SlideShare uma empresa Scribd logo
1 de 21
I’m a security architect with my head in the cloud
Oct 2018
Francesco Cipollone
David Boda
Public
Intro to the talk
Public
Agenda
• Security architecture – traditional vs cloud
• Cloud – what’s different?
• Intro to Camelot and our AWS journey
• How to sell cloud security architecture to the business
• What worked for us and what did not work so well
• Key Take aways
Our Agenda
Public
Intro
Francesco Cipollone
Cloud Security Architect @ Camelot
Francesco is a security Consultant focused on Cloud problems working as Security Architect in Camelot
@FraSEC42
David Boda
Head of Information security @ Camelot
David Boda is the Head of information security at Camelot
Public
Intro to Security Architecture
• What is a security architect?
• What’s the architect role in the strategy?
• What is the role of a security architect in this
modern word ?
• What is the added value?
Public
What is this cloud and can I have a piece of it
• Cloud: Just someone else’s computer
• Comes in different flavours and acronyms:
IaaS, PaaS, SaaS, IDaaS…
• Scalable and ‘rapid’
• Different models: Cloud provider or specific
service providers
Public
Challenges of a Security Architect
• Traditional challenge of a security
architect
• Cloud challenges plus a bag of classical
security issues
• Tech Stack constant changing
Bringing it all together
• Why is the cloud different?
• Note – we will be focusing on AWS
• Due diligence on SaaS and PaaS
Public
Security @ Camelot
APPs
interfaces
code
Terminals
Datacentre
Physical/Cloud
Payment Interfaces
Infrastructure
Cloud solution (SaaS)
accounts
...as well as supporting
our sister business and
it’s customers
VSATs
Retailers
Draws Offices
Staff
800+ High tier prize
payments / yr 5000 investigations / yr
Public
Journey to AWS
Public
How to sell security architecture to the business?
• How do we do it in Camelot?
• What has worked and what has not worked?
Public
Security Architecture – Selling Point
• Security by design – avoid delays
• Minimal incremental security improvements
• Effective and efficient controls
• Strategy and vision built in each project
Cloud Architecture – Is it just blueprint right?
• Architecting in cloud is different
Technology
• Leveraging on blueprints
• Looking forward and thinking
strategically is challenging
• Everyone thinks is an architect in the
cloud
• Challenges for Security as anyone
spins services
Public
Traditional vs Cloud Security Architecture
• Traditional vs cloud
• Different Technology
• Different patterns
• Some similarities (e.g. IaaS
traditional)
Public
Cloud Architecture – Examples – where it did work
Where it did work:
• Cloud transformation supported
by strategy
• Strong Foundation
• Use of native controls
• Monitoring and alerting
• Make use of automation
• Train and plan hiring
Public
Cloud Architecture – Examples – where it didn't work
Where it didn’t work:
• Weak Foundation
• No management involved/strategy
• Weak Processes
• No monitoring/Alerting
• No plan in hiring
Public
Cloud Security Incidents management in the cloud
• You can’t pull cables in the cloud
• Incident management and detecting can be harder
• Monitor and alerting on billing and your resources
• Education on the various services…is not just
another VM in the Datacentre
• Prevention of spinning up expensive service with
policies
Public
Key Take Away
Cloud transformations can be a treacherous journey
especially for security professionals:
- Cloud is different than traditional
- Do your due diligence up front
- Start early create a solid foundation
- Automate where possible
- Native cloud controls! Use them
- Decisions based on risk
- Skill shortage: be prepared to learn
Public
Why do we do all this - Video
Public
Q&A
Public
Get in touch
Get in touch:
FC-LinkedIn
Camelot Careers
Thank you
@FraSEC42
DB-LinkedIn
Public

Mais conteúdo relacionado

Mais procurados

Sask 3.0 Summit David G. Brown
Sask 3.0 Summit David G. BrownSask 3.0 Summit David G. Brown
Sask 3.0 Summit David G. Brown
SaskSummit
 
Cloud computing elisheba wiggins
Cloud computing elisheba wigginsCloud computing elisheba wiggins
Cloud computing elisheba wiggins
Elisheba Wiggins
 
Barriers to mana
Barriers to manaBarriers to mana
Barriers to mana
Karl Donert
 

Mais procurados (20)

Fog Computing & Emerging Technologies
Fog Computing & Emerging TechnologiesFog Computing & Emerging Technologies
Fog Computing & Emerging Technologies
 
Sask 3.0 Summit David G. Brown
Sask 3.0 Summit David G. BrownSask 3.0 Summit David G. Brown
Sask 3.0 Summit David G. Brown
 
Codestone Cloud in a Box Overview
Codestone Cloud in a Box OverviewCodestone Cloud in a Box Overview
Codestone Cloud in a Box Overview
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
 
Fundraising and Technology: A Match Made in the Cloud
Fundraising and Technology: A Match Made in the CloudFundraising and Technology: A Match Made in the Cloud
Fundraising and Technology: A Match Made in the Cloud
 
Domain Driven Design - garajco Education 2017
Domain Driven Design - garajco Education 2017Domain Driven Design - garajco Education 2017
Domain Driven Design - garajco Education 2017
 
Capacity Management for a Digital and Agile World
Capacity Management for a Digital and Agile WorldCapacity Management for a Digital and Agile World
Capacity Management for a Digital and Agile World
 
Cloud overview slideshare
Cloud overview   slideshareCloud overview   slideshare
Cloud overview slideshare
 
Storage as a service v4 eng
Storage as a service v4 engStorage as a service v4 eng
Storage as a service v4 eng
 
Cloud computing elisheba wiggins
Cloud computing elisheba wigginsCloud computing elisheba wiggins
Cloud computing elisheