SlideShare uma empresa Scribd logo
1 de 21
CLOUD SECURITY ZEN:
PRINCIPLES TO MEDITATE ON
Sam Reed, Principal Consultant @ Vallation Security Inc.
DOMAINS IN FOCUS
Deployment
Access
Management
Segmentation
Logging &
Auditing
PRINCIPLES
1. Reduce attack surface of the cloud environment
2. Address the scenario of compromised employees
3. Restrict points of access down to a small number of assets
4. Audit employee access and changes to the environment
5. Take advantage of the benefits of cloud computing
CONSTRAINTS
• Cloud Provider Variations
• Program Maturity & Your Roadmap
• Build vs. Buy
• Your Specific Industry
CLOUD SECURITY PRACTICES
New Capabilities
New Responsibilities
New Practices
WHO IS RESPONSIBLE?
• Security Operations Teams (SecOps)
• Product/Application Security Teams (Service or Secure Engineering Models)
• Engineering and/or DevOps Teams
• Tools Teams (Owners of CI Tools, Deployment Tools, Asset Visibility Tools, Etc. )
• Operations Teams (Product Responsibilities)
• Information Technology (IT) Teams (Corporate Network Responsibilities)
• Incident Response (IR) Teams
WHAT DO CLOUD DEPLOYMENTS
LOOK LIKE?
• Agile Development Process
• Continuous Integration (CI) tools and deployment
pipeline tools
• Frequent deployments
• Micro services supported by persistent data store
• Separate staging and production environments
• Scaling based on load/demand
WHAT DO CLOUD DEPLOYMENTS
LOOK LIKE?
• Monitoring tracks environmental health
• Agents installed on instances
• Traffic control for instances
• Emergency rollbacks to a sane environment
• Logs streamed off instances to backend
• Perfect, or near perfect, asset visibility
HOW DO ATTACKERS TARGET THESE
TYPES OF ENVIRONMENTS?
• Drive-by attackers will continue to
assault your gates with bananas
• Same defensive measures as standard
in industry
• But for the sophisticated attacker, it is
far more interesting…
HOW DO ATTACKERS TARGET THESE
TYPES OF ENVIRONMENTS?
• Employees are the best target to grab
provider account credentials
• Know your deployment model and how
to achieve persistence
• Take advantage of historical
weaknesses in cloud environments
• Target systems that may be confused
deputies
CI TOOLS
• Involvement in the development
process
• Third party tool integration
• Custom security tool integration
• Answering questions about the product
Developers
CI Tools
Deployment
Tool
DEPLOYMENT TOOLS
• Delegate for Account Credentials
• Emergency Patching
• Business Continuity
• The tool handles the sensitive data
(though may not store it): certificates,
secrets, keys, etc.
DEPLOYMENT TOOLS
• Tear-down deployment strategies
• Tools identify deviation at key events
• Pre-made safe
configurations/images/etc.
• Integration with monitoring
ASSET VISIBILITY
• Provider APIs give visibility into the environment
• Real-time awareness of the environment
• Know what the outside sees and can touch, knows everything about the internal
environment
• Security toolchains driven by asset tools
• Scanning Depth
• Tool Configurations
• Asset Configuration
MICROSERVICE MODEL
• Compact code bases
• Lower frequency of changes
• Security investment strategies
• Who can play with the turtle?
• Monitoring product behavior…
LOGGING & AUDITING
• All tools provide valuable data for potential security events
• Logs driven off instance ASAP
• Consider what has been lost, and how it will be replaced
• In house tools
• Security events selected on their confidence/”true positive” issues
• Identify the differences in what is expected: this is stepping outside the security posture
• Identify the anomaly in the environment: this could be an attacker
SEGMENTATION
• External Segmentation
• Isolate the Backend
• Allow access through an ”edge”
• Regular verification
• Regular security testing
• Regular code audits
• Cautionary Forensics
SEGMENTATION
• Internal Segmentation
• Isolate Employees
• Isolate Sensitive Data
• Isolate Applications
• Regular monitoring to determine
deviance from the expected
configuration
• Multiple cloud providers
SCALING
• Challenges to attacker persistence
• Impact on DDoS
• Impact on purchased solutions
• Not all licensing models are amendable to being spun up on demand
• A lot of gaps for security tools we used to consider traditional…
• …but providers are starting to provide equivalents and obtain compliance
QUESTIONS?
THANK YOU!
Please feel free to reach out to me at sam@vallationsec.com.

Mais conteúdo relacionado

Mais procurados

Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
Black Duck by Synopsys
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
CloudPassage
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the Cloud
CloudPassage
 

Mais procurados (20)

Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Tools
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developer
 
Risks vs real life
Risks vs real lifeRisks vs real life
Risks vs real life
 
21.06.2017 - KYOS Breakfast Event
21.06.2017 - KYOS Breakfast Event 21.06.2017 - KYOS Breakfast Event
21.06.2017 - KYOS Breakfast Event
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero Trust
 
Qradar as a SOC core
Qradar as a SOC coreQradar as a SOC core
Qradar as a SOC core
 
Positive Hack Days 7 - Ransomware forensiсs
Positive Hack Days 7 - Ransomware forensiсsPositive Hack Days 7 - Ransomware forensiсs
Positive Hack Days 7 - Ransomware forensiсs
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOps
 
