SlideShare uma empresa Scribd logo
1 de 26
Multi-Cloud
SECURITY & COMPLIANCE
GOVERNANCE & BEST PRACTICES
• Kamran Mehboob
• Dir of Product Management
Security & Compliance
Meet Our Speakers
What we will learn today?
• What to govern in a multi cloud?
• Governance best practices
• Where and how to to start
• CIS control for all clouds
• Cloudnosys Security & Compliance Platform
• Q & A
Why even have a Multi Cloud Strategy
1. 85% of Enterprises now have Multi-Cloud
Strategy for Public Clouds. McKinsey, Forrester,
Gartner
2. Merger and Acquisions forcing companies to
quickly develop a model to govern and effectively
manage acquired company’s Cloud footprint.
3. Technology, Costs and Talent
Multi-Cloud is the new norm
Cloud COE Governance Core Focus
Areas
1. Security and Compliance (Today’s session focus)
2. Financial – Cost Control (Utilization, Capacity, Reserve
Instances, Tagging – FinOps.org)
3. Performance Management – (Machine Metrics, RightSizing,
APM)
Build : Automation, Enforcement and Self Healing Cloud
What are the common threads to Govern
security for Public Clouds at Scale?
1. Software define infrastructure controls – Core
2. Mostly process and technology automation – Very little People
Governance = Configurations + Collaboration + Enforcement + Self healing
Cloud Velocity requires Automations
Cannot humanly see or govern thousands of
configurations everyday and fix them!
• Need compliance framework control testing
• Need continuous monitoring & automation
• Need DevSecOps Governance for CI/CD automation
Security Governance for Public Clouds
1. Build a set of granular Corporate policies for Security and
Compliance configurations and OS levels for all cloud
services (Firewalls, Access, Encryption, IAM and more)
2. Enforcement of Policies in near time and analyzing any
additions or changes to existing cloud configuration services.
3. Monitor and measure risks continually then either allow or
deny services requests for out of policy actions
Invest in open source and commercial tools to deliver a 360 view
of all cloud assets running globally in a single pane of glass.
Key Focus areas to reach Scale on
Governance
1. Visibility - Considerable attention to Visibility and Change in
your Cloud services
2. Speed - Increase speed by “continues delivery or monitor
changes” Reduce human intervention
3. Self Healing – Fix the problems before they go into
production and while in production fix on the fly via
automation.
4. Leverage Partners and Vendors to understand what “Good”
looks like. You don’t have to build it yourself
Start here but end with a 360 view of all
cloud policies and risks?
AWS Azure GCP
Configuration
Management Config, CFT
Azure Policy, Azure
Security Center (ASC)
Configuration Mngt,
Anthos, Forseti
OS Management Inspector ASC
Security Command
Center (SCC) (in
beta)
Log Management
GuardDuty,
WatchTower ASC StackDriver
Automation - Self Healing Lambda Azure Functions GCP Functions
Monitoring PII Data usage
in DB Macie
MS Information
Protection DLP - SCC
Risk Management none none none
Best Practice Policies CIS CIS CIS
How to build, manage and enforce
Policies at scale in addition
understand risks?
1- CIS First
2- Custom Signatures
3- Automation
My budget is Zero and we have no time
• The Center for Internet Security is a non-profit entity
that harnesses the power of a global IT community to
safeguard private and public organizations against
cyber threats.
• CIS AWS Benchmarks
44 AWS Controls
• CIS - OS hardening & AWS
Configurations
• https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foun
dations_Benchmark.pdf
Sample AWS CIS Controls
© 2018 - Cloudnosys | Security, Compliance, Cost.
1. Unauthorized API calls
2. Management Console sign-in without MFA
3. Usage of “root” account
4. IAM policy changes
5. CloudTrail configuration changes
6. AWS Management Console authentication failures
7. Disabling or deletion of customer created CMKs
8. S3 bucket policy changes
9. AWS Config configuration changes
10. Security group changes
11. Changes to Network Access Control Lists (NACL)
12. Changes to network gateways
13. Route table changes
14. VPC changes
15. Ensure security contact information is registered
16. Ensure appropriate subscribers to each SNS topic
How we govern and audit S3 Bucket?
Note; 23 policies just for AWS •AWS S3 Bucket Authenticated 'FULL_CONTROL'
Access
•AWS S3 Bucket Authenticated 'READ' Access
•AWS S3 Bucket Authenticated 'READ_ACP' Access
•AWS S3 Bucket Authenticated 'WRITE' Access
•AWS S3 Bucket Authenticated 'WRITE_ACP' Access
•Enable S3 Bucket Default Encryption
•Enable Access Logging for AWS S3 Buckets
•Enable MFA Delete for AWS S3 Buckets
•S3 Bucket Public Access Via Policy
•Publicly Accessible AWS S3 Buckets
•AWS S3 Bucket Public 'READ' Access
•AWS S3 Bucket Public 'READ_ACP' Access
•AWS S3 Bucket Public 'WRITE' Access
•AWS S3 Bucket Public 'WRITE_ACP' Access
•Enable Versioning for AWS S3 Buckets
•DNS Compliant S3 Bucket Names
•Enable S3 Bucket Lifecycle Configuration
•Review S3 Buckets with Website Configuration
Enabled
•AWS S3 Unknown Cross Account Access
•Secure Transport
•Server Side Encryption
•Limit S3 Bucket Access by IP Address
https://docs.aws.amazon.com/AmazonS3/latest/dev/ex
ample-bucket-policies.html
You write these rules via API
How should we Govern VPC?
• Unused VPC Internet Gateways
• Use Managed NAT Gateway for AWS VPC
• Ineffective Network ACL DENY Rules
• Unrestricted Network ACL Inbound Traffic
• Unrestricted Network ACL Outbound Traffic
• Enable Flow Logs for VPC Subnets
• VPC Endpoint Unknown Cross Account Access
• AWS VPC Exposed Endpoints
• Enable AWS VPC Flow Logs
• AWS VPC Peering Connection Configuration
• AWS VPN Tunnel Redundancy
• AWS VPN Tunnel State
• Unused Virtual Private Gateways
• VPC Peering cross accounts
• Easy to turn on and collect
• Requires Log Correlations
• Information Latency
• Requires automation, integration & Analysis
All via APIs - Requires expert understanding
of AWS security at the component level.
Compliance as code is the new norm!
Custom Rules: Written by YOU!
You write these rules via API
Governance Model for Resources
Collection and Reporting
AWS Infra Logs and Config
Config, CloudTrail, Cloudwatch, VPC Flow
Logs
Easy
AWS Service Logs
S3 logs, RDS logs, Lambda etc.
Easy
Host Based Logs
Server logs, Audit logs, Applications etc.
Easy
Machine Meta Data and related
Configurations changes, limit reached etc.
All API based collections (Automations)
Very
Hard
Policies Output Collection
Policy Analysis for
Governance
Evidence based Governance/
Compliance Reporting -
PASS/FAIL with RISK
Ratings
All raw data but a core foundation of your compliance and security
gap reporting. It is not in a business ready usable format.
Security and Compliance Reporting for
“Governance and Security Risk Posture”
GDPR Compliance Reporting:
Date 6/20/2018
AWS Account Name: GDPR Prod
Inventory of Assets 10 EC2, 10 VPC, 20ELB, 18 S3, 12 RDS
Data Privacy By Design Article 25
Data controller is required to implement appropriate
technical and organisational measures both at the
time of determination of the means for processing
and at the time of the processing itself in order to
ensure data protection principles such as data
minimisation are met. Any such privacy by
design measures may include, for example,
pseudonymisation or other privacy-enhancing
technologies
FAIL
Access Control 100 29 129
Encryption RDS 200 32 232
Encryption S3 105 95 200
Encryption ELB - TLS 1.2 200 29 229
IAM Audit Controls 120 200 220
Summary : A quick checklist for your Cloud
Start with your Cloud native provided tools
GuardDuty, Security Center, Configuration Manager
Organizational Responsibilities
Assign a Data Protection and Security officer which will govern and benchmark the program.
Technical Responsibility and Obligations
CIS controls first then to NIST Controls- Inventory data, and implement strong
controls to maintain data privacy, build your “collection” expertise. Pay attention to DLP, Encryption, and
CIS/PCI/HIPAA equivalent controls around Cloud configuration monitoring. Audit trail management.
Implement cloud compliance automation to manage these controls and continually monitor in near real time.
Introducing…
CLOUDNOSYS
Cloud Security Governance
@ Scale
SECURITY & COMPLIANCE PLATFORM
Cloudnosys Security and Compliance Platform
CloudEye Continuously Secure your cloud services and automate
compliance. Over 150+ Cloudnosys best practice rules track and monitor
your AWS services for security and compliance violations. Dashboard and
reports keep you fully informed of any Risks. – Agentless!
• Continuous Security & Compliance Scanning
• Alert on Vulnerabilities
• Audit Reports on Security and Compliance
• Fast Remediation
• Supports GDPR, PCI-DSS, HIPPA, AWS CIS Benchmark and FISMA
mandates
© 2020 - Cloudnosys | Security, Compliance.
CloudEye Active Security Defence System
Visibility
• Asset Discovery
• Configurations
• Alerts & Drifts
• IAM Controls
Everything visible and secure
Governance
• Policy Guardrails
• Auto Enforcement
• DevSecOps Management
• Custom Policies
Accountability and control
Compliance
• PCI, HIPAA, NIST & more
• Risk Assessments
• Audit Reports
• Vulnerability & Remediation
Continuous compliance
Compliance Simplified – All Controls Mapped
Generate auditor ready compliance reports without specialized knowledge
Reporting: Compliance and Security
Security and Compliance reports shows, alerts, violations and how to
remediate these quickly to avoid any Cyber attacks. This is generated on the
fly after scanning all Cloud Services
© 2020 - Cloudnosys | Security, Compliance
Q & A - ANY QUESTIONS?
Type in your questions in chat box now…
Try Cloudnosys
For 14 Days Free
Start monitoring,
optimizing and securing
your AWS.
No Limits evaluation.
© 2020 - Cloudnosys | Security, Compliance.
info@Cloudnosys.com

Mais conteúdo relacionado

Mais procurados

CAF presentation 09 16-2020
CAF presentation 09 16-2020CAF presentation 09 16-2020
CAF presentation 09 16-2020Michael Nichols
 
Introduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptxIntroduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptxEverestMedinilla2
 
Full stack monitoring across apps & infrastructure with Azure Monitor
Full stack monitoring across apps & infrastructure with Azure MonitorFull stack monitoring across apps & infrastructure with Azure Monitor
Full stack monitoring across apps & infrastructure with Azure MonitorSquared Up
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Timothy McAliley
 
The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?Codit
 
Azure Cloud Governance
Azure Cloud GovernanceAzure Cloud Governance
Azure Cloud GovernanceJonathan Wade
 
Cloud Center of Excellence
Cloud Center of ExcellenceCloud Center of Excellence
Cloud Center of ExcellenceJeremy Canale
 
Cloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptxCloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptxabhishek22611
 
Let's Talk About: Azure Monitor
Let's Talk About: Azure MonitorLet's Talk About: Azure Monitor
Let's Talk About: Azure MonitorPedro Sousa
 
[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy☁ Hicham KADIRI ☁
 
Cloud Governance & DevOps: Must-have Tools on Your Journey to Azure Cloud
Cloud Governance & DevOps: Must-have Tools on Your Journey to Azure CloudCloud Governance & DevOps: Must-have Tools on Your Journey to Azure Cloud
Cloud Governance & DevOps: Must-have Tools on Your Journey to Azure CloudPredica Group
 
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Cloud Adoption Framework for Azure: Governance ConversationMicrosoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Cloud Adoption Framework for Azure: Governance ConversationNicholas Vossburg
 
Azure Migrate
Azure MigrateAzure Migrate
Azure MigrateMustafa
 
Emerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Emerging Trends in Hybrid-Cloud & Multi-Cloud StrategiesEmerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Emerging Trends in Hybrid-Cloud & Multi-Cloud StrategiesChaitanya Atreya
 
A Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence AdoptionA Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence AdoptionAmazon Web Services
 
Azure Governance for Enterprise
Azure Governance for EnterpriseAzure Governance for Enterprise
Azure Governance for EnterpriseMohit Chhabra
 

Mais procurados (20)

CAF presentation 09 16-2020
CAF presentation 09 16-2020CAF presentation 09 16-2020
CAF presentation 09 16-2020
 
Introduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptxIntroduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptx
 
Full stack monitoring across apps & infrastructure with Azure Monitor
Full stack monitoring across apps & infrastructure with Azure MonitorFull stack monitoring across apps & infrastructure with Azure Monitor
Full stack monitoring across apps & infrastructure with Azure Monitor
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
 
The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?
 
