flashy new tools and more on what attackers actually use to break in and stay in. That’s what matters. Good luck, we have a lot to do and not much time.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.rkon.com/articles/project-glasswing-and-the-cyber-frontier/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Platforms or Bust: Notes from Google Next &#8217;26</title>
		<link>https://www.rkon.com/articles/platforms-or-bust-google-cloud-next-26/</link>
					<comments>https://www.rkon.com/articles/platforms-or-bust-google-cloud-next-26/#respond</comments>
		
		<dc:creator><![CDATA[Ramsha Shakeel]]></dc:creator>
		<pubDate>Wed, 06 May 2026 11:24:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity Articles]]></category>
		<guid isPermaLink="false">https://www.rkon.com/?p=6998</guid>

					<description><![CDATA[Author: Aaron Rea, Principal Consultant, Cloud Security I just got back from Google Cloud Next, and after three days of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone wp-image-7003" src="https://www.rkon.com/wp-content/uploads/2026/05/Aaron-Rea-300x300.jpeg" alt="Google Next" width="166" height="166" srcset="https://www.rkon.com/wp-content/uploads/2026/05/Aaron-Rea-300x300.jpeg 300w, https://www.rkon.com/wp-content/uploads/2026/05/Aaron-Rea-150x150.jpeg 150w, https://www.rkon.com/wp-content/uploads/2026/05/Aaron-Rea-768x768.jpeg 768w, https://www.rkon.com/wp-content/uploads/2026/05/Aaron-Rea-75x75.jpeg 75w, https://www.rkon.com/wp-content/uploads/2026/05/Aaron-Rea-600x600.jpeg 600w, https://www.rkon.com/wp-content/uploads/2026/05/Aaron-Rea.jpeg 800w" sizes="auto, (max-width: 166px) 100vw, 166px" /></p>
<p><strong>Author:</strong> Aaron Rea, Principal Consultant, Cloud Security</p>
<p>I just got back from Google Cloud Next, and after three days of &#8220;agentic&#8221; being said roughly every eleven seconds, one thing is clear. We are back in a platform-building moment. Not a &#8220;Gemini is cool&#8221; moment. Not a &#8220;let me bolt an LLM onto Lambda&#8221; moment. A full-on, this-is-going-to-eat-the-next-five-years platform moment, the same flavor as when containers stopped being a Docker party trick and turned into Kubernetes eating the data center.</p>
<p>The headline was the <a href="https://cloud.google.com/blog/topics/google-cloud-next/welcome-to-google-cloud-next26" target="_blank" rel="noopener">Gemini Enterprise Agent Platform</a>, Google&#8217;s evolution of Vertex AI plus a constellation of new primitives: Agent Studio, Agent Runtime, Agent Identity, Agent Gateway, Agent Observability, Agent Sandbox, Agent Memory Bank, Agent Threat Detection. If you read that list and your brain auto-completed &#8220;this is Kubernetes for agents,&#8221; you and I are reading the same tea leaves.</p>
<h2><strong>The DIY vs. COTS tightrope</strong></h2>
<p>Here&#8217;s the tension every cloud and platform team is walking into in 2026, whether they&#8217;ve named it or not.</p>
<p>On one side, DIY: roll your own agent runtime on raw GKE, wire up your own vector store, glue MCP servers to your service mesh, write your own gateway, build your own audit pipeline. You&#8217;ll learn a lot. You&#8217;ll also be eighteen months behind, and you&#8217;ll own a snowflake your security team has to defend and your auditors have to certify.</p>
<p>On the other side, fully-baked COTS: buy the platform end-to-end, click through the studio, ship to prod, accept whatever lock-in and opaque behavior comes with it. It works until it doesn&#8217;t, and now you&#8217;re explaining to a regulator why you can&#8217;t tell them which model approved a transaction.</p>
<p>The sustainable answer is the middle path: build a platform. Not a magical AI platform. A boring, opinionated, paved-road platform that picks the abstractions you want to be portable across, lets you swap models and runtimes underneath, enforces your security and compliance posture by default, and gives your app teams a paved road that doesn&#8217;t require them to learn what gVisor is. Same playbook we ran with K8s a decade ago. Nobody actually wanted to manage etcd; everyone wanted the abstractions on top.</p>
<p>For regulated industries, this isn&#8217;t a preference. It&#8217;s the only path that produces an auditable, governable agent estate.</p>
<h2><strong>What actually shipped that matters</strong></h2>
<p>A lot of the 260+ announcements were product marketing, but several are genuinely platform-shaped and worth real attention.</p>
<p><a href="https://www.rkon.com/articles/gke-for-regulated-workloads/"><strong>GKE Agent Sandbox</strong></a><strong>.</strong> The standout. gVisor-based kernel isolation, the same tech protecting Gemini, capable of 300 sandboxes per second per cluster at sub-second latency, with up to 30% better price-performance on Axion vs. other hyperscalers. If you&#8217;re going to let LLM-generated code execute against your infrastructure, traditional container isolation isn&#8217;t sufficient, and <a href="https://cloud.google.com/blog/products/containers-kubernetes/whats-new-in-gke-at-next26" rel="noopener">Agent Sandbox</a> is the first credible primitive that treats &#8220;ephemeral, untrusted, single-replica workload&#8221; as a first-class K8s concept. It&#8217;s based on an open-source controller, so the abstraction is portable across clouds. That matters for any compliance regime that requires demonstrable workload isolation.</p>
<p><strong>Agent Gateway and Agent Identity.</strong> These are the unsexy announcements that signal Google is taking enterprise seriously. Every agent gets a workload identity, every action runs through a unified policy enforcement point, every interaction emits audit telemetry. If you&#8217;ve ever tried to retrofit identity onto a fleet of microservices that grew up without it, you know why doing this on day one is the difference between a platform and a liability. For SOC 2, HIPAA, PCI, and FedRAMP environments, this is the foundation that makes agent workloads defensible.</p>
<p><strong>TPU 8t / 8i split and Axion N4A going GA.</strong> The split into training-optimized (8t) and inference-optimized (8i, with claimed 80% better performance per dollar) is honest about something the industry has been quiet about: the workloads are different, and one chip serving both leaves money and latency on the table. Pair that with Axion N4A delivering up to 2x better price-performance than current-gen x86 for cost-sensitive workloads, and the economic case for putting agent glue code on Arm becomes hard to argue with.</p>
<p><strong>llm-d as a CNCF Sandbox project.</strong> A buried but important development. Google is a founding contributor alongside Red Hat, IBM Research, CoreWeave, and NVIDIA, with a stated vision of &#8220;any model, any accelerator, any cloud.&#8221; If that delivers, distributed inference becomes a portable Kubernetes-native primitive instead of a vendor-locked feature, and CNCF governance gives multi-cloud strategies a real anchor point. That&#8217;s the K8s parallel: when CNCF picked a winner in container orchestration, the industry consolidated and the platform layer above it became where differentiation happened.</p>
<p><strong>Wiz + Google Threat Intelligence integration.</strong> A direction worth watching closely. The combined platform brings Wiz&#8217;s Cloud and AI Security Platform together with Google&#8217;s threat intel, and the new AI Application Protection Platform claims code-to-cloud-to-runtime coverage. The acquisition is starting to produce a coherent story for AI workload security, especially for organizations operating across multi-cloud and hybrid footprints.</p>
<h2><strong>The K8s parallel, in case it isn&#8217;t obvious</strong></h2>
<p>Around 2015 you had three camps. Camp A wrote their own Mesos clusters and bespoke schedulers because they were big enough and had the engineering capacity. Camp B bought a PaaS (Heroku, Cloud Foundry, OpenShift early days) and accepted the lock-in. Camp C bet on Kubernetes, which at the time was unfinished, underdocumented, and required deep operational knowledge to run safely.</p>
<p>Camp C ultimately won. Not because K8s was elegant (it wasn&#8217;t, and arguably still isn&#8217;t), but because it was open enough to invest in, opinionated enough to hide what teams didn&#8217;t want to learn, and supported by an ecosystem that compounded year over year. Every serious infrastructure team eventually built their own internal platform on top: paved roads, golden paths, opinionated CD pipelines, internal developer portals. That layer is where the differentiation lived. It&#8217;s also where the operational maturity, the security posture, and the compliance evidence lived.</p>
<p>We&#8217;re in the same spot with agents. The primitives Google announced (sandboxes, runtimes, identity, gateways, memory, observability) are the new kubelets, ingress controllers, and service meshes. They&#8217;re useful. They&#8217;re also not a platform. The platform is what gets built on top of them: the opinionated agent SDK your dev teams actually use, the policy bundles that wrap Agent Gateway with your auth and DLP rules, the CI pipeline that runs Agent Simulation against synthetic traffic before anything hits prod, the runbooks and SOC playbooks for when an agent misbehaves at 3am.</p>
<p>If your organization&#8217;s plan for the next 18 months is &#8220;let each team pick their own framework and ship,&#8221; you&#8217;re going to relive the fragmentation pain of raw Docker in 2016. Pick your abstractions, build the paved road, and make the easy thing also be the secure, observable, and auditable thing.</p>
<h2><strong>A quick word on Vegas and Weezer</strong></h2>
<p>Credit where it&#8217;s due: Next on the south end of the Strip was the most manageable big cloud conference I&#8217;ve done in years. Everything within walking distance, no shuttle bus roulette, no hour-long marches through three casinos to get to a breakout. Other large cloud conferences could learn a thing or two. And Weezer at Allegiant on Tuesday was exactly what 40,000 conference badges needed to remember they&#8217;re human beings. Rivers Cuomo&#8217;s voice is somehow unchanged since 1996. I have theories.</p>
<h2><strong>What to do now that we&#8217;re a week out</strong></h2>
<p>A week back at your desk, the keynote afterglow has faded, and the question is what actually changes in your roadmap. Four things worth committing to:</p>
<ol>
<li><strong>Pick your abstraction layer and commit.</strong> GKE plus Agent Sandbox is a defensible bet because the controller is open-source and the primitives map to K8s concepts your team already understands. If you&#8217;re on EKS or AKS, watch llm-d closely. That&#8217;s your portability story.</li>
<li><strong>Treat agent identity and governance as table stakes.</strong> Every agent gets a workload identity, every action gets audited, every tool call goes through a gateway. Do this before you have 50 agents in production, not after. Your auditors will ask, and &#8220;we&#8217;ll get to it&#8221; is not an answer.</li>
<li><strong>Build the simulation and eval pipeline before you build the agents.</strong> Agent Simulation and Agent Optimizer are interesting; what&#8217;s more interesting is having a CI gate that says &#8220;this agent regressed on the eval suite, no merge.&#8221; That&#8217;s a 2026 problem you can solve with 2018 tools.</li>
<li><strong>Match your buy-vs-build choices to where your differentiation actually lives.</strong> Buy the primitives that are commodity (compute, isolation, identity infrastructure). Invest your engineering effort on the platform layer that encodes your business logic, your security posture, and your operational expertise. That&#8217;s the layer that compounds.</li>
</ol>
<p>The next decade of infrastructure is going to look a lot like the last one. A Cambrian explosion of vendor offerings, a slow consolidation around open primitives, and platform teams quietly doing the unsexy work of turning chaos into a paved road. The teams that win won&#8217;t be the ones who picked the right LLM. They&#8217;ll be the ones who built the platform that made the LLM choice swappable, the security posture inheritable, and the audit story tellable.</p>
<p>If that platform layer is on your roadmap, and you&#8217;re trying to figure out where to start, that conversation is one many of us in the cloud and security community are having right now. Worth having sooner rather than later.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.rkon.com/articles/platforms-or-bust-google-cloud-next-26/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>E3 to E5 to E7: How RKON Is Helping Clients Navigate Microsoft’s Next Era of Work</title>
		<link>https://www.rkon.com/articles/microsoft-e3-to-e5-to-e7/</link>
					<comments>https://www.rkon.com/articles/microsoft-e3-to-e5-to-e7/#respond</comments>
		
