SlideShare uma empresa Scribd logo
1 de 30
Securing your Data on AWS
Presenters
• Patrick McDowell- Solutions Architect, AWS
• Josh Goldfarb - VP, CTO - Emerging Technologies, FireEye
• Paul Lee - Senior Deployment Engineer – TAP, FireEye
$6.53M 56% 70%
Increase in theft of hard
intellectual property
Of consumers indicated
they’d avoid businesses
following a security breach
Average cost of a
data breach
Your Data and IP are your Most Valuable Assets
https://www.csid.com/resources/stats/data-breaches/ http://www.pwc.com/gx/en/issues/cyber-
security/information-security-survey.html
https://www.csid.com/resources/stats/data-breaches/
In June 2015, IDC released a report which found that most customers
can be more secure in AWS than their on-premises environment. How?
Automating logging
and monitoring
Simplifying
resource access
Making it easy to
encrypt properly
Enforcing strong
authentication
AWS Can Be More Secure than your Existing
Environment
AWS and you share responsibility for security
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure
Regions
Availability Zones
Edge Locations
Identity &
Access Control
Network
Security
Customer applications & content
You get to
define your
controls ON
the Cloud
AWS takes
care of the
security OF
the Cloud
You
Inventory
& Config
Data
Encryption
Constantly monitored
The AWS infrastructure is protected by extensive network and security
monitoring systems:
• Network access is monitored by AWS
security managers daily
• AWS CloudTrail lets you monitor
and record all API calls
• Amazon Inspector automatically assesses
applications for vulnerabilities
Highly available
The AWS infrastructure footprint protects your data from costly downtime
• 35 Availability Zones in 13 regions for
multi-synchronous geographic redundancy
• Retain control of where your data resides
for compliance with regulatory requirements
• Mitigate the risk of DDoS attacks using
services like AutoScaling, Amazon Route 53
Integrated with your existing resources
AWS enables you to improve your security using many of your existing
tools and practices
• Integrate your existing Active Directory
• Use dedicated connections as a secure,
low-latency extension of your data center
• Provide and manage your own encryption
keys if you choose
Key AWS certifications and assurance programs
Threat Analytics Platform
Overview
Presented by:
Josh Goldfarb, VP, CTO - Emerging Technologies
Paul Lee, Senior Deployment Engineer - TAP
Cloud-based Threat Detection and Incident Investigation
What’s at Risk?
of organizations were
breached
Source: Mandiant M-trends Report / Ponemon Cost Of Data Breach Study
Cyber Security’s Maginot line: A Real-World Assessment of the Defense-in-Depth Model
had active command and
control communications
median number of days
before detection
to respond to a breach
of companies learned they
were breached from an
external entity
97%
146 days
3/4 53%
32 days
SIEM
 Built for Compliance
– not Security
 ‘Newly found’ “Analytics love is
really old “SIEM hatred” Anton
Chuvakin Jan 2015
 Average 15.2 months fully
implement, Ponemon 2015
 Implementation costs 3-5x
software expenditure, Ponemon
2015, FireEye Customer.
MSSP
 Built for operational efficiency
– not Security
 One size fits all – they don’t
know your environment
 No custom rules
 Onboarding can be complex
and slow
 Present alerts but don’t tell you
how to respond
Traditional Detection Strategies Aren’t Working
Capability
Investigation &
response
Proactive
hunting
Adaptive
detection
Compliance
Moving from Compliance to Proactive Security
Cyber security program maturity. Where do you fall?
Time
Security operations center Cyber incident response team Cyber defense center
Overwhelmed by
alert noise
–
Alerts lack context
Inability to proactively
hunt for covert,
non-malware
Lack of Visibility Hard to find, train and
retain Security Talent
Investigation tools are
expensive, complex
and don’t easily scale
What’s Holding you Back?
Threat detection Analyst enablement
Visibility
 Real-time, enterprise-wide visibility
 Ingest AWS logs including AWS
CloudTrail and VPC flow logs
 Customizable views
 Threat Intel sharing portal
Investigation
 Alerts enriched with supporting data
 Threat intelligence and point-in-time
context about users affected, actions
taken and hosts involved
 Guided Investigation leads you
through industry-leading
investigative strategies
Detection
 Dedicated rules team evolves
detection to respond to new threats
 Continuous application of threat
insight to identify attack and
provide context
 Intel and rules evaluated against
every event
Time to value
 Cloud-based infrastructure
 Simplified deployment and management
 Focus on managing incidents – not
your tools
FireEye’s Threat Analytics Platform
Cloud-based threat detection and investigation
 Single interface gives analysts
visibility into both cloud and
datacenter resources
 One tool for hunting, alerting,
investigating, and responding.
 Customizable views ensure
analysts can quickly see what's
most important
 Pivot directly from dashboard into
investigation to detect and
respond to incidents more quickly
 Control what you share and with
whom you share it either openly or
anonymously
 Auto-extract IOC’s from documents
and supports exporting in multiple
standard formats
Unified
Single pane of glass
Dashboards
Customizable views
Sharing
Threat Intel sharing portal
Real-time, Enterprise-wide Visibility
 Detects non-malware attacker
methodology as well as malware
family behavior
