SlideShare uma empresa Scribd logo
1 de 53
Operational Complexity:
The Biggest Security Threat to Your AWS Environment
Security is kind of a big deal…
HYBRID
ENVIRONMENTS
ON-PREMISES
We’ve all got them. Are we doing the right thing to secure them?
IN THE CLOUD
And it’s no different in AWS.
But it’s hard.
Managing tightly-
controlled user access
in AWS is too complex.
And complexity leads to
errors and sloppiness.
So why is it so complex?
There are 6 main reasons
User access is IP-centric, and
IP addresses change1
Think office to home, to mobile, to a coffee shop, to a plane…
Predicting where users are going
to be when accessing your
network is a very big challenge;
and almost impossible if you
have a mobile workforce.
Dynamic environments cause
extra administrative burdens2
As virtual machines and services
within AWS are spun up, expanded or
contracted, being able to dynamically
allocate security policies to these
resources becomes a real challenge.
Complexity leads to shortcuts3
A lot of the time shortcuts are
taken that compromise the
security posture in the footprint
of a particular environment.
Forced use of VPN connectivity
to manage access control4
And it can create performance
issues for your end users and
force unnecessary hops from
environment to environment
just to ensure that people are
coming at the environment
from appropriate locations.
The use of VPNs is not a trivial task.
VPN
Logging correlation complexities
5 All of this hopping around and all of these different technologies
lead to logging correlation issues.
So when it comes to audit and
compliance, you have a tremendously
difficult task on your hands to correlate
these logs and figure out who is doing
what, who is accessing which application,
what time of day and under what context
they are doing it.
Shared AWS responsibility model
6
Do you know where
AWS’s responsibility
for the cloud ends –
and yours begins?
COMPUTE
DATABASE
NETWORKING
REGIONS
AWS Global Infrastructure
AVAILABILITY ZONES
EDGE LOCATIONS
STORAGE
AWS is responsible
for the security of
the cloud.
Click here to view the AWS Shared
Responsibility Model
Customer Data
Client-Side Data Encryption & Data
Integrity Authentication
Server-Side Encryption (File
System and/or Data)
Network Traffic Protection
(Encryption/Integrity/Identity)
CUSTOMER
Platform, Apps, Identity &
Access Management
OS, Network & Firewall
Configuration
You’re responsible
for the security in
the cloud.
Anything in the
cloud is your
responsibility.
Anytime you take advantage of the
resources and build virtual machines,
deploy data into S3 buckets or use
a feature like AWS Snowball to push
data into the environment, security
becomes your responsibility.
AWS’s responsibility ends with the
physical components of the cloud…the
data center, the servers, the storage.
You are responsible for everything that
leverages those physical components
– all the configured services, data,
deployed applications. This includes
network access security.
AWS gives you tools, but you have
to implement them.
So we turn to security groups
You can use Security
Groups, but they introduce
operational complexity with
negative consequences.
We either give wide-open access
and end up with this…
No accountability/
visibility
Increased risk of
security breaches
Managing compliance
is virtually impossible
Or tightly controlled access and
end up with this…
Reduced
business agility
Friction for
DevOps
Inefficient
approval process
Consider this scenario...
Four users access the
Amazon environment
from a known source.
Security Groups
73.68.25.22124
1
Four users access the
Amazon environment
from a known source.
Their public IP address
is the known source.
The security groups are
configured appropriately.
Security Groups
73.68.25.22124
1 2
The challenge is when users try to access
from other locations.
Security Groups
73.68.25.22124
Tightly control access – force users to
VPN into a known office and through
a 73 dot IP address?
Allow wide
open access
from anywhere?
Security Groups
73.68.25.22124
So which do you do?
There’s a better way to do it.
It’s called a Software-Defined Perimeter
A Software-Defined Perimeter gives every user on
your network – whether an internal employee or a third-party
working for you – an individualized perimeter around themselves
and the network resources they’re allowed to access.
And it’s a big deal
Industry experts suggest using it
“SDP enables organizations
to provide people-centric,
manageable, secure and
agile access to networked
systems.”
“Legacy, perimeter-
based security models are
ineffective against attacks.
Security and risk pros must
make security ubiquitous
throughout the ecosystem.”
“It is easier and less
costly to deploy
than firewalls, VPN
concentrators and other
bolt-in technologies.”
A Software-Defined Perimeter gives you:
Individualized perimeters for each user – a Segment of One.
A Software-Defined Perimeter gives you:
Fine-grained authorization to on-premises and cloud.
A Software-Defined Perimeter gives you:
Context-aware driven authentication, then access.
A Software-Defined Perimeter gives you:
Simpler firewall and security group rules.
A Software-Defined Perimeter gives you:
Dynamic authorization adjusting to the user to access new cloud
server instances.
A Software-Defined Perimeter gives you:
Consistent access policies across heterogeneous environments.
A Software-Defined
Perimeter puts the person
back into the security model
by taking the source IP
concept out of the equation.
The person, their identity,
the device they’re on, the
network they’re connected
to, and just about anything
else you could think of to
analyze before you allow
access resources on your
network, is checked.
73.68.25.22124
Once a person is authorized to
view resources, everything else on
the network becomes invisible.
Cyxtera delivers a Software-Defined
Perimeter Solution for AWS
AppGate SDP
AppGate SDP
Imagine a user wants to access the company’s ERP system
MANAGED NETWORKS
Cloud, On-premises or Hybrid
ERP Secured
Mail
Group File
Share
Executive
Files
Enterprise
Finance
SharePoint ERP
EXEC_
SERVER
DIGITAL
IDENTITY
AppGate SDP
First we look at both context and identity.
DEVICE
CUSTOM
ATTRIBUTES
APPLICATION
PERMISSIONS
LOCATION:
HOME
ANTI-VIRUS
TIME
DIGITAL
IDENTITY
AppGate SDP
We confirm it matches your policies before granting access.
DEVICE
CUSTOM
ATTRIBUTES
APPLICATION
PERMISSIONS
LOCATION:
HOME
ANTI-VIRUS
TIME
DIGITAL
IDENTITY
AppGate SDP
We then create a dynamic
Segment of One
(1:1 firewall rule).
ENCRYPTED & LOGGED
MANAGED NETWORKS
Cloud, On-premises or Hybrid
ERP Secured
Mail
Group File
Share
Executive
Files
Enterprise
Finance
SharePoint ERP
EXEC_
SERVER
DEVICE
CUSTOM
ATTRIBUTES
APPLICATION
PERMISSIONS
LOCATION:
OFFICE
ANTI-VIRUS
TIME
DIGITAL
IDENTITY
AppGate SDP
And make everything else (the
applications and the rest of the
network) invisible to the user.
ENCRYPTED & LOGGED
MANAGED NETWORKS
Cloud, On-premises or Hybrid
ERPDEVICE
CUSTOM
ATTRIBUTES
APPLICATION
PERMISSIONS
LOCATION:
OFFICE
ANTI-VIRUS
TIME
DIGITAL
IDENTITY
AppGate SDP
And if the user goes home and wants to continue working,
AppGate SDP automatically checks “user-context” again,
and applies the correct “home-based” policy.
ENCRYPTED & LOGGED
MANAGED NETWORKS
Cloud, On-premises or Hybrid
ERPDEVICE
CUSTOM
ATTRIBUTES
APPLICATION
PERMISSIONS
LOCATION:
HOME
ANTI-VIRUS
TIME
DIGITAL
IDENTITY
The Result?
Locked-down secured access to AWS resources
that is operationally simple to manage and
maintain. Let’s look at this more closely…
AWS Security Groups
We all know about AWS Security
Groups. The current Security
Group model is complicated
and unpredictable.
AWS Security Groups & AppGate SDP
Using AppGate SDP, there are multiple gateways, protecting multiple cloud
providers with split functionality.
CURRENT MODEL
AWS Security Groups & AppGate SDP
AppGate SDP defines protected destinations, called Entitlements and protects
simple IP addresses and ports, but also ranges of IP addresses and Ports, AWS Tag
and Values as well as AWS Security Group names.
Current Model
AWS Security Groups & AppGate SDP
AppGate SDP offers a new Security Model inside AWS, redefining the Security
Group so that protected destinations allow traffic only from the AppGate SDP
Gateway, ensuring all users access those resources through the contextual controls
provided by AppGate SDP.
AppGate SDP Model
AWS Security Groups & AppGate SDP
Users are tied to the entitlements through Policies where we can enforce
contextual awareness before allowing specific users access to specific
entitlements. This combination allows us to get very granular on who can
access what and under what circumstances.
AppGate SDP Model
DEVELOPER ACCESS POLICY
•	 Allow TCP Access
•	 On Port 22
•	 For all servers tagged
Dev-Project
•	 If users are in group
Development
AUTHENTICATION POLICY
•	 If users are on corporate
network allow Single-Factor
Authentication
•	 If users are not on
corporate network require
Multi-Factor Authentication
DEVICE POLICY
•	 Allow access if Anti-Virus
is running
•	 Allow access if Device
Firewall is enabled
•	 Allow access if OS patch
level is current
POLICY POLICY POLICY
Because there is
just one IP address,
managing security
just got easier.
AppGate SDP Model
AppGate SDP from Cyxtera provides user
control, operational agility and compliance
Operational agility is
boosted
Access policies across
hybrid environments are
consistent
Access is tightly secured
with a Segment of One
Compliance reporting
is easier and faster
Infrastructure changes are
dynamically protected
DevOps can work
faster
AWS Security…Simplified!
User-centric security policies…because people are not IP addresses
Joe R
Developer
Project Hawk
Sally M
Developer
Project Eagle
Enterprise Headquarters
Coffee Shop
Charles S
DB Admin
Consultant
Learn more about AppGate SDP
DATASHET VIDEO
AppGate SDP for AWS
WHITEPAPER
Forrester Report
No More Chewy
Centers:
The Zero Trust Model of
Information Security
AppGate SDP
Want to know more?
AWS FREE TRIAL AZURE FREE ACCOUNT
GET IN TOUCH
Click here to get access to a 15-day
free trial of AppGate SDP on AWS
marketplace.
Click here to create and view the benefits
of a Microsoft Azure account, including a
$200 credit towards Azure products.
Email: sales@cyxtera.com Twitter: @Cyxtera LinkedIn: linkedin.com/company/cyxtera