BeyondCorp Seattle Meetup: Closing the Adherence Gap
BeyondCorp Seattle Meetup: Closing the Adherence GapBeyondCorp Seattle Meetup: Closing the Adherence Gap
BeyondCorp Seattle Meetup: Closing the Adherence Gap
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
Managing risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextManaging risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business context
 
Moving Security to the Left
Moving Security to the LeftMoving Security to the Left
Moving Security to the Left
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the Cloud
 

Semelhante a Cloud Security Zen: Principles to Meditate On

Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Decisions
 

Semelhante a Cloud Security Zen: Principles to Meditate On (20)

For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
Top Azure security fails and how to avoid them
Top Azure security fails and how to avoid themTop Azure security fails and how to avoid them
Top Azure security fails and how to avoid them
 
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Staying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave MillierStaying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave Millier
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
 
Practical Defense
Practical DefensePractical Defense
Practical Defense
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
A journey into Application Security
A journey into Application SecurityA journey into Application Security
A journey into Application Security
 
Module 6.pptx
Module 6.pptxModule 6.pptx
Module 6.pptx
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Cloud Security Zen: Principles to Meditate On

  • 1. CLOUD SECURITY ZEN: PRINCIPLES TO MEDITATE ON Sam Reed, Principal Consultant @ Vallation Security Inc.
  • 3. PRINCIPLES 1. Reduce attack surface of the cloud environment 2. Address the scenario of compromised employees 3. Restrict points of access down to a small number of assets 4. Audit employee access and changes to the environment 5. Take advantage of the benefits of cloud computing
  • 4. CONSTRAINTS • Cloud Provider Variations • Program Maturity & Your Roadmap • Build vs. Buy • Your Specific Industry
  • 5. CLOUD SECURITY PRACTICES New Capabilities New Responsibilities New Practices
  • 6. WHO IS RESPONSIBLE? • Security Operations Teams (SecOps) • Product/Application Security Teams (Service or Secure Engineering Models) • Engineering and/or DevOps Teams • Tools Teams (Owners of CI Tools, Deployment Tools, Asset Visibility Tools, Etc. ) • Operations Teams (Product Responsibilities) • Information Technology (IT) Teams (Corporate Network Responsibilities) • Incident Response (IR) Teams
  • 7. WHAT DO CLOUD DEPLOYMENTS LOOK LIKE? • Agile Development Process • Continuous Integration (CI) tools and deployment pipeline tools • Frequent deployments • Micro services supported by persistent data store • Separate staging and production environments • Scaling based on load/demand
  • 8. WHAT DO CLOUD DEPLOYMENTS LOOK LIKE? • Monitoring tracks environmental health • Agents installed on instances • Traffic control for instances • Emergency rollbacks to a sane environment • Logs streamed off instances to backend • Perfect, or near perfect, asset visibility
  • 9. HOW DO ATTACKERS TARGET THESE TYPES OF ENVIRONMENTS? • Drive-by attackers will continue to assault your gates with bananas • Same defensive measures as standard in industry • But for the sophisticated attacker, it is far more interesting…
  • 10. HOW DO ATTACKERS TARGET THESE TYPES OF ENVIRONMENTS? • Employees are the best target to grab provider account credentials • Know your deployment model and how to achieve persistence • Take advantage of historical weaknesses in cloud environments • Target systems that may be confused deputies
  • 11. CI TOOLS • Involvement in the development process • Third party tool integration • Custom security tool integration • Answering questions about the product Developers CI Tools Deployment Tool
  • 12. DEPLOYMENT TOOLS • Delegate for Account Credentials • Emergency Patching • Business Continuity • The tool handles the sensitive data (though may not store it): certificates, secrets, keys, etc.
  • 13. DEPLOYMENT TOOLS • Tear-down deployment strategies • Tools identify deviation at key events • Pre-made safe configurations/images/etc. • Integration with monitoring
  • 14. ASSET VISIBILITY • Provider APIs give visibility into the environment • Real-time awareness of the environment • Know what the outside sees and can touch, knows everything about the internal environment • Security toolchains driven by asset tools • Scanning Depth • Tool Configurations • Asset Configuration
  • 15. MICROSERVICE MODEL • Compact code bases • Lower frequency of changes • Security investment strategies • Who can play with the turtle? • Monitoring product behavior…
  • 16. LOGGING & AUDITING • All tools provide valuable data for potential security events • Logs driven off instance ASAP • Consider what has been lost, and how it will be replaced • In house tools • Security events selected on their confidence/”true positive” issues • Identify the differences in what is expected: this is stepping outside the security posture • Identify the anomaly in the environment: this could be an attacker
  • 17. SEGMENTATION • External Segmentation • Isolate the Backend • Allow access through an ”edge” • Regular verification • Regular security testing • Regular code audits • Cautionary Forensics
  • 18. SEGMENTATION • Internal Segmentation • Isolate Employees • Isolate Sensitive Data • Isolate Applications • Regular monitoring to determine deviance from the expected configuration • Multiple cloud providers
  • 19. SCALING • Challenges to attacker persistence • Impact on DDoS • Impact on purchased solutions • Not all licensing models are amendable to being spun up on demand • A lot of gaps for security tools we used to consider traditional… • …but providers are starting to provide equivalents and obtain compliance
  • 21. THANK YOU! Please feel free to reach out to me at sam@vallationsec.com.

Notas do Editor

  1. Covered Microservice Testing Already