 Dedicated team of data scientists
and security researchers continually
refine detection ruleset
 Heuristic-based detection
identifies previously unknown
attacker behavior
 Focused on non-malware activity
such as lateral movement &
exfiltration
 Threat intelligence gleaned from
the front lines
 Domains, IP addresses, email
addresses, MD5 hashes
Rules
Codifies 20+ years of security
expertise
Analytics
Detects non-malware based
activity
INDICATORS
Tactical, strategic, and
operational intelligence
Detection that Evolves with Your Attackers
Where Does Our Intel Come From?
FireEye Sensors
3,400+ customers
250+ of the Fortune 500
67 countries
Mandiant
1,200+ customers
200+ of the Fortune 500
46 countries with customers
iSight
20 locations worldwide
18 countries
100+ experts
FaaS
7 security operations centers
200+ clients
26+ million hits reviewed in 2015
 Alerts enriched with detailed
attacker context
 Point-in-time context regarding
users impacted, actions taken and
hosts involved
 Quickly validate and scope the
incident.
 Easily pivot around indicators of
compromise
 Perform frequency analysis to
spot anomalies
 Scheduled search automates
analysis activities
 Industry-leading investigative
strategies
 Sets of queries, based on different
attack scenarios.
 Scenarios provides pre-populated,
questions and answers to help guide
investigation efforts
Actionable Threat Insight
Create breach storylines to plan
your defense
Agile Investigation
Identify details around
the intrusion
Guided Investigation
Inform and accelerate
investigation efforts
Agile, Guided Investigation
 Up and running in hours not
months
 Virtual log collection ensures
minimal onsite configuration
 Fee-based jumpstart support
available if required
 Elastic, cloud-based deployment
model
 Metered by volume of event data
consumed and how long data is
retained for search
 Scale seamlessly during activity
bursts
 Cloud-based subscription model
provides predictable operating
expense
 Includes software, support,
infrastructure, threat intelligence
and codified security expertise
 Eliminates costly professional
services engagements
Quick Time to Value Easily Scalable Predictable Cost
Cloud-based Threat Detection and Incident
Investigation
Security for the Cloud, from the Cloud
Detect malicious activity in AWS environments by providing increased
simplicity, accessibility, and actionability to the data and information
provided by Amazon’s cloud.
Simplicity
 Move naturally from alerting to
searching to incident response
 Easy onboarding of logs from AWS
services as well as Amazon EC2
instance and application logs
– CloudTrail
– CloudWatch (including VPC Flow Logs)
– Elastic Load Balancing (ELB)
– And more ….
Accessibility
 Flexible deployment models to suit virtually any cloud-
based or hybrid-cloud infrastructure
 Provides a “single pane of glass” for monitoring cloud
activity as well as traditional datacenter logs
 Extensive signature sets curated by FireEye in response
to emerging threats
 RESTful API available for integration and automation
Flexible Deployment Model
Intelligence Analytics
Rules Event index
Dedicated VCP User interface
Alert Alert
Reports Search
Analyst
CloudTrail
CloudWatch
Cloud
Data center
FireEye CloudDatabase
Security
Network
TAP CB
TAP CB
Actionability
 Quickly search through billions of events with
sub-second response
 Deliver rich insight into threat actor profiles to
provide context to threats targeting your
organization
 Alerting and incident response (IR) workflow
 Prebuilt rule packs and custom rule
capabilities
Customer Use Case – Problem Statement
Customer decided to make a
substantial investment in AWS but
lacked the tooling to effectively
monitor both their cloud
infrastructure as well as their
traditional datacenters.
Existing security tools, while
adequate for their legacy systems,
were not well suited for the
elastic nature of the cloud.
Customer needed a solution that
was able to provide the visibility to
monitor both environments and
give analysts the tools necessary
to build an effective cyber
defense center.
Customer Use Case – Solution
FireEye implemented the Threat
Analytics Platform (TAP) to provide
enterprise-wide visibility across
both the cloud and legacy
environments.
TAP’s scalable ingestion and cloud-
based back end eliminated many
traditional hurdles such as host-
based agents and licensing counts.
TAP’s rapid search and real-time
alerting provided analysts the ability
to move from compromised
instances to compromised accounts
and track attackers’ activities.
1 2 3
 Designed by incident responders
on the front-lines of the world’s
largest breaches
 Sub-second search across billions
of events
 Inline integration with strategic
threat intel for attack and attacker
context
 Integrated case management
Built by practitioners for
practitioners
 Immediate time-to-value with
minimal onsite configuration
 Reduced management &
tuning costs
 Scale seamlessly during
activity bursts
 Discovered 25 of the last 40
zero days
 Intelligence-informed detection
leverages FireEye threat insight
 Detection rules codify Incident
response front-line expertise
 Heuristic-based detection to
identify anomalous activity
Intelligence & expertise to
detect the unknown
Why FireEye?
Simplified deployment and
management
Live Demo
Copyright © 2016, FireEye, Inc. All rights reserved.
For more information, visit:
www.fireeye.com/go/tap
Q & A
Copyright © 2016, FireEye, Inc. All rights reserved.
For more information, visit:
www.fireeye.com/go/tap

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
 
AWS Security in Plain English – AWS Security Day
AWS Security in Plain English – AWS Security Day AWS Security in Plain English – AWS Security Day
AWS Security in Plain English – AWS Security Day
 
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
 
Network Security and Access Control in AWS
Network Security and Access Control in AWSNetwork Security and Access Control in AWS
Network Security and Access Control in AWS
 
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
 
(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise
 
AWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveAWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's Perspective
 
(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the Cloud(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the Cloud
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
Getting started with aws security toronto rs
Getting started with aws security toronto rsGetting started with aws security toronto rs
Getting started with aws security toronto rs
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupSecurity on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition Meetup
 
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
 
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
 
(MBL402) Mobile Identity Management & Data Sync Using Amazon Cognito
(MBL402) Mobile Identity Management & Data Sync Using Amazon Cognito(MBL402) Mobile Identity Management & Data Sync Using Amazon Cognito
(MBL402) Mobile Identity Management & Data Sync Using Amazon Cognito
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”
 
Announcements for Mobile Developers
Announcements for Mobile DevelopersAnnouncements for Mobile Developers
Announcements for Mobile Developers
 
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
 
Reading the AWS Compliance Framework
Reading the AWS Compliance FrameworkReading the AWS Compliance Framework
Reading the AWS Compliance Framework
 

Destaque

AWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & Response
AlienVault
 

Destaque (20)

Managing Security with Splunk Enterprise
Managing Security with Splunk EnterpriseManaging Security with Splunk Enterprise
Managing Security with Splunk Enterprise
 
AWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & Response
 
Mobile Software in AWS Marketplace
Mobile Software in AWS MarketplaceMobile Software in AWS Marketplace
Mobile Software in AWS Marketplace
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
 
Configuration Management with AWS OpsWorks
Configuration Management with AWS OpsWorksConfiguration Management with AWS OpsWorks
Configuration Management with AWS OpsWorks
 
Automating Software Deployments with AWS CodeDeploy
Automating Software Deployments with AWS CodeDeployAutomating Software Deployments with AWS CodeDeploy
Automating Software Deployments with AWS CodeDeploy
 
Running Microservices on AWS Elastic Beanstalk
Running Microservices on AWS Elastic BeanstalkRunning Microservices on AWS Elastic Beanstalk
Running Microservices on AWS Elastic Beanstalk
 
Streamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSStreamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWS
 
Amazon ECS Deep Dive
Amazon ECS Deep DiveAmazon ECS Deep Dive
Amazon ECS Deep Dive
 
AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
 
Security Innovations in the Cloud
Security Innovations in the CloudSecurity Innovations in the Cloud
Security Innovations in the Cloud
 
Getting Started on AWS
Getting Started on AWS Getting Started on AWS
Getting Started on AWS
 
Data Warehousing with Amazon Redshift
Data Warehousing with Amazon RedshiftData Warehousing with Amazon Redshift
Data Warehousing with Amazon Redshift
 
Deep Dive Amazon Redshift for Big Data Analytics - September Webinar Series
Deep Dive Amazon Redshift for Big Data Analytics - September Webinar SeriesDeep Dive Amazon Redshift for Big Data Analytics - September Webinar Series
Deep Dive Amazon Redshift for Big Data Analytics - September Webinar Series
 
Deep Dive on Microservices and Amazon ECS
Deep Dive on Microservices and Amazon ECSDeep Dive on Microservices and Amazon ECS
Deep Dive on Microservices and Amazon ECS
 
AWS Enterprise Summit Netherlands - Starting Your Journey in the Cloud
AWS Enterprise Summit Netherlands - Starting Your Journey in the CloudAWS Enterprise Summit Netherlands - Starting Your Journey in the Cloud
AWS Enterprise Summit Netherlands - Starting Your Journey in the Cloud
 
Getting Started with Amazon Aurora
Getting Started with Amazon AuroraGetting Started with Amazon Aurora
Getting Started with Amazon Aurora
 
Customer Sharing: Weather Risk - Weather on the Cloud
Customer Sharing: Weather Risk - Weather on the CloudCustomer Sharing: Weather Risk - Weather on the Cloud
Customer Sharing: Weather Risk - Weather on the Cloud
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 

Semelhante a FireEye: Seamless Visibility and Detection for the Cloud

Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
carlitocabana
 

Semelhante a FireEye: Seamless Visibility and Detection for the Cloud (20)

How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - Intel
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
 
An Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAn Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the Cloud
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
#ALSummit: Realities of Security in the Cloud
#ALSummit: Realities of Security in the Cloud#ALSummit: Realities of Security in the Cloud
#ALSummit: Realities of Security in the Cloud
 
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
 
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
 

Mais de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

FireEye: Seamless Visibility and Detection for the Cloud

  • 2. Presenters • Patrick McDowell- Solutions Architect, AWS • Josh Goldfarb - VP, CTO - Emerging Technologies, FireEye • Paul Lee - Senior Deployment Engineer – TAP, FireEye
  • 3. $6.53M 56% 70% Increase in theft of hard intellectual property Of consumers indicated they’d avoid businesses following a security breach Average cost of a data breach Your Data and IP are your Most Valuable Assets https://www.csid.com/resources/stats/data-breaches/ http://www.pwc.com/gx/en/issues/cyber- security/information-security-survey.html https://www.csid.com/resources/stats/data-breaches/
  • 4. In June 2015, IDC released a report which found that most customers can be more secure in AWS than their on-premises environment. How? Automating logging and monitoring Simplifying resource access Making it easy to encrypt properly Enforcing strong authentication AWS Can Be More Secure than your Existing Environment
  • 5. AWS and you share responsibility for security AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Identity & Access Control Network Security Customer applications & content You get to define your controls ON the Cloud AWS takes care of the security OF the Cloud You Inventory & Config Data Encryption
  • 6. Constantly monitored The AWS infrastructure is protected by extensive network and security monitoring systems: • Network access is monitored by AWS security managers daily • AWS CloudTrail lets you monitor and record all API calls • Amazon Inspector automatically assesses applications for vulnerabilities
  • 7. Highly available The AWS infrastructure footprint protects your data from costly downtime • 35 Availability Zones in 13 regions for multi-synchronous geographic redundancy • Retain control of where your data resides for compliance with regulatory requirements • Mitigate the risk of DDoS attacks using services like AutoScaling, Amazon Route 53
  • 8. Integrated with your existing resources AWS enables you to improve your security using many of your existing tools and practices • Integrate your existing Active Directory • Use dedicated connections as a secure, low-latency extension of your data center • Provide and manage your own encryption keys if you choose
  • 9. Key AWS certifications and assurance programs
  • 10. Threat Analytics Platform Overview Presented by: Josh Goldfarb, VP, CTO - Emerging Technologies Paul Lee, Senior Deployment Engineer - TAP Cloud-based Threat Detection and Incident Investigation
  • 11. What’s at Risk? of organizations were breached Source: Mandiant M-trends Report / Ponemon Cost Of Data Breach Study Cyber Security’s Maginot line: A Real-World Assessment of the Defense-in-Depth Model had active command and control communications median number of days before detection to respond to a breach of companies learned they were breached from an external entity 97% 146 days 3/4 53% 32 days
  • 12. SIEM  Built for Compliance – not Security  ‘Newly found’ “Analytics love is really old “SIEM hatred” Anton Chuvakin Jan 2015  Average 15.2 months fully implement, Ponemon 2015  Implementation costs 3-5x software expenditure, Ponemon 2015, FireEye Customer. MSSP  Built for operational efficiency – not Security  One size fits all – they don’t know your environment  No custom rules  Onboarding can be complex and slow  Present alerts but don’t tell you how to respond Traditional Detection Strategies Aren’t Working
  • 13. Capability Investigation & response Proactive hunting Adaptive detection Compliance Moving from Compliance to Proactive Security Cyber security program maturity. Where do you fall? Time Security operations center Cyber incident response team Cyber defense center
  • 14. Overwhelmed by alert noise – Alerts lack context Inability to proactively hunt for covert, non-malware Lack of Visibility Hard to find, train and retain Security Talent Investigation tools are expensive, complex and don’t easily scale What’s Holding you Back? Threat detection Analyst enablement
  • 15. Visibility  Real-time, enterprise-wide visibility  Ingest AWS logs including AWS CloudTrail and VPC flow logs  Customizable views  Threat Intel sharing portal Investigation  Alerts enriched with supporting data  Threat intelligence and point-in-time context about users affected, actions taken and hosts involved  Guided Investigation leads you through industry-leading investigative strategies Detection  Dedicated rules team evolves detection to respond to new threats  Continuous application of threat insight to identify attack and provide context  Intel and rules evaluated against every event Time to value  Cloud-based infrastructure  Simplified deployment and management  Focus on managing incidents – not your tools FireEye’s Threat Analytics Platform Cloud-based threat detection and investigation
  • 16.  Single interface gives analysts visibility into both cloud and datacenter resources  One tool for hunting, alerting, investigating, and responding.  Customizable views ensure analysts can quickly see what's most important  Pivot directly from dashboard into investigation to detect and respond to incidents more quickly  Control what you share and with whom you share it either openly or anonymously  Auto-extract IOC’s from documents and supports exporting in multiple standard formats Unified Single pane of glass Dashboards Customizable views Sharing Threat Intel sharing portal Real-time, Enterprise-wide Visibility
  • 17.  Detects non-malware attacker methodology as well as malware family behavior  Dedicated team of data scientists and security researchers continually refine detection ruleset  Heuristic-based detection identifies previously unknown attacker behavior  Focused on non-malware activity such as lateral movement & exfiltration  Threat intelligence gleaned from the front lines  Domains, IP addresses, email addresses, MD5 hashes Rules Codifies 20+ years of security expertise Analytics Detects non-malware based activity INDICATORS Tactical, strategic, and operational intelligence Detection that Evolves with Your Attackers
  • 18. Where Does Our Intel Come From? FireEye Sensors 3,400+ customers 250+ of the Fortune 500 67 countries Mandiant 1,200+ customers 200+ of the Fortune 500 46 countries with customers iSight 20 locations worldwide 18 countries 100+ experts FaaS 7 security operations centers 200+ clients 26+ million hits reviewed in 2015
  • 19.  Alerts enriched with detailed attacker context  Point-in-time context regarding users impacted, actions taken and hosts involved  Quickly validate and scope the incident.  Easily pivot around indicators of compromise  Perform frequency analysis to spot anomalies  Scheduled search automates analysis activities  Industry-leading investigative strategies  Sets of queries, based on different attack scenarios.  Scenarios provides pre-populated, questions and answers to help guide investigation efforts Actionable Threat Insight Create breach storylines to plan your defense Agile Investigation Identify details around the intrusion Guided Investigation Inform and accelerate investigation efforts Agile, Guided Investigation
  • 20.  Up and running in hours not months  Virtual log collection ensures minimal onsite configuration  Fee-based jumpstart support available if required  Elastic, cloud-based deployment model  Metered by volume of event data consumed and how long data is retained for search  Scale seamlessly during activity bursts  Cloud-based subscription model provides predictable operating expense  Includes software, support, infrastructure, threat intelligence and codified security expertise  Eliminates costly professional services engagements Quick Time to Value Easily Scalable Predictable Cost Cloud-based Threat Detection and Incident Investigation
  • 21. Security for the Cloud, from the Cloud Detect malicious activity in AWS environments by providing increased simplicity, accessibility, and actionability to the data and information provided by Amazon’s cloud.
  • 22. Simplicity  Move naturally from alerting to searching to incident response  Easy onboarding of logs from AWS services as well as Amazon EC2 instance and application logs – CloudTrail – CloudWatch (including VPC Flow Logs) – Elastic Load Balancing (ELB) – And more ….
  • 23. Accessibility  Flexible deployment models to suit virtually any cloud- based or hybrid-cloud infrastructure  Provides a “single pane of glass” for monitoring cloud activity as well as traditional datacenter logs  Extensive signature sets curated by FireEye in response to emerging threats  RESTful API available for integration and automation
  • 24. Flexible Deployment Model Intelligence Analytics Rules Event index Dedicated VCP User interface Alert Alert Reports Search Analyst CloudTrail CloudWatch Cloud Data center FireEye CloudDatabase Security Network TAP CB TAP CB
  • 25. Actionability  Quickly search through billions of events with sub-second response  Deliver rich insight into threat actor profiles to provide context to threats targeting your organization  Alerting and incident response (IR) workflow  Prebuilt rule packs and custom rule capabilities
  • 26. Customer Use Case – Problem Statement Customer decided to make a substantial investment in AWS but lacked the tooling to effectively monitor both their cloud infrastructure as well as their traditional datacenters. Existing security tools, while adequate for their legacy systems, were not well suited for the elastic nature of the cloud. Customer needed a solution that was able to provide the visibility to monitor both environments and give analysts the tools necessary to build an effective cyber defense center.
  • 27. Customer Use Case – Solution FireEye implemented the Threat Analytics Platform (TAP) to provide enterprise-wide visibility across both the cloud and legacy environments. TAP’s scalable ingestion and cloud- based back end eliminated many traditional hurdles such as host- based agents and licensing counts. TAP’s rapid search and real-time alerting provided analysts the ability to move from compromised instances to compromised accounts and track attackers’ activities. 1 2 3
  • 28.  Designed by incident responders on the front-lines of the world’s largest breaches  Sub-second search across billions of events  Inline integration with strategic threat intel for attack and attacker context  Integrated case management Built by practitioners for practitioners  Immediate time-to-value with minimal onsite configuration  Reduced management & tuning costs  Scale seamlessly during activity bursts  Discovered 25 of the last 40 zero days  Intelligence-informed detection leverages FireEye threat insight  Detection rules codify Incident response front-line expertise  Heuristic-based detection to identify anomalous activity Intelligence & expertise to detect the unknown Why FireEye? Simplified deployment and management
  • 29. Live Demo Copyright © 2016, FireEye, Inc. All rights reserved. For more information, visit: www.fireeye.com/go/tap
  • 30. Q & A Copyright © 2016, FireEye, Inc. All rights reserved. For more information, visit: www.fireeye.com/go/tap