Mais conteúdo relacionado

Mais procurados

Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Priyanka Aash
 
Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Alejandro Daricz
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud Amazon Web Services
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security OverviewAmazon Web Services
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeHimani Singh
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A ServiceMichael Davis
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
 
Ea2009 Cloud Computing Discussion
Ea2009 Cloud Computing DiscussionEa2009 Cloud Computing Discussion
Ea2009 Cloud Computing DiscussionMarc Caltabiano
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE AWS Chicago
 
Zscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Zscaler
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Samrat Das
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
 
Secure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceSecure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceVignesh Ganesan I Microsoft MVP
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerAnkit Dua
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- orgDharmalingam S
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Zscaler
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 

Mais procurados (20)

Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
 
Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Ea2009 Cloud Computing Discussion
Ea2009 Cloud Computing DiscussionEa2009 Cloud Computing Discussion
Ea2009 Cloud Computing Discussion
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
 
Zscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacks
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
Secure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceSecure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity Governance
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- org
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 

Semelhante a Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Environment

Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stackRishabh Agarwal
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...AlgoSec
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...Amazon Web Services
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Ashnikbiz
 

Semelhante a Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Environment (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Understanding the Cloud
Understanding the CloudUnderstanding the Cloud
Understanding the Cloud
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2
 

Último

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...software pro Development
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 

Último (20)

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 

Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Environment

  • 1. Operational Complexity: The Biggest Security Threat to Your AWS Environment
  • 2. Security is kind of a big deal… HYBRID ENVIRONMENTS ON-PREMISES We’ve all got them. Are we doing the right thing to secure them? IN THE CLOUD
  • 3. And it’s no different in AWS. But it’s hard. Managing tightly- controlled user access in AWS is too complex. And complexity leads to errors and sloppiness.
  • 4. So why is it so complex? There are 6 main reasons
  • 5. User access is IP-centric, and IP addresses change1 Think office to home, to mobile, to a coffee shop, to a plane… Predicting where users are going to be when accessing your network is a very big challenge; and almost impossible if you have a mobile workforce.
  • 6. Dynamic environments cause extra administrative burdens2 As virtual machines and services within AWS are spun up, expanded or contracted, being able to dynamically allocate security policies to these resources becomes a real challenge.
  • 7. Complexity leads to shortcuts3 A lot of the time shortcuts are taken that compromise the security posture in the footprint of a particular environment.
  • 8. Forced use of VPN connectivity to manage access control4 And it can create performance issues for your end users and force unnecessary hops from environment to environment just to ensure that people are coming at the environment from appropriate locations. The use of VPNs is not a trivial task. VPN
  • 9. Logging correlation complexities 5 All of this hopping around and all of these different technologies lead to logging correlation issues. So when it comes to audit and compliance, you have a tremendously difficult task on your hands to correlate these logs and figure out who is doing what, who is accessing which application, what time of day and under what context they are doing it.
  • 10. Shared AWS responsibility model 6 Do you know where AWS’s responsibility for the cloud ends – and yours begins?
  • 11. COMPUTE DATABASE NETWORKING REGIONS AWS Global Infrastructure AVAILABILITY ZONES EDGE LOCATIONS STORAGE AWS is responsible for the security of the cloud. Click here to view the AWS Shared Responsibility Model
  • 12. Customer Data Client-Side Data Encryption & Data Integrity Authentication Server-Side Encryption (File System and/or Data) Network Traffic Protection (Encryption/Integrity/Identity) CUSTOMER Platform, Apps, Identity & Access Management OS, Network & Firewall Configuration You’re responsible for the security in the cloud.
  • 13. Anything in the cloud is your responsibility. Anytime you take advantage of the resources and build virtual machines, deploy data into S3 buckets or use a feature like AWS Snowball to push data into the environment, security becomes your responsibility. AWS’s responsibility ends with the physical components of the cloud…the data center, the servers, the storage. You are responsible for everything that leverages those physical components – all the configured services, data, deployed applications. This includes network access security. AWS gives you tools, but you have to implement them.
  • 14. So we turn to security groups
  • 15. You can use Security Groups, but they introduce operational complexity with negative consequences.
  • 16. We either give wide-open access and end up with this… No accountability/ visibility Increased risk of security breaches Managing compliance is virtually impossible
  • 17. Or tightly controlled access and end up with this… Reduced business agility Friction for DevOps Inefficient approval process
  • 19. Four users access the Amazon environment from a known source. Security Groups 73.68.25.22124 1
  • 20. Four users access the Amazon environment from a known source. Their public IP address is the known source. The security groups are configured appropriately. Security Groups 73.68.25.22124 1 2
  • 21. The challenge is when users try to access from other locations. Security Groups 73.68.25.22124
  • 22. Tightly control access – force users to VPN into a known office and through a 73 dot IP address? Allow wide open access from anywhere? Security Groups 73.68.25.22124 So which do you do?
  • 23. There’s a better way to do it. It’s called a Software-Defined Perimeter
  • 24. A Software-Defined Perimeter gives every user on your network – whether an internal employee or a third-party working for you – an individualized perimeter around themselves and the network resources they’re allowed to access.
  • 25. And it’s a big deal
  • 26. Industry experts suggest using it “SDP enables organizations to provide people-centric, manageable, secure and agile access to networked systems.” “Legacy, perimeter- based security models are ineffective against attacks. Security and risk pros must make security ubiquitous throughout the ecosystem.” “It is easier and less costly to deploy than firewalls, VPN concentrators and other bolt-in technologies.”
  • 27. A Software-Defined Perimeter gives you: Individualized perimeters for each user – a Segment of One.
  • 28. A Software-Defined Perimeter gives you: Fine-grained authorization to on-premises and cloud.
  • 29. A Software-Defined Perimeter gives you: Context-aware driven authentication, then access.
  • 30. A Software-Defined Perimeter gives you: Simpler firewall and security group rules.
  • 31. A Software-Defined Perimeter gives you: Dynamic authorization adjusting to the user to access new cloud server instances.
  • 32. A Software-Defined Perimeter gives you: Consistent access policies across heterogeneous environments.
  • 33. A Software-Defined Perimeter puts the person back into the security model by taking the source IP concept out of the equation.
  • 34. The person, their identity, the device they’re on, the network they’re connected to, and just about anything else you could think of to analyze before you allow access resources on your network, is checked. 73.68.25.22124
  • 35. Once a person is authorized to view resources, everything else on the network becomes invisible.
  • 36. Cyxtera delivers a Software-Defined Perimeter Solution for AWS AppGate SDP
  • 37. AppGate SDP Imagine a user wants to access the company’s ERP system MANAGED NETWORKS Cloud, On-premises or Hybrid ERP Secured Mail Group File Share Executive Files Enterprise Finance SharePoint ERP EXEC_ SERVER DIGITAL IDENTITY
  • 38. AppGate SDP First we look at both context and identity. DEVICE CUSTOM ATTRIBUTES APPLICATION PERMISSIONS LOCATION: HOME ANTI-VIRUS TIME DIGITAL IDENTITY
  • 39. AppGate SDP We confirm it matches your policies before granting access. DEVICE CUSTOM ATTRIBUTES APPLICATION PERMISSIONS LOCATION: HOME ANTI-VIRUS TIME DIGITAL IDENTITY
  • 40. AppGate SDP We then create a dynamic Segment of One (1:1 firewall rule). ENCRYPTED & LOGGED MANAGED NETWORKS Cloud, On-premises or Hybrid ERP Secured Mail Group File Share Executive Files Enterprise Finance SharePoint ERP EXEC_ SERVER DEVICE CUSTOM ATTRIBUTES APPLICATION PERMISSIONS LOCATION: OFFICE ANTI-VIRUS TIME DIGITAL IDENTITY
  • 41. AppGate SDP And make everything else (the applications and the rest of the network) invisible to the user. ENCRYPTED & LOGGED MANAGED NETWORKS Cloud, On-premises or Hybrid ERPDEVICE CUSTOM ATTRIBUTES APPLICATION PERMISSIONS LOCATION: OFFICE ANTI-VIRUS TIME DIGITAL IDENTITY
  • 42. AppGate SDP And if the user goes home and wants to continue working, AppGate SDP automatically checks “user-context” again, and applies the correct “home-based” policy. ENCRYPTED & LOGGED MANAGED NETWORKS Cloud, On-premises or Hybrid ERPDEVICE CUSTOM ATTRIBUTES APPLICATION PERMISSIONS LOCATION: HOME ANTI-VIRUS TIME DIGITAL IDENTITY
  • 43. The Result? Locked-down secured access to AWS resources that is operationally simple to manage and maintain. Let’s look at this more closely…
  • 44. AWS Security Groups We all know about AWS Security Groups. The current Security Group model is complicated and unpredictable.
  • 45. AWS Security Groups & AppGate SDP Using AppGate SDP, there are multiple gateways, protecting multiple cloud providers with split functionality. CURRENT MODEL
  • 46. AWS Security Groups & AppGate SDP AppGate SDP defines protected destinations, called Entitlements and protects simple IP addresses and ports, but also ranges of IP addresses and Ports, AWS Tag and Values as well as AWS Security Group names. Current Model
  • 47. AWS Security Groups & AppGate SDP AppGate SDP offers a new Security Model inside AWS, redefining the Security Group so that protected destinations allow traffic only from the AppGate SDP Gateway, ensuring all users access those resources through the contextual controls provided by AppGate SDP. AppGate SDP Model
  • 48. AWS Security Groups & AppGate SDP Users are tied to the entitlements through Policies where we can enforce contextual awareness before allowing specific users access to specific entitlements. This combination allows us to get very granular on who can access what and under what circumstances. AppGate SDP Model DEVELOPER ACCESS POLICY • Allow TCP Access • On Port 22 • For all servers tagged Dev-Project • If users are in group Development AUTHENTICATION POLICY • If users are on corporate network allow Single-Factor Authentication • If users are not on corporate network require Multi-Factor Authentication DEVICE POLICY • Allow access if Anti-Virus is running • Allow access if Device Firewall is enabled • Allow access if OS patch level is current POLICY POLICY POLICY
  • 49. Because there is just one IP address, managing security just got easier. AppGate SDP Model
  • 50. AppGate SDP from Cyxtera provides user control, operational agility and compliance Operational agility is boosted Access policies across hybrid environments are consistent Access is tightly secured with a Segment of One Compliance reporting is easier and faster Infrastructure changes are dynamically protected DevOps can work faster
  • 51. AWS Security…Simplified! User-centric security policies…because people are not IP addresses Joe R Developer Project Hawk Sally M Developer Project Eagle Enterprise Headquarters Coffee Shop Charles S DB Admin Consultant
  • 52. Learn more about AppGate SDP DATASHET VIDEO AppGate SDP for AWS WHITEPAPER Forrester Report No More Chewy Centers: The Zero Trust Model of Information Security AppGate SDP
  • 53. Want to know more? AWS FREE TRIAL AZURE FREE ACCOUNT GET IN TOUCH Click here to get access to a 15-day free trial of AppGate SDP on AWS marketplace. Click here to create and view the benefits of a Microsoft Azure account, including a $200 credit towards Azure products. Email: sales@cyxtera.com Twitter: @Cyxtera LinkedIn: linkedin.com/company/cyxtera