		<dc:creator><![CDATA[Ramsha Shakeel]]></dc:creator>
		<pubDate>Wed, 29 Apr 2026 09:27:29 +0000</pubDate>
				<category><![CDATA[RKON]]></category>
		<guid isPermaLink="false">https://www.rkon.com/?p=6989</guid>

					<description><![CDATA[Evolving Microsoft 365 Investments from E3 to E5 to E7 Microsoft’s latest announcement, Microsoft 365 E7 isn’t just another licensing [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2>Evolving Microsoft 365 Investments from E3 to E5 to E7</h2>
<p>Microsoft’s latest announcement, <a href="https://microsoftpartners.microsoft.com/abs/Blog/?title=Introducing%20Microsoft%20365%20E7%3A%20The%20Frontier%20Suite" rel="noopener">Microsoft 365 E7</a> isn’t just another licensing update. It’s a signal of where the market is going.</p>
<p>At <a href="https://www.rkon.com/">RKON</a>, we’re seeing this shift play out in real time with our clients. Organizations are moving from productivity to security to AI-driven operations. The challenge isn’t understanding what E7 is. It’s understanding what to do next and when to implement change.</p>
<h4>The Evolution of Microsoft 365 (and Why It Matters Now)</h4>
<p>Microsoft’s roadmap has been consistent, even if the pace has accelerated:</p>
<ul>
<li>E3 established the modern workplace</li>
<li>E5 secured it</li>
<li>E7 is redefining it</li>
</ul>
<p>Each step builds on the last while also introduces a new layer of complexity.</p>
<h2><strong>E3: The Foundation Most Organizations Started With</strong></h2>
<p>E3 gave organizations what they needed to modernize:</p>
<ul>
<li>Collaboration through Teams and SharePoint</li>
<li>Standard identity and access management</li>
<li>Core compliance capabilities</li>
</ul>
<p>For many, this was the first step in moving away from legacy infrastructure. But today, E3 alone leaves gaps, especially in security and visibility.</p>
<h2><strong>E5: Where RKON Sees the Most Immediate Value</strong></h2>
<p>E5 introduced enterprise-grade security and compliance and for most organizations, this is still the biggest opportunity today.</p>
<p>At RKON, we consistently see clients underutilizing:</p>
<ul>
<li>Microsoft Defender across endpoints, identity, and cloud</li>
<li>Microsoft Purview for data governance and compliance</li>
<li>Advanced threat protection and response capabilities</li>
</ul>
<p>In many cases, clients are:</p>
<ul>
<li>Paying for overlapping third-party tools</li>
<li>Lacking centralized visibility</li>
<li>Struggling to operationalize security</li>
</ul>
<p>E5 solves for these challenges when implemented correctly. This is why our guidance is often simple. Before jumping to what’s next, make sure you’re maximizing the value of what you already own.</p>
<h2><strong>E7: A Shift to the AI + Human-Driven Enterprise</strong></h2>
<p>With E7, Microsoft is introducing something fundamentally different and enabling a new way of working:</p>
<ul>
<li>Humans defining intent</li>
<li>AI copilots assisting with human brilliance leading</li>
<li>Autonomous agents executing tasks</li>
</ul>
<p>E7 combines:</p>
<ul>
<li>Microsoft 365 E5</li>
<li>Microsoft 365 Copilot</li>
<li>Agent 365: a new control plane for managing and securing AI agents</li>
</ul>
<h2><strong>What’s Changing with E7</strong></h2>
<p>While the announcement is still evolving, three shifts are clear:</p>
<h3><strong>1. AI Is Moving Into Core Operations</strong></h3>
<p>What was once experimental is becoming operational. Organizations are moving from <a href="https://www.rkon.com/white-papers/why-iam-zero-trust-principles-are-critical-to-securing-copilot/">testing Copilot</a> to embedding AI across workflows and enabling agents that act on behalf of users.</p>
<p>This creates massive opportunity, but also introduces new risk.</p>
<h3><strong>2. Governance Will Define Success</strong></h3>
<p>The biggest gap we see today isn’t AI capability, it’s AI governance.</p>
<p>Without the right controls, organizations risk:</p>
<ul>
<li>Data exposure</li>
<li>Compliance issues</li>
<li>Lack of visibility into AI-driven actions</li>
</ul>
<p>With E7 and Agent 365, Microsoft is addressing this directly.</p>
<p>At RKON, we see governance as the foundation (not the afterthought) of AI adoption.</p>
<h3><strong>3. Security and AI Are Now One Conversation</strong></h3>
<p>Historically, security and productivity were separate discussions. That’s no longer the case.</p>
<p>AI requires:</p>
<ul>
<li>Secure access to data</li>
<li>Strong identity controls</li>
<li>Continuous monitoring</li>
</ul>
<p>Which means organizations need to think holistically.</p>
<h2><strong>When Should You Invest More in Microsoft?</strong></h2>
<p>One of the most common questions we’re getting from clients is: “Should we be moving from E3 to E5 to E7 right now?” The answer depends on where you are today.</p>
<p>Stay on E3 if:</p>
<ul>
<li>You’re early in your cloud journey</li>
<li>Security maturity is still developing</li>
<li>AI is not yet a priority</li>
</ul>
<p>Invest in E5 if:</p>
<ul>
<li>You’re managing multiple security tools</li>
<li>You need better visibility and response capabilities</li>
<li>Compliance requirements are increasing</li>
<li>You want to consolidate and reduce risk</li>
</ul>
<p>This is where RKON is seeing the strongest ROI today.</p>
<p>Start Planning for E7 if:</p>
<ul>
<li>You’re actively deploying Copilot</li>
<li>You’re exploring AI at scale not just in pilots</li>
<li>You need governance for AI agents and automation</li>
<li>You’re rethinking how work gets done across your organization</li>
</ul>
<p>E7 is less about licensing and more about transformation readiness.</p>
<h2><strong>What RKON Recommends Right Now</strong></h2>
<p>Even as E7 evolves, there are clear steps organizations should take today:</p>
<h3><strong>1. Maximize the Value of Your E5 Investment</strong></h3>
<p>We often find:</p>
<ul>
<li>Security features that haven’t been deployed</li>
<li>Compliance tools that aren’t configured</li>
<li>Capabilities that could replace third-party spend</li>
</ul>
<p>Unlocking E5 is often the fastest path to value.</p>
<h3><strong>2. Build an AI-Ready Foundation</strong></h3>
<p>Before scaling AI, organizations need:</p>
<ul>
<li>Data classification and governance</li>
<li>Identity and access controls</li>
<li>Security visibility across environments</li>
</ul>
<p>Without this, AI adoption will stall and introduce risk.</p>
<h3><strong>3. Move Beyond AI Pilots</strong></h3>
<p>If you’re experimenting with Copilot, the next step is to:</p>
<ul>
<li>Identify high-impact use cases</li>
<li>Expand into real workflows</li>
<li>Measure outcomes</li>
</ul>
<p>This is where AI starts driving business value.</p>
<h3><strong>4. Begin the E7 Conversation Now</strong></h3>
<p>Even if you’re not ready to invest, now is the time to ask the strategic questions:</p>
<ul>
<li>How will we manage AI agents?</li>
<li>What governance model do we need?</li>
<li>How will AI change our operating model?</li>
</ul>
<p>Final Perspective: This is bigger than licensing. At RKON, we don’t see E7 as just another SKU. The future of work will be defined by how well organizations integrate humans, AI, and automation securely.</p>
<p>&nbsp;</p>
<h2><strong>A CIO &amp; CISO Perspective on Going from E3 to E5 to E7</strong></h2>
<p><a href="https://www.rkon.com/articles/the-new-era-of-ciso-influence-how-technology-leaders-can-guide-organizations-through-rapid-change/">For CIOs and CISOs</a>, the value of going from E3 to E5 to E7 becomes clearer when it’s viewed through the lenses that matter most: operational readiness, governance, and cost efficiency.</p>
<p>If you’re already running Microsoft 365 E5 with Copilot and Entra Suite, E7 aligns cleanly with your existing architecture. When E7 becomes available on May 1, it’s worth evaluating as part of your normal licensing and renewal cycle. In many cases, organizations find that E7 simplifies licensing while reducing overall cost, because Agent 365 is effectively included rather than added as a separate control plane.</p>
<p>For organizations using E5 + Copilot but still working through AI governance (guardrails, identity boundaries, auditability, and oversight) you’re not behind. You’re exactly where most enterprises are today. That gap between AI capability and AI control is what Agent 365 is designed to address, and it launches alongside E7.</p>
<p>From a risk and control standpoint, E7 becomes the most straightforward way to operationalize AI responsibly:</p>
<ul>
<li>Agent 365 provides visibility and governance for AI agents acting on behalf of users</li>
<li>Entra Suite strengthens identity as the security boundary for both humans and agents</li>
<li>Security and compliance are embedded, not bolted on after deployment</li>
</ul>
<p>It’s also important to recognize that Entra Suite is not only about compliance. It materially improves access security and user experience by enabling:</p>
<ul>
<li>Private Access, which allows secure access to internal applications without relying on traditional VPNs</li>
<li>Internet Access, which helps organizations control and secure access to SaaS applications and the broader internet</li>
</ul>
<p>From an executive perspective, the takeaway is simple:</p>
<p>Any E5 organization using Copilot or planning to should be actively evaluating E7. April is a natural time to start those conversations, as new SKUs and pricing typically surface and organizations reassess renewals, step‑ups, and add‑ons. For many, E7 is less a “new purchase” and more a cleaner, more governed way to fund and scale AI.</p>
<h2><strong>Ready to evaluate your Microsoft strategy?</strong></h2>
<p>RKON helps organizations maximize ROI, reduce risk, and control costs by assessing, optimizing, and evolving their Microsoft investments, from E3 to E5 to E7 and whatever comes next. <a href="https://www.rkon.com/contact-us/">Contact us today.</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.rkon.com/articles/microsoft-e3-to-e5-to-e7/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CMMC Reality Check: What Assessments Really Look Like and How to Prepare</title>
		<link>https://www.rkon.com/articles/cmmc-reality-check/</link>
					<comments>https://www.rkon.com/articles/cmmc-reality-check/#respond</comments>
		