Azure Cloud Governance
Azure Cloud GovernanceAzure Cloud Governance
Azure Cloud Governance
 
Cloud Center of Excellence
Cloud Center of ExcellenceCloud Center of Excellence
Cloud Center of Excellence
 
Cloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptxCloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptx
 
Azure Governance
Azure GovernanceAzure Governance
Azure Governance
 
AWS Cloud Assessment
AWS Cloud AssessmentAWS Cloud Assessment
AWS Cloud Assessment
 
Let's Talk About: Azure Monitor
Let's Talk About: Azure MonitorLet's Talk About: Azure Monitor
Let's Talk About: Azure Monitor
 
[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy
 
Cloud Governance & DevOps: Must-have Tools on Your Journey to Azure Cloud
Cloud Governance & DevOps: Must-have Tools on Your Journey to Azure CloudCloud Governance & DevOps: Must-have Tools on Your Journey to Azure Cloud
Cloud Governance & DevOps: Must-have Tools on Your Journey to Azure Cloud
 
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Cloud Adoption Framework for Azure: Governance ConversationMicrosoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
 
MULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTUREMULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTURE
 
Azure Migrate
Azure MigrateAzure Migrate
Azure Migrate
 
Emerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Emerging Trends in Hybrid-Cloud & Multi-Cloud StrategiesEmerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Emerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
 
A Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence AdoptionA Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence Adoption
 
Azure Governance for Enterprise
Azure Governance for EnterpriseAzure Governance for Enterprise
Azure Governance for Enterprise
 
Cloud Pub_Sub
Cloud Pub_SubCloud Pub_Sub
Cloud Pub_Sub
 

Semelhante a Multi cloud governance best practices - AWS, Azure, GCP

CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...Faiza Mehar
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignAmazon Web Services
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud SecurityRightScale
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersJames Strong
 
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Amazon Web Services
 
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...Amazon Web Services
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceRightScale
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the CloudAmazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Compliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesCompliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesAmazon Web Services
 
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...Amazon Web Services
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudAmazon Web Services
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAmazon Web Services
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Amazon Web Services
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignAmazon Web Services
 

Semelhante a Multi cloud governance best practices - AWS, Azure, GCP (20)

CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
 
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Compliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesCompliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” Principles
 
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
 
AWS Webcast - Sumo Logic
AWS Webcast - Sumo LogicAWS Webcast - Sumo Logic
AWS Webcast - Sumo Logic
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS Security
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By Design
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 

Último

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Multi cloud governance best practices - AWS, Azure, GCP

  • 2. • Kamran Mehboob • Dir of Product Management Security & Compliance Meet Our Speakers
  • 3. What we will learn today? • What to govern in a multi cloud? • Governance best practices • Where and how to to start • CIS control for all clouds • Cloudnosys Security & Compliance Platform • Q & A
  • 4. Why even have a Multi Cloud Strategy 1. 85% of Enterprises now have Multi-Cloud Strategy for Public Clouds. McKinsey, Forrester, Gartner 2. Merger and Acquisions forcing companies to quickly develop a model to govern and effectively manage acquired company’s Cloud footprint. 3. Technology, Costs and Talent Multi-Cloud is the new norm
  • 5. Cloud COE Governance Core Focus Areas 1. Security and Compliance (Today’s session focus) 2. Financial – Cost Control (Utilization, Capacity, Reserve Instances, Tagging – FinOps.org) 3. Performance Management – (Machine Metrics, RightSizing, APM) Build : Automation, Enforcement and Self Healing Cloud
  • 6. What are the common threads to Govern security for Public Clouds at Scale? 1. Software define infrastructure controls – Core 2. Mostly process and technology automation – Very little People Governance = Configurations + Collaboration + Enforcement + Self healing
  • 7. Cloud Velocity requires Automations Cannot humanly see or govern thousands of configurations everyday and fix them! • Need compliance framework control testing • Need continuous monitoring & automation • Need DevSecOps Governance for CI/CD automation
  • 8. Security Governance for Public Clouds 1. Build a set of granular Corporate policies for Security and Compliance configurations and OS levels for all cloud services (Firewalls, Access, Encryption, IAM and more) 2. Enforcement of Policies in near time and analyzing any additions or changes to existing cloud configuration services. 3. Monitor and measure risks continually then either allow or deny services requests for out of policy actions Invest in open source and commercial tools to deliver a 360 view of all cloud assets running globally in a single pane of glass.
  • 9. Key Focus areas to reach Scale on Governance 1. Visibility - Considerable attention to Visibility and Change in your Cloud services 2. Speed - Increase speed by “continues delivery or monitor changes” Reduce human intervention 3. Self Healing – Fix the problems before they go into production and while in production fix on the fly via automation. 4. Leverage Partners and Vendors to understand what “Good” looks like. You don’t have to build it yourself
  • 10. Start here but end with a 360 view of all cloud policies and risks? AWS Azure GCP Configuration Management Config, CFT Azure Policy, Azure Security Center (ASC) Configuration Mngt, Anthos, Forseti OS Management Inspector ASC Security Command Center (SCC) (in beta) Log Management GuardDuty, WatchTower ASC StackDriver Automation - Self Healing Lambda Azure Functions GCP Functions Monitoring PII Data usage in DB Macie MS Information Protection DLP - SCC Risk Management none none none Best Practice Policies CIS CIS CIS
  • 11. How to build, manage and enforce Policies at scale in addition understand risks? 1- CIS First 2- Custom Signatures 3- Automation My budget is Zero and we have no time
  • 12. • The Center for Internet Security is a non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. • CIS AWS Benchmarks 44 AWS Controls • CIS - OS hardening & AWS Configurations • https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foun dations_Benchmark.pdf Sample AWS CIS Controls © 2018 - Cloudnosys | Security, Compliance, Cost. 1. Unauthorized API calls 2. Management Console sign-in without MFA 3. Usage of “root” account 4. IAM policy changes 5. CloudTrail configuration changes 6. AWS Management Console authentication failures 7. Disabling or deletion of customer created CMKs 8. S3 bucket policy changes 9. AWS Config configuration changes 10. Security group changes 11. Changes to Network Access Control Lists (NACL) 12. Changes to network gateways 13. Route table changes 14. VPC changes 15. Ensure security contact information is registered 16. Ensure appropriate subscribers to each SNS topic
  • 13. How we govern and audit S3 Bucket? Note; 23 policies just for AWS •AWS S3 Bucket Authenticated 'FULL_CONTROL' Access •AWS S3 Bucket Authenticated 'READ' Access •AWS S3 Bucket Authenticated 'READ_ACP' Access •AWS S3 Bucket Authenticated 'WRITE' Access •AWS S3 Bucket Authenticated 'WRITE_ACP' Access •Enable S3 Bucket Default Encryption •Enable Access Logging for AWS S3 Buckets •Enable MFA Delete for AWS S3 Buckets •S3 Bucket Public Access Via Policy •Publicly Accessible AWS S3 Buckets •AWS S3 Bucket Public 'READ' Access •AWS S3 Bucket Public 'READ_ACP' Access •AWS S3 Bucket Public 'WRITE' Access •AWS S3 Bucket Public 'WRITE_ACP' Access •Enable Versioning for AWS S3 Buckets •DNS Compliant S3 Bucket Names •Enable S3 Bucket Lifecycle Configuration •Review S3 Buckets with Website Configuration Enabled •AWS S3 Unknown Cross Account Access •Secure Transport •Server Side Encryption •Limit S3 Bucket Access by IP Address https://docs.aws.amazon.com/AmazonS3/latest/dev/ex ample-bucket-policies.html You write these rules via API
  • 14. How should we Govern VPC? • Unused VPC Internet Gateways • Use Managed NAT Gateway for AWS VPC • Ineffective Network ACL DENY Rules • Unrestricted Network ACL Inbound Traffic • Unrestricted Network ACL Outbound Traffic • Enable Flow Logs for VPC Subnets • VPC Endpoint Unknown Cross Account Access • AWS VPC Exposed Endpoints • Enable AWS VPC Flow Logs • AWS VPC Peering Connection Configuration • AWS VPN Tunnel Redundancy • AWS VPN Tunnel State • Unused Virtual Private Gateways • VPC Peering cross accounts • Easy to turn on and collect • Requires Log Correlations • Information Latency • Requires automation, integration & Analysis All via APIs - Requires expert understanding of AWS security at the component level. Compliance as code is the new norm! Custom Rules: Written by YOU! You write these rules via API
  • 15. Governance Model for Resources Collection and Reporting AWS Infra Logs and Config Config, CloudTrail, Cloudwatch, VPC Flow Logs Easy AWS Service Logs S3 logs, RDS logs, Lambda etc. Easy Host Based Logs Server logs, Audit logs, Applications etc. Easy Machine Meta Data and related Configurations changes, limit reached etc. All API based collections (Automations) Very Hard Policies Output Collection Policy Analysis for Governance Evidence based Governance/ Compliance Reporting - PASS/FAIL with RISK Ratings All raw data but a core foundation of your compliance and security gap reporting. It is not in a business ready usable format.
  • 16. Security and Compliance Reporting for “Governance and Security Risk Posture” GDPR Compliance Reporting: Date 6/20/2018 AWS Account Name: GDPR Prod Inventory of Assets 10 EC2, 10 VPC, 20ELB, 18 S3, 12 RDS Data Privacy By Design Article 25 Data controller is required to implement appropriate technical and organisational measures both at the time of determination of the means for processing and at the time of the processing itself in order to ensure data protection principles such as data minimisation are met. Any such privacy by design measures may include, for example, pseudonymisation or other privacy-enhancing technologies FAIL Access Control 100 29 129 Encryption RDS 200 32 232 Encryption S3 105 95 200 Encryption ELB - TLS 1.2 200 29 229 IAM Audit Controls 120 200 220
  • 17. Summary : A quick checklist for your Cloud Start with your Cloud native provided tools GuardDuty, Security Center, Configuration Manager Organizational Responsibilities Assign a Data Protection and Security officer which will govern and benchmark the program. Technical Responsibility and Obligations CIS controls first then to NIST Controls- Inventory data, and implement strong controls to maintain data privacy, build your “collection” expertise. Pay attention to DLP, Encryption, and CIS/PCI/HIPAA equivalent controls around Cloud configuration monitoring. Audit trail management. Implement cloud compliance automation to manage these controls and continually monitor in near real time.
  • 18. Introducing… CLOUDNOSYS Cloud Security Governance @ Scale SECURITY & COMPLIANCE PLATFORM
  • 19. Cloudnosys Security and Compliance Platform CloudEye Continuously Secure your cloud services and automate compliance. Over 150+ Cloudnosys best practice rules track and monitor your AWS services for security and compliance violations. Dashboard and reports keep you fully informed of any Risks. – Agentless! • Continuous Security & Compliance Scanning • Alert on Vulnerabilities • Audit Reports on Security and Compliance • Fast Remediation • Supports GDPR, PCI-DSS, HIPPA, AWS CIS Benchmark and FISMA mandates © 2020 - Cloudnosys | Security, Compliance.
  • 20. CloudEye Active Security Defence System Visibility • Asset Discovery • Configurations • Alerts & Drifts • IAM Controls Everything visible and secure Governance • Policy Guardrails • Auto Enforcement • DevSecOps Management • Custom Policies Accountability and control Compliance • PCI, HIPAA, NIST & more • Risk Assessments • Audit Reports • Vulnerability & Remediation Continuous compliance
  • 21. Compliance Simplified – All Controls Mapped Generate auditor ready compliance reports without specialized knowledge
  • 22.
  • 23.
  • 24.
  • 25. Reporting: Compliance and Security Security and Compliance reports shows, alerts, violations and how to remediate these quickly to avoid any Cyber attacks. This is generated on the fly after scanning all Cloud Services © 2020 - Cloudnosys | Security, Compliance
  • 26. Q & A - ANY QUESTIONS? Type in your questions in chat box now… Try Cloudnosys For 14 Days Free Start monitoring, optimizing and securing your AWS. No Limits evaluation. © 2020 - Cloudnosys | Security, Compliance. info@Cloudnosys.com

Notas do Editor

  1. Three cores areas to focus on for building Cloud COE to run at scale. These also align to well architected framework for the cloud.
  2. cloud is nothing more then lego blocks, each block has its set of controls or configurations. You need to master them, control them and monitor them for changes and perform risk management.
  3. Velocity means better have a well defined automated process, or else you will loose the cloud race and get ready for a breach.
  4. Policies are your guardrails and this is where you focus. Polices are configurations that’s all.
  5. Start with Cloud vendors tool, then try to consolidate all the data and build out an alert and reporting system. You can also look for tools that augment this like a opensource tool called Cloudcustodian.
  6. Start small and simple and then fan out as yo grow
  7. The hard part is building APIs based control and tht is where most people fail. If you don’t have time for this, then invest in a COTS products like Cloudnosys.
  8. This is what you need when someone comes to you and say we need a GDPR report on our infra. You should be able to do this in 5 min or less, if you have all the automation build out.
  9. WE mapped all the controls already and coded that to run at scale for all clouds.
  10. Summary of all your security risks
  11. A business view for compliance engineers to give them information on what is failing and where for which compliaces.
  12. Lots of security framework and compliance standards
  13. Reproting is key and also available in JSON format to feed into 3rd party GRC and SIEM system.