		<dc:creator><![CDATA[Ramsha Shakeel]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 10:42:43 +0000</pubDate>
				<category><![CDATA[RKON]]></category>
		<guid isPermaLink="false">https://www.rkon.com/?p=6963</guid>

					<description><![CDATA[Cybersecurity Maturity Model Certification (CMMC) assessments are no longer theoretical. For defense contractors across the Defense Industrial Base (DIB), assessments [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Cybersecurity Maturity Model Certification (CMMC) assessments are no longer theoretical. For defense contractors across the Defense Industrial Base (DIB), assessments are happening now and the results are eye‑opening.</p>
<p>In a recent <a href="https://www.youtube.com/watch?v=IoSuKNYYHJQ" target="_blank" rel="noopener">RKON‑hosted webinar</a> with our partners, we unpacked what organizations are learning the hard way: <strong>there is often a significant gap between where companies think they are and what assessors actually validate</strong>. The conversation focused on real assessment experiences, common pitfalls, and what organizations should be doing now to prepare, not just to pass an audit, but to build long‑term security resilience.</p>
<p>Below are the key takeaways every contractor should understand.</p>
<p>&nbsp;</p>
<h2><strong>Learning on the Fly: Why Self</strong>‑<strong>Assessments Fall Short</strong></h2>
<p>Many organizations entered CMMC confident in their self‑assessments. Once formal assessments began, reality set in.</p>
<p><a href="https://www.rkon.com/articles/unlocking-dod-contracts-through-cmmc-compliance/">CMMC third‑party assessors</a> (C3PAOs) conduct <strong>rigorous, evidence</strong>‑<strong>driven evaluations</strong>. They ask questions and request proof that organizations doing self‑assessments often didn’t anticipate. The result? A widespread “reality check” moment where contractors discover meaningful gaps between documented intent and operational reality.</p>
<p>CMMC is not about checking boxes. It’s about proving that controls are implemented, operationalized, and working <strong>over time</strong>.</p>
<p>&nbsp;</p>
<h2><strong>Scoping Is the Foundation—and the Most Common Failure Point</strong></h2>
<p>One of the earliest and most impactful challenges organizations face is <strong>scope definition</strong>.</p>
<p>Key scoping questions assessors expect clear answers to:</p>
<ul>
<li>What is your Controlled Unclassified Information (CUI)?</li>
<li>What systems, users, and processes fall within your assessment boundary?</li>
<li>How does information flow into, through, and out of the boundary?</li>
</ul>
<p>Assessors also evaluate:</p>
<ul>
<li>Authoritative asset inventories</li>
<li>Information flow diagrams</li>
<li>Security and protection assets</li>
<li>External Service Providers (ESPs)</li>
</ul>
<p>These elements are all assessed differently and <strong>must be identified early</strong>. Poor scoping leads to scope creep, expanded evidence requests, delays, and failed assessments.</p>
<p>Your System Security Plan (SSP) becomes the blueprint for the assessment. If documentation, diagrams, and operational reality aren’t telling the same story, assessors will find the disconnect quickly.</p>
<p>&nbsp;</p>
<h2><strong>What Assessors Are Consistently Flagging</strong></h2>
<p>Across industries, assessment teams are seeing the same patterns emerge.</p>
<h3><strong>1. Access Control Gaps</strong></h3>
<p>Common issues include:</p>
<ul>
<li>Incomplete least‑privilege enforcement</li>
<li>MFA not applied consistently</li>
<li>Weak configuration management</li>
</ul>
<p>Tools alone aren’t enough. Assessors need to see <strong>process, enforcement, and review cadence</strong>.</p>
<h3><strong>2. Audit Logging &amp; Monitoring</strong></h3>
<p>One of the biggest gaps for small and mid‑sized organizations:</p>
<ul>
<li>Logs exist but aren’t reviewed regularly</li>
<li>Monitoring isn’t validated or documented</li>
<li>No evidence of continuous review</li>
</ul>
<p>Many organizations cannot demonstrate that their controls function consistently over time. Remember, it’s not about a one-time audit. It’s about having a resilient security posture.</p>
<h3><strong>3. Configuration Drift</strong></h3>
<p>Organizations often deploy security tooling but lack:</p>
<ul>
<li>Drift detection</li>
<li>Change validation</li>
<li>Ongoing review processes</li>
</ul>
<p>By the time auditors arrive, environments are stale, undocumented, or misaligned with the SSP.</p>
<h3><strong>4. Incident Response That Isn’t Operationalized</strong></h3>
<p>Annual tabletop exercises aren’t enough. Assessors expect to see:</p>
<ul>
<li>Regular testing</li>
<li>Documented outcomes</li>
<li>Evidence that lessons learned were incorporated</li>
</ul>
<p>Incident response must be alive, not theoretical.</p>
<h3><strong>5. Cryptography, PHI/PII, and End</strong>‑<strong>of</strong>‑<strong>Life Systems</strong></h3>
<p>Assessments are increasingly strict around:</p>
<ul>
<li>Validated cryptography</li>
<li>Legacy or end‑of‑life systems</li>
<li>Unsupported software still in scope</li>
</ul>
<p>These areas have become particularly “touchy” in recent assessments.</p>
<p>&nbsp;</p>
<h2><strong>The Assessment Lifecycle: What to Expect</strong></h2>
<p>A full <a href="https://www.rkon.com/white-papers/cmmc-a-guide-for-defense-contractors/">CMMC Level 2 assessment</a> typically unfolds in three phases:</p>
<h3><strong>Phase 1: Readiness &amp; Scope Validation</strong></h3>
<ul>
<li>Boundary confirmation</li>
<li>ESP identification</li>
<li>Artifact review</li>
<li>Gaps surfaced early</li>
</ul>
<h3><strong>Phase 2: Fieldwork &amp; Evidence Review</strong></h3>
<ul>
<li>Interviews and demonstrations</li>
<li>Deep technical validation</li>
<li>The most time‑intensive phase</li>
</ul>
<h3><strong>Phase 3: QA &amp; Determination</strong></h3>
<ul>
<li>Final review of all 110 controls</li>
<li>eMASS workflow and submission</li>
<li>Formal determination</li>
</ul>
<p>Timelines vary, but organizations should expect 3–4 months end‑to‑end, with buffers for complexity and scope changes. With <a href="https://www.rkon.com/articles/unlocking-dod-contracts-through-cmmc-compliance/">over 80,000 companies in the DIB</a> and a limited number of C3PAOs, capacity is already a constraint.</p>
<p><strong>Best practice:</strong> Engage <strong>9 months ahead of your target date, minimum. </strong></p>
<p>&nbsp;</p>
<h2><strong>CMMC Is Not a Point</strong>‑<strong>in</strong>‑<strong>Time Event</strong></h2>
<p>One of the most dangerous mindsets we see is “pass the audit and move on.”</p>
<p>CMMC operates on a <strong>three</strong>‑<strong>year reassessment cycle</strong>, with ongoing obligations in between. Drift will happen. M&amp;A will happen. Environments will change.</p>
<p>What matters is:</p>
<ul>
<li>Being honest about changes</li>
<li>Documenting them</li>
<li>Proving controls remain effective</li>
</ul>
<p>Organizations that pause evidence collection after certification are setting themselves up for future failure.</p>
<p>The most successful teams are building <strong>continuous evidence collection</strong>, so audit readiness becomes business‑as‑usual, not a scramble.</p>
<p>&nbsp;</p>
<h2><strong>Looking Ahead: How CMMC Will Evolve</strong></h2>
<p>Over the next 2–3 years, we expect:</p>
<ul>
<li>Broader adoption of CMMC‑like requirements beyond DoD</li>
<li>Civilian agencies applying similar validation logic</li>
<li>Increased supply‑chain enforcement</li>
<li>More rigor around demonstrating control effectiveness</li>
<li>A future Rev 3 transition requiring organizations to evaluate deltas and adapt quickly</li>
</ul>
<p>CMMC isn’t shrinking. The spider web is expanding.</p>
<p>&nbsp;</p>
<h2><strong>Why Pre</strong>‑<strong>Assessments Are Becoming Non</strong>‑<strong>Negotiable</strong></h2>
<p>Given assessor rigor and limited capacity, organizations are increasingly turning to pre‑assessments.</p>
<p>A pre‑assessment with RKON helps organizations:</p>
<ul>
<li>Validate scope before it expands</li>
<li>Identify gaps assessors will flag</li>
<li>Align documentation with reality</li>
<li>Reduce surprises during the formal assessment</li>
</ul>
<p>Think of it as risk reduction, not extra work. This ensures that by the time the auditor comes around, you are confident you can pass.</p>
<p>Many experts see CMMC expanding with civilian agencies beginning to adopt similar frameworks and CMMC-like requirements. It won’t be enough to simply attest to compliance, organizations will need to demonstrate and prove it. Organizations that invest early in strong foundations will have a measurable head start. <a href="https://www.rkon.com/white-papers/cmmc-a-guide-for-defense-contractors/">Learn more in our in-depth whitepaper</a>.</p>
<p>&nbsp;</p>
<h2><strong>The End Goal Isn’t Passing the Audit</strong></h2>
<p>CMMC is ultimately an attestation to something you should already have.</p>
<p>The organizations that succeed aren’t chasing certification they’re building security‑resilient operations. This requires a cultural shift: away from one‑and‑done compliance and toward ongoing operational maturity.</p>
<p>That’s where <a href="https://www.rkon.com/" target="_blank" rel="noopener">RKON</a> comes in. Not just to help you pass an assessment, but to help you operationalize security for the long haul. By November, CMMC requirements will begin showing up in contracts. Meaning if you’re not ready, you’re not just behind… you may be ineligible to win or renew DoD work.</p>
<p>If you’re racing the clock, now is the time to understand where you truly stand. <a href="https://www.rkon.com/contact-us/">Get a pre-assessment today.</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.rkon.com/articles/cmmc-reality-check/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Cost Anomalies Are Security Events: Why FinOps and SecOps Need a Shared Signal</title>
		<link>https://www.rkon.com/articles/ai-cost-anomalies-are-security-events-why-finops-and-secops-need-a-shared-signal/</link>
					<comments>https://www.rkon.com/articles/ai-cost-anomalies-are-security-events-why-finops-and-secops-need-a-shared-signal/#respond</comments>
		
		<dc:creator><![CDATA[Ramsha Shakeel]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 11:18:48 +0000</pubDate>
				<category><![CDATA[RKON]]></category>
		<guid isPermaLink="false">https://www.rkon.com/?p=6932</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>A Bedrock spend spike and an unauthorized InvokeModel call are the same event. One shows up in AWS Cost Anomalies Detection and routes to your <a href="https://www.rkon.com/articles/when-finops-and-security-stop-talking-ai-spend-becomes-unmanaged-risk/">FinOps</a> team via Amazon Simple Notification Service (SNS). The other shows up in CloudTrail and, if you&#8217;ve written the detection logic, routes to your Security Operations Center (SOC). In most organizations I work with, these two signals never meet. The fastest indicator that someone is abusing an AI service in your AWS org is sitting in a billing dashboard your security team doesn&#8217;t watch.</p>
<h2><strong>Two Alerts, No Correlation </strong></h2>
<p><a href="https://docs.aws.amazon.com/cost-management/latest/userguide/manage-ad.html" rel="noopener">AWS Cost Anomaly Detection</a> uses machine learning to flag spend deviations by service, account, or cost allocation tag. When it detects something, it sends a notification through SNS or email to whoever owns the cost monitor. That&#8217;s typically a FinOps engineer or a finance team lead.</p>
<p>Separately, <a href="https://docs.aws.amazon.com/bedrock/latest/userguide/logging-using-cloudtrail.html" rel="noopener">CloudTrail logs every bedrock:InvokeModel, bedrock:Converse, and bedrock:InvokeModelWithResponseStream call</a> as a management event. GuardDuty can flag suspicious patterns like guardrail removal or anomalous access from unfamiliar principals. If you&#8217;ve enabled <a href="https://docs.aws.amazon.com/bedrock/latest/userguide/model-invocation-logging.html" rel="noopener">model invocation logging</a> (which requires explicit opt-in and routes to CloudWatch Logs or S3), you can also capture the request and response payloads.</p>
<p>These are two views of the same activity. One tells you what it cost. The other tells you who did it, from where, and with what permissions. There is no native AWS integration that cross-correlates a cost anomaly alert with the CloudTrail events that generated the spend. Neither team sees both views by default.</p>
<p>FinOps knows spend spiked but can&#8217;t assess whether the access was authorized. Security has the access data but didn&#8217;t know to look because nobody flagged the cost event to them. I wrote about this organizational dynamic in <a href="https://usc-word-edit.officeapps.live.com/we/LINK_TO_ARTICLE_1" rel="noopener">the first piece in this series</a>. This article is about what to do about it at the detection layer.</p>
<p>&nbsp;</p>
<h2><strong>The CloudTrail Gaps Worth Knowing</strong></h2>
<p>CloudTrail gives you the basics for Bedrock: the principal Amazon Resource Name (ARN), the model ID, the source IP, the timestamp. That&#8217;s enough to start an investigation. But there are real gaps that affect detection quality.</p>
<p>In mid-2024, <a href="https://www.sysdig.com/blog/bedrock-slip-sysdig-trt-discovers-cloudtrail-logging-missteps" rel="noopener">Sysdig&#8217;s Threat Research Team found</a> that failed Bedrock API calls logged in the same format as successful ones, without distinct error codes in the CloudTrail record. AWS resolved that specific issue by August 2024 after Sysdig&#8217;s disclosure, but the episode is instructive: security teams should validate CloudTrail log fidelity for newer AI services rather than assuming error codes behave as expected. Splunk has published specific detections for <a href="https://research.splunk.com/cloud/c53a8e62-f741-11ee-9f6e-acde48001122/" rel="noopener">Bedrock access-denied events</a> and for <a href="https://research.splunk.com/cloud/9c5e3d62-f743-11ee-9f6e-acde48001124/" rel="noopener">DeleteModelInvocationLoggingConfiguration</a>, which is an anti-forensics indicator worth monitoring. Someone disabling model invocation logging should always generate an alert.</p>
<p>Model invocation logging itself is not on by default. Without it, you know a model was invoked but not what data was sent to it. For a security team trying to assess data exfiltration risk through a foundation model, that&#8217;s a significant blind spot.</p>
<p>Most SOCs I&#8217;ve assessed have CloudTrail feeding their Security Information and Event Management (SIEM) platform. Very few have written detection rules specifically for Bedrock API patterns. The rules exist in published form, but adoption is low because Bedrock wasn&#8217;t on the threat model when the detection engineering backlog was last prioritized.</p>
<p>&nbsp;</p>
<h2><strong>Cost Anomalies Detection Is Fast but Shallow</strong></h2>
<p>Here&#8217;s what FinOps tooling does well in this context: it catches spend deviations relatively fast. AWS Cost Anomaly Detection runs approximately three times per day against cost data that can lag up to 24 hours, so detection typically occurs within a day of the anomalous spend. For AI services where a single compromised credential can generate thousands of dollars in model invocations in a short window, that&#8217;s still potentially faster than a CloudTrail-based detection in an environment where nobody has written rules for Bedrock API patterns.</p>
<p>Earlier this year, <a href="https://www.sysdig.com/blog/cloud-credentials-to-admin-in-under-10-minutes" rel="noopener">Sysdig&#8217;s Threat Research Team documented an AWS breach</a> where attackers went from an exposed credential in a public S3 bucket to full administrative control in under ten minutes. The privilege escalation phase, credential theft to successful</p>
<p>Lambda execution, took eight minutes. The compromised IAM user had read/write permissions on Lambda and restricted permissions on Bedrock. In a scenario like that, a cost anomaly alert firing on unexpected Bedrock spend could be an early indicator of compromise, particularly in environments where the SOC hasn&#8217;t written Bedrock-specific detection rules.</p>
<p>But Cost Anomaly Detection can tell you that Bedrock spend increased 400% in a specific account. It can&#8217;t tell you whether the IAM role generating that spend should exist. It can&#8217;t tell you the role was attached to a Lambda function reachable from outside the VPC. It can&#8217;t tell you that model invocations included customer data in the prompt. It&#8217;s a financial signal. By itself, it triggers a cost investigation. Paired with CloudTrail context, it triggers a security investigation.</p>
<p>&nbsp;</p>
<h2><strong>Building the Bridge</strong></h2>
<p>The integration doesn&#8217;t require a new product. It requires an EventBridge rule and a routing decision.</p>
<p>When AWS Cost Anomaly Detection flags a spend deviation on AI services (Bedrock, SageMaker, or whatever your org has classified as AI-adjacent), that alert should route to two destinations: the FinOps team&#8217;s existing workflow and a security triage queue. Not as an escalation. As a standing enrichment. The security team&#8217;s first step on receiving that alert is straightforward: pull the CloudTrail events for the flagged service and account over the anomaly window, identify the principals involved, assess whether the access was expected.</p>
<p>Going the other direction, detection rules for InvokeModel volume anomalies in CloudTrail should include cost context. If a principal is generating model invocations at a rate that would produce a meaningful cost event, that should be visible in the detection output. Correlating the two signals turns an ambiguous CloudTrail alert into one with financial impact attached, which changes how it gets prioritized.</p>
<p>At the account level, this means AI workloads need dual-owner alerting from provisioning. When an account is vended for AI experimentation, both a cost monitor (Cost Anomaly Detection, scoped to the account) and a security detection (CloudTrail rules for model invocation APIs, scoped to the account) should be provisioned at the same time. Bolting on one after the other creates the gap this entire series is about.</p>
<p>&nbsp;</p>
<h2><strong>What Changes Operationally</strong></h2>
<p>When these two signal streams connect, triage changes. A FinOps engineer who flags a Bedrock cost spike doesn&#8217;t just tag it to a cost center and close the ticket. They route it for an access review, because that&#8217;s the standing workflow. A security analyst investigating anomalous InvokeModel calls doesn&#8217;t start from zero trying to assess blast radius. They already have the cost data showing financial exposure.</p>
<p>The organizations getting this right aren&#8217;t running exotic tooling. They&#8217;ve made a routing decision: AI service alerts go to both teams, from the moment the account is provisioned. If your cost anomaly alerts and your CloudTrail detections for AI services currently land in different queues with no shared context, that&#8217;s the gap to close first.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element vc_custom_1774413806182">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img loading="lazy" decoding="async" width="150" height="150" src="https://www.rkon.com/wp-content/uploads/2026/03/1690380550986-150x150.jpg" class="vc_single_image-img attachment-thumbnail" alt="" title="1690380550986" srcset="https://www.rkon.com/wp-content/uploads/2026/03/1690380550986-150x150.jpg 150w, https://www.rkon.com/wp-content/uploads/2026/03/1690380550986-300x300.jpg 300w, https://www.rkon.com/wp-content/uploads/2026/03/1690380550986-75x75.jpg 75w, https://www.rkon.com/wp-content/uploads/2026/03/1690380550986.jpg 393w" sizes="auto, (max-width: 150px) 100vw, 150px" /></div>
		</figure>
	</div>
<p style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Author: Jorge P., Senior Security Engineer, RKON</p></div></div></div></div><div class="vc_row wpb_row vc_row-fluid rkon-flip-cols-on-mobile"><div class="wpb_column vc_column_container vc_col-sm-4"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_row wpb_row vc_inner vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-1 vc_hidden-sm vc_hidden-xs"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element wpb_animate_when_almost_visible wpb_fadeInLeft fadeInLeft rkon-animation-delay-3" >
		<div class="wpb_wrapper">
			<i class="fab fa-linkedin"></i>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-11"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element wpb_animate_when_almost_visible wpb_fadeInLeft fadeInLeft rkon-animation-delay-3" >
		<div class="wpb_wrapper">
			<p><a href="https://www.linkedin.com/in/jorge-p-29b334135/" rel="noopener">linkedin.com/in/jorge-p./</a></p>

		</div>
	</div>
</div></div></div></div></div></div></div><div class="wpb_animate_when_almost_visible wpb_fadeInRight fadeInRight wpb_column vc_column_container vc_col-sm-8"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div></div>
</div>]]></content:encoded>
					
					<wfw:commentRss>https://www.rkon.com/articles/ai-cost-anomalies-are-security-events-why-finops-and-secops-need-a-shared-signal/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>When FinOps and Security Stop Talking, AI Spend Becomes Unmanaged Risk</title>
		<link>https://www.rkon.com/articles/when-finops-and-security-stop-talking-ai-spend-becomes-unmanaged-risk/</link>
					<comments>https://www.rkon.com/articles/when-finops-and-security-stop-talking-ai-spend-becomes-unmanaged-risk/#respond</comments>
		
		<dc:creator><![CDATA[Ramsha Shakeel]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 10:41:45 +0000</pubDate>
				<category><![CDATA[RKON]]></category>
		<guid isPermaLink="false">https://www.rkon.com/?p=6930</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Here&#8217;s a scenario that&#8217;s becoming more common than most teams want to admit.</p>
<p>A <a href="https://www.rkon.com/articles/ai-cost-anomalies-are-security-events-why-finops-and-secops-need-a-shared-signal/">cost anomaly</a> alert fires late on a Tuesday. AWS Bedrock spend spiked 340% in a single account over 72 hours. The FinOps engineer traces it to a Lambda function attached to an IAM role with broad model invocation permissions. Nobody on the team recognizes the role. They escalate to Security. Security asks who provisioned it. Nobody knows. The account was inherited eight months ago during an acquisition and never fully inventoried.</p>
<p>That&#8217;s a FinOps problem, a security incident, and an AI governance failure all at once. Most organizations aren&#8217;t structured to treat it as all three simultaneously, and that&#8217;s where the risk compounds.</p>
<p>&nbsp;</p>
<h2><strong>The Org Chart Didn&#8217;t Anticipate AI</strong></h2>
<p>The separation of FinOps and Security made sense when the infrastructure was predictable. FinOps owned cost visibility, tagging hygiene, and rightsizing. Security owned IAM, detective controls, and compliance posture. For EC2, RDS, and S3 workloads, these lanes rarely collided in meaningful ways.</p>
<h3><strong>AI services broke that assumption quietly.</strong></h3>
<p>An over-permissioned IAM role attached to a Bedrock endpoint is both a security finding and an uncapped cost exposure. An untagged SageMaker experiment is a workload running outside your threat model that nobody is tracking spend on. A foundation model accessible to an externally-invocable function is a data egress vector and a budget liability that nobody explicitly approved.</p>
<p>Every AI service misconfiguration has two blast radii. One is measured in dollars. The other is measured in data. Most organizations have a team watching each, but nobody watching both at the same time.</p>
<p>&nbsp;</p>
<h2><strong>Shadow AI Is Already Inside Your AWS Org</strong></h2>
<p>This isn&#8217;t a future problem. It&#8217;s already happening in environments I&#8217;ve worked in across PE-backed and enterprise AWS organizations.</p>
<p>Developers are experimenting with Bedrock, SageMaker, and third-party model APIs directly in non-production accounts. Those accounts frequently carry permissive <a href="https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html" rel="noopener">Service Control Policies (SCPs)</a> inherited from early-stage growth or a pre-acquisition baseline that nobody revisited. AI services were never included in the tagging strategy because nobody anticipated needing to. FinOps dashboards aren&#8217;t surfacing model invocations with the same visibility as compute spend. Security teams aren&#8217;t writing detection logic for bedrock:InvokeModel the way they&#8217;d write rules for anomalous S3 access.</p>
<p>The assumptions quietly baked into this: AI spend is too small to govern yet. Bedrock is a managed service so the security surface is Amazon&#8217;s problem. Developers aren&#8217;t using foundation models in production because nobody submitted a budget request.</p>
<p>All three of those assumptions are wrong in most environments I&#8217;ve assessed.</p>
<p>&nbsp;</p>
<h2><strong>Where Convergence Actually Matters</strong></h2>
<p>A shared accountability model, applied to a specific class of infrastructure that neither team currently owns cleanly. Not a new tool. Not a reorganization.</p>
<p><strong>Visibility has to be symmetric</strong>. <a href="https://docs.aws.amazon.com/cost-management/latest/userguide/manage-ad.html" rel="noopener">Cost anomaly alerts</a> on AI services should automatically trigger a security review threshold alongside the budget notification. If FinOps sees a spike in Bedrock invocations, Security should be in that conversation by default, as a standing workflow rather than an escalation. Tag enforcement for AI services needs joint authorship. Right now it&#8217;s typically a FinOps initiative that Security never signed off on.</p>
<p><strong>IAM is a cost control</strong>. Least-privilege access to AI services directly limits cost exposure. An IAM principal that can only invoke one specific model in one specific account can&#8217;t generate runaway spend across your org. Unused model access permissions are simultaneously a security finding and a FinOps finding. Treating them as only one or the other means half the organization never sees them.</p>
<p><strong>The account boundary is your best governance primitive</strong>. AI workloads should live in dedicated accounts with an explicit cost owner and an explicit security owner, two people who have both agreed they&#8217;re responsible. Account vending for AI experimentation needs guardrails at provisioning time: budget thresholds, SCPs scoped to approved model access, egress controls active from day one. Retrofitting governance onto an account after spend has already appeared is governance that consistently arrives too late.</p>
<p>&nbsp;</p>
<h2><strong>What Leadership Usually Gets Wrong</strong></h2>
<p>&#8220;We&#8217;ll govern AI workloads once they reach production.&#8221;</p>
<p>By that point the IAM roles are already months old, the tagging debt is structural, and the cost baseline was never established cleanly. The window to set governance boundaries is at provisioning, not at promotion.</p>
<p>&#8220;Our FinOps tool will catch runaway AI spend.&#8221;</p>
<p>FinOps tooling tells you that spend happened. It doesn&#8217;t tell you whether the principal that generated it should have had access at all. Cost anomaly detection and access governance are different signals. They need different owners. The problem is that right now, in most organizations, neither team is watching both signals simultaneously.</p>
<p>&nbsp;</p>
<h2><strong>The Real Ask</strong></h2>
<p>The enterprises handling this well aren&#8217;t doing anything exotic. They&#8217;ve extended a principle that works everywhere else in mature cloud governance: the account boundary is the unit of ownership, and ownership means someone is accountable for both what it costs and what it can access.</p>
<p>AI just makes the cost of skipping that step visible faster than anything that came before it.</p>
<p>If your FinOps and Security teams aren&#8217;t in the same room when AI services get provisioned, they probably need to be. Not because of a compliance mandate. Because the blast radius when they aren&#8217;t is bigger than most organizations have priced in.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element vc_custom_1774413806182">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img loading="lazy" decoding="async" width="150" height="150" src="https://www.rkon.com/wp-content/uploads/2026/03/1690380550986-150x150.jpg" class="vc_single_image-img attachment-thumbnail" alt="" title="1690380550986" srcset="https://www.rkon.com/wp-content/uploads/2026/03/1690380550986-150x150.jpg 150w, https://www.rkon.com/wp-content/uploads/2026/03/1690380550986-300x300.jpg 300w, https://www.rkon.com/wp-content/uploads/2026/03/1690380550986-75x75.jpg 75w, https://www.rkon.com/wp-content/uploads/2026/03/1690380550986.jpg 393w" sizes="auto, (max-width: 150px) 100vw, 150px" /></div>
		</figure>
	</div>
<p style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Author: Jorge P., Senior Security Engineer, RKON</p></div></div></div></div><div class="vc_row wpb_row vc_row-fluid rkon-flip-cols-on-mobile"><div class="wpb_column vc_column_container vc_col-sm-4"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_row wpb_row vc_inner vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-1 vc_hidden-sm vc_hidden-xs"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element wpb_animate_when_almost_visible wpb_fadeInLeft fadeInLeft rkon-animation-delay-3" >
		<div class="wpb_wrapper">
			<i class="fab fa-linkedin"></i>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-11"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element wpb_animate_when_almost_visible wpb_fadeInLeft fadeInLeft rkon-animation-delay-3" >
		<div class="wpb_wrapper">
			<p><a href="https://www.linkedin.com/in/jorge-p-29b334135/" rel="noopener">linkedin.com/in/jorge-p./</a></p>

		</div>
	</div>
</div></div></div></div></div></div></div><div class="wpb_animate_when_almost_visible wpb_fadeInRight fadeInRight wpb_column vc_column_container vc_col-sm-8"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div></div>
</div>]]></content:encoded>
					
					<wfw:commentRss>https://www.rkon.com/articles/when-finops-and-security-stop-talking-ai-spend-becomes-unmanaged-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ARC-AMPE&#8217;s First Deadline Passed. Why Most Organizations Aren’t Ready for the Second.</title>
		<link>https://www.rkon.com/articles/arc-ampes-second-deadline-readiness/</link>
					<comments>https://www.rkon.com/articles/arc-ampes-second-deadline-readiness/#respond</comments>
		
		<dc:creator><![CDATA[Ramsha Shakeel]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 09:39:40 +0000</pubDate>
				<category><![CDATA[RKON]]></category>
		<guid isPermaLink="false">https://www.rkon.com/?p=6928</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<h2>ARC-AMPE&#8217;s Second Deadline</h2>
<p>The Centers for Medicare &amp; Medicaid Services (CMS) published ARC-AMPE (Acceptable Risk Controls for ACA, Medicaid, and Partner Entities) a year ago as a replacement for MARS-E, which is now deprecated. Administering Entities (AEs), state-based health insurance marketplaces and Medicaid agencies had until March 4, yet industry assessors were flagging widespread readiness gaps leading up to the deadline. Direct Enrollment Entities (DEEs), insurers and web brokers, have until the end of June to comply with 308 controls. The NIST revision jump and restructuring of control families broke the old mapping. If your organization is treating ARC-AMPE&#8217;s second deadline as a documentation migration, you’re underestimating what changed under the hood.</p>
<h2><strong>What Changed and Why It Matters for Cloud Environments</strong></h2>
<p>ARC-AMPE replaced MARS-E v2.2. The AE baseline is 402 controls. The DEE baseline is 308. Both are derived from NIST SP 800-53 Revision 5. Four changes have real architectural implications for organizations running Affordable Care Act (ACA) or Medicaid workloads in AWS, GCP, or hybrid environments.</p>
<h3><strong>Data residency is now explicit</strong></h3>
<p>All data processing and storage must happen within U.S. legal jurisdiction. For cloud environments, this means region-locking, verifying that managed services don&#8217;t replicate data outside U.S. regions, and documenting data residency controls. SA-9(8), Processing and Storage Location, is explicitly in the ARC-AMPE baseline. Organizations using multi-region or global cloud configurations need to prove containment.</p>
<h3><strong>Cloud-specific controls are gone</strong></h3>
<p>Previously, MARS-E maintained separate control expectations for cloud vs. on-premises environments. ARC-AMPE applies uniformly. If you were relying on a lighter control set for your cloud workloads, that distinction no longer exists.</p>
<h3><strong>The PT control family is entirely new</strong></h3>
<p>Ten Personally Identifiable Information Processing and Transparency (PT) controls covering consent, privacy notices, PII processing purposes, Social Security Number handling, and revocation rights. This family didn&#8217;t exist in MARS-E because it didn&#8217;t exist in NIST 800-53 Rev 4. These are enforceable privacy controls that need to be implemented at the infrastructure and application layer, not just documented in a policy binder.</p>
<h3>Supply Chain Risk Management is now required</h3>
<p>SR controls mandate vendor oversight for cloud service providers, managed services, and SaaS tooling used in ACA and Medicaid environments. Documented risk assessments for every vendor in the chain, with contractual security requirements and ongoing monitoring.</p>
<h2><strong>The Reciprocity Advantage Most Organizations Are Missing </strong></h2>
<p>ARC-AMPE is 402 controls from NIST 800-53 Rev 5. <a href="https://www.fedramp.gov/" rel="noopener">FedRAMP</a> High is 410. The overlap is substantial, and most organizations aren&#8217;t mapping it.</p>
<p>We ran the analysis. An organization with an existing FedRAMP Moderate authorization already satisfies 292 of the 402 ARC-AMPE AE controls. That&#8217;s 73% coverage before doing any ARC-AMPE-specific work. FedRAMP High covers 302 of 402, or 75%. The numbers for GovRAMP are nearly identical: GovRAMP Moderate maps to 292 ARC-AMPE controls, GovRAMP High maps to 302.</p>
<p>The remaining gap from FedRAMP High is 100 controls, and it concentrates in specific areas. Twenty-eight are Program Management (PM) family controls: organizational governance like risk management strategy, insider threat programs, security workforce planning, and system inventory. These are documentation-heavy but not technically complex. Ten are the entirely new PT family, none of which appear in any FedRAMP baseline. Roughly a dozen more are PII-related controls scattered across other families (SI, SC, AU, SA, CM, AT), covering data minimization, de-identification, disposal, and quality operations. Seven are SA-8 security engineering principle enhancements. Six are maintenance controls.</p>
<p>The practical implication: an organization with FedRAMP Moderate posture doesn&#8217;t have a 402-control problem. It has a 110-control problem, concentrated in privacy governance and program management documentation. That&#8217;s a fundamentally different compliance project than starting from zero, and it should be scoped accordingly.</p>
<p>State Medicaid agencies and health insurance marketplaces that have done any 800-53-based compliance work, whether for FedRAMP, GovRAMP, or other federal requirements, are sitting on evidence and control implementations that directly satisfy ARC-AMPE. The organizations that treat ARC-AMPE as a standalone assessment are duplicating efforts they&#8217;ve already completed.</p>
<h3>How Organizations Can Prepare Now</h3>
<p>Regardless of where you are in the timeline: run a reciprocity analysis against any existing 800-53 compliance work before scoping net-new effort. Map your data residency controls early, since region-locked cloud environments close multiple ARC-AMPE requirements at once. Build your System Security and Privacy Plan (SSPP) in the new ARC-AMPE Excel template from the start. CMS replaced the old Word format, and converting later breaks every documentation workflow.</p>
<h3>Risks of Missing ARC-AMPE&#8217;s Second Deadline</h3>
<p>File a realistic Plan of Action and Milestones (POA&amp;M) with CMS. Prioritize the PT and SR control families first, since those have no MARS-E predecessor to map from and represent the largest net-new implementation effort. If you have existing 800-53 compliance work from FedRAMP, GovRAMP, or other federal frameworks, you likely already satisfy 70-75% of the baseline. Don&#8217;t start from scratch.</p>
<h3><strong>DEEs facing the June deadline</strong></h3>
<p>Three months is tight for 308 controls. Start with a gap assessment against the DEE baseline specifically. Identify which controls you already meet through existing HIPAA or SOC 2 work.</p>
<h3>Conclusion</h3>
<p>RKON helps organizations running ACA and Medicaid workloads in AWS and GCP close the ARC-AMPE gap. We maintain cross-framework compliance tooling that maps existing control implementations to ARC-AMPE requirements, so you&#8217;re building on evidence you already have rather than starting over. If your team is facing the June deadline or remediating after March, <a href="https://www.rkon.com/contact-us/">reach out</a>.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element vc_custom_1774413806182">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img loading="lazy" decoding="async" width="150" height="150" src="https://www.rkon.com/wp-content/uploads/2026/03/1690380550986-150x150.jpg" class="vc_single_image-img attachment-thumbnail" alt="" title="1690380550986" srcset="https://www.rkon.com/wp-content/uploads/2026/03/1690380550986-150x150.jpg 150w, https://www.rkon.com/wp-content/uploads/2026/03/1690380550986-300x300.jpg 300w, https://www.rkon.com/wp-content/uploads/2026/03/1690380550986-75x75.jpg 75w, https://www.rkon.com/wp-content/uploads/2026/03/1690380550986.jpg 393w" sizes="auto, (max-width: 150px) 100vw, 150px" /></div>
		</figure>
	</div>
<p style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Author: Jorge P., Senior Security Engineer, RKON</p></div></div></div></div><div class="vc_row wpb_row vc_row-fluid rkon-flip-cols-on-mobile"><div class="wpb_column vc_column_container vc_col-sm-4"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_row wpb_row vc_inner vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-1 vc_hidden-sm vc_hidden-xs"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element wpb_animate_when_almost_visible wpb_fadeInLeft fadeInLeft rkon-animation-delay-3" >
		<div class="wpb_wrapper">
			<i class="fab fa-linkedin"></i>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-11"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element wpb_animate_when_almost_visible wpb_fadeInLeft fadeInLeft rkon-animation-delay-3" >
		<div class="wpb_wrapper">
			<p><a href="https://www.linkedin.com/in/jorge-p-29b334135/" rel="noopener">linkedin.com/in/jorge-p./</a></p>

		</div>
	</div>
</div></div></div></div></div></div></div><div class="wpb_animate_when_almost_visible wpb_fadeInRight fadeInRight wpb_column vc_column_container vc_col-sm-8"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div></div>
</div>]]></content:encoded>
					
					<wfw:commentRss>https://www.rkon.com/articles/arc-ampes-second-deadline-readiness/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Responsible AI in the Cloud: A High-Level Guide to AI Governance and Security</title>
		<link>https://www.rkon.com/articles/responsible-ai-in-the-cloud-a-high-level-guide-to-ai-governance-and-security/</link>
					<comments>https://www.rkon.com/articles/responsible-ai-in-the-cloud-a-high-level-guide-to-ai-governance-and-security/#respond</comments>
		
		<dc:creator><![CDATA[Ramsha Shakeel]]></dc:creator>
		<pubDate>Wed, 18 Mar 2026 11:17:22 +0000</pubDate>
				<category><![CDATA[RKON]]></category>
		<guid isPermaLink="false">https://www.rkon.com/?p=6916</guid>

					<description><![CDATA[Just as the rise of the cloud reshaped enterprise security a decade ago, AI in the cloud is now forcing [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Just as the rise of the cloud reshaped enterprise security a decade ago, AI in the cloud is now forcing leaders to rethink governance at a rapid pace. The scalability that makes the cloud the natural home for AI also makes it dangerous if left unchecked, fueling shadow AI projects, exposing sensitive data, and creating compliance blind spots.</p>
<p>The answer isn’t to slow innovation, but to secure it. Responsible AI provides the balance point, embedding <a href="https://www.rkon.com/enterprise-services/security-services/grc/">governance, risk</a> management, and data protection into every stage of the AI lifecycle. For cloud security leaders, guardrails aren’t optional. Guardrails are the foundation for protecting data, maintaining trust, and enabling growth at scale.</p>
<h2><strong>Why Responsible AI Is Essential for Cloud Innovation</strong></h2>
<p>AI in the cloud delivers unmatched scalability and speed, enabling organizations to innovate faster than ever before. However, those same advantages also expand the risk surface. When AI is deployed without governance, it can introduce vulnerabilities that compromise data integrity and business continuity.</p>
<p>The consequences of weak guardrails are already clear:</p>
<ul>
<li>Data leakage exposing proprietary or regulated information.</li>
<li>Compliance violations leading to fines, regulatory scrutiny, or blocked operations. · Reputational damage that erodes customer trust and slows AI adoption.</li>
</ul>
<p>Responsible AI flips the equation. By embedding trust, accountability, and compliance into the AI lifecycle, organizations can harness the power of the cloud without sacrificing security or slowing innovation.</p>
<h2><strong>Three Guardrails for Secure, Responsible AI in the Cloud</strong></h2>
<p>Responsible AI in the cloud isn’t theory, it’s practice. Enterprises need AI landing zones: secure environments with governance, risk management, and data protection built into daily operations.</p>
<p>At RKON, we see three pillars as essential: governance, risk management, and data protection. Together, they create the foundation for AI that is innovative, secure, and trusted.</p>
<p>But building guardrails isn’t a one-time project. Policies, risks, and data protections must be continually reinforced over time. As AI evolves, so do the threats and compliance requirements. Responsible AI requires continuous governance, not a “set it and forget it” approach.</p>
<h3><strong>1. AI Governance in the Cloud</strong></h3>
<p>Shadow AI projects spread quickly without governance, introducing risk and inconsistency throughout an organization. Governance establishes the boundaries for how AI is utilized, ensuring that innovation aligns with expectations of compliance, trust, and security.</p>
<p>Best practices include:</p>
<ul>
<li>Establishing policies and standards tailored to cloud AI use cases.</li>
<li>Leveraging frameworks such as the NIST AI RMF, Microsoft Responsible AI, ISO 42001, and Google Responsible AI.</li>
<li>Embedding accountability into every stage of the AI lifecycle—from development to deployment.</li>
</ul>
<p>Governance is not static. Defining standards is only the first step; those standards must be monitored, tested, and adapted as AI capabilities advance. Responsible AI means evolving your guardrails as fast as the technology itself evolves.</p>
<h3><strong>2. AI Risk Management in Enterprises</strong></h3>
<p>AI introduces risks that traditional security models can’t fully anticipate. Shadow AI projects, data misuse, biased models, and compliance gaps don’t just create technical vulnerabilities; they erode customer trust, attract regulatory scrutiny, and put business continuity at risk.</p>
<p>Effective risk management means taking a proactive, ongoing approach:</p>
<ul>
<li>Performing regular AI-specific risk assessments.</li>
<li>Enforcing access controls and least-privilege policies for AI systems.</li>
<li>Implementing continuous monitoring to detect unusual or high-risk activity.</li>
<li>Aligning AI risk management directly with broader cloud security programs.</li>
</ul>
<p>Risk management is never a one-time audit. New AI capabilities introduce new attack surfaces and compliance challenges at a pace traditional controls can’t match.</p>
<p>Responsible AI requires continuous oversight, enabling organizations to stay ahead of risks instead of reacting to them after the damage is already done.</p>
<h3><strong>3. Protecting Data in AI Workflows</strong></h3>
<p>AI is only as trustworthy as the data it’s built on. If sensitive or regulated information leaks into training sets, inference outputs, or third-party AI models, the damage can be immediate — from regulatory penalties to long-term erosion of customer trust. For enterprises in regulated industries, the stakes couldn’t be higher.</p>
<p>Practical data protection strategies include:</p>
<ul>
<li>Classifying data to identify and prioritize sensitive information.</li>
<li>Encrypting data at rest and in transit to prevent unauthorized access.</li>
<li>Embedding privacy-by-design principles into AI workflows.</li>
<li>Preventing regulated or proprietary data from flowing into external AI systems.</li>
</ul>
<p>When it comes to AI, data protection is never “finished.” Every new dataset or integration introduces fresh risks that require active defense. As models evolve and datasets expand, data protection controls must evolve with them.</p>
<p>Responsible AI requires continuous testing, validation, and refinement of these safeguards. Ensuring that data remains secure, compliant, and trustworthy throughout the AI lifecycle.</p>
<h2><strong>How RKON Helps Enterprises Adopt Responsible AI</strong></h2>
<p>Adopting Responsible AI in the cloud requires more than policies — it demands deep expertise across security, compliance, and engineering. RKON helps enterprises establish guardrails, enabling them to innovate with confidence and security.</p>
<p>Here’s how we partner with clients:</p>
<ul>
<li>Expertise across cloud, security, compliance, and code Our team blends technical expertise with regulatory knowledge, so your AI adoption is innovative and regulator-ready.</li>
<li>Building AI landing zones with governance and guardrails We build AI landing zones, providing secure foundations for AI adoption that give your teams the freedom to innovate quickly without losing alignment with organizational policies.</li>
<li>Aligning with industry and regulatory frameworks From NIST AI RMF to cloud provider guidelines, we map Responsible AI practices to the frameworks your board, regulators, and customers expect.</li>
<li>Delivering prescriptive, preventative, and future-proof solutions Our approach emphasizes preventative controls and future-ready architectures, so today’s AI adoption doesn’t become tomorrow’s technical debt.</li>
</ul>
<p>By combining governance, risk management, and data protection, RKON enables organizations to accelerate AI adoption with confidence, allowing for innovation without introducing unnecessary risk.</p>
<h2><strong>Put Responsible AI Into Practice Today</strong></h2>
<p>Responsible AI in the cloud isn’t optional; it’s the foundation for sustainable innovation. Organizations risk data leakage, compliance violations, and reputational damage without guardrails. However, with the proper guardrails in place, enterprises can confidently embrace AI that drives efficiency, growth, and trust.</p>
<p>By embedding governance, risk management, and data protection into every stage of the AI lifecycle, cloud security teams ensure that innovation never comes at the expense of accountability. Responsible AI is the new seatbelt for cloud innovation, invisible when done right and critical when things go wrong.</p>
<p><a href="https://www.rkon.com/">RKON</a> helps enterprises take this proactive approach by delivering prescriptive, preventative, and future-proof solutions that make Responsible AI not just possible, but practical.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.rkon.com/articles/responsible-ai-in-the-cloud-a-high-level-guide-to-ai-governance-and-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What the Stryker Breach Should Tell Every CISO About Identity</title>
		<link>https://www.rkon.com/articles/what-the-stryker-breach-should-tell-every-ciso-about-identity/</link>
					<comments>https://www.rkon.com/articles/what-the-stryker-breach-should-tell-every-ciso-about-identity/#respond</comments>
		
		<dc:creator><![CDATA[Ramsha Shakeel]]></dc:creator>
		<pubDate>Wed, 18 Mar 2026 10:56:26 +0000</pubDate>
				<category><![CDATA[RKON]]></category>
		<guid isPermaLink="false">https://www.rkon.com/?p=6914</guid>

					<description><![CDATA[On March 11, a Fortune 500 medical device company had its entire IT environment wiped. This wasn’t caused by ransomware [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>On March 11, a Fortune 500 medical device company had its entire IT environment wiped. This wasn’t caused by ransomware or a rare zero-day exploit. Instead, an Iran-linked group called Handala somehow gained access to Stryker’s Microsoft Intune admin credentials and triggered a remote wipe. Over 200,000 devices in nearly 80 countries were erased at once—laptops, phones, servers, and even personal devices enrolled through BYOD. The attackers also defaced Entra login pages with their logo. Stryker reported the incident to the SEC the same day. It was a nightmare scenario.</p>
<p>There was no malware involved, and no firewall appears to have been breached in the usual way. The attackers gained privileged access to a central identity and device management console and used its legitimate admin features to carry out the attack. Every action looked like it came from an authorized administrator. Take a moment to let that sink in, then keep reading.</p>
<p>This is exactly the kind of scenario I described in my recent paper, “Identity as the Security Control Plane: Why 2025 Was the Year We Finally Admitted the Network Isn’t in Charge Anymore.” The Stryker incident isn’t a rare exception—it’s proof of my main point, demonstrated by an attacker in real time. Not exactly the validation I wanted.</p>
<h2><strong>Identity Is the Battleground. Stryker Proves It.</strong></h2>
<p>We’ve spent years strengthening network perimeters, adding endpoint detection tools, and running phishing simulations—and we still need to do those things. But attackers have changed tactics. They no longer need to break down our defenses if they can use valid credentials to get in. Stryker is the latest example. The attackers didn’t exploit a flaw in Intune; they took over a Global Administrator account and used a built-in feature to wipe devices. This is what &#8216;living off the land&#8217; means when your identity infrastructure is the target. Endpoint detection tools won’t easily catch a legitimate remote wipe command from an authorized admin console. Even if you monitor for it, the alerts can quickly become overwhelming. This attack happened entirely within the identity layer.</p>
<p>In 2025, credential-based attacks made up 22% of all <a href="https://www.rkon.com/enterprise-services/security-services/security-breach-recovery/">breaches</a>, surpassing every other way attackers first get in. Identity-based attacks increased by 82% year over year. The pattern is clear: attackers steal credentials, use trust relationships, move laterally with legitimate access, and carry out their attack while pretending to be authorized users. That’s exactly what happened to Stryker. In this case, it seems they skipped moving laterally and went straight for the main target, but we’ll learn more as details emerge.</p>
<h2><strong>Uncomfortable Questions</strong></h2>
<p>If you’re a CISO, the Stryker breach should make you pause and think. How many Global Administrator accounts do you have in your Microsoft environment? Are they protected with phishing-resistant MFA, or are you still using push notifications that can be tricked? Do you require more than one person to approve destructive actions like mass device wipes? Could one compromised account bring down your whole organization tomorrow? These are real questions now, not just hypotheticals.</p>
<p>The Stryker breach proved that a compromised identity can be more damaging than malware. No malicious code was needed. One key opened one door; the platform handled the rest. Stryker is a $25 billion company with 56,000 employees, yet their identity controls failed. Are you confident yours wouldn’t? Unless you invest carefully and stay focused, you probably shouldn’t be.</p>
<h2><strong>What You Should Be Doing About It</strong></h2>
<p>My full paper goes into these points in detail, but the Stryker breach highlights a few key recommendations. Use phishing-resistant MFA for every privileged account, or better, for everyone. FIDO2 passkeys and hardware security keys tie authentication to specific devices and require physical confirmation. Set up privileged access management with just-in-time elevation and require more than one person to approve major actions. No single account should be able to wipe out all devices without oversight. If one compromised admin credential can wipe 200,000 devices, those controls are missing or not set up for this situation. Both issues can be fixed.</p>
<p>Many of us have seen MDM and UEM platforms as just operational tools, not as critical as domain controllers or identity providers. That thinking has to change. The Stryker attack showed that device management platforms are a central control point. If attackers get in, these platforms can be turned into powerful weapons.</p>
<p>Focus on building identity-aware resilience. Backup infrastructure credentials must live in a separate identity domain. If your backup admin accounts are in the same Entra ID tenant that was compromised, your recovery plan won’t work.</p>
<h2><strong>The Bigger Picture</strong></h2>
<p>The world is unsettled, and Stryker was targeted by a nation-state actor as a geopolitical statement. But the mechanism, identity compromise leading to administrative abuse, is identical to what financially motivated criminals and ransomware operators use all the time. Geopolitics is the headline. Identity failure is the lesson.</p>
<p>We’ve reached a turning point. Identity is now the real control plane for security, whether we’ve invested in it or not. The Stryker breach is a clear reminder of the difference between understanding this and actually putting it into practice.</p>
<p>I wrote the full paper because CISOs need a practical, evidence-based framework to move toward identity-first security. It covers topics like phishing-resistant MFA, building identity-aware resilience, simplifying detection, managing vendor risk, and governing AI and SaaS. If the Stryker case makes you think you have work to do, you probably do. Read the paper and start making changes.</p>
<p>Focus on real solutions. Strengthen your defenses where attacks are actually happening.</p>
<h2><strong>A Note on the Use of AI in This Document</strong></h2>
<p>This document, its outline, opinions, and initial verbiage were created manually. AI tools were used in editing, research, and refinement of this document for readability.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.rkon.com/articles/what-the-stryker-breach-should-tell-every-ciso-about-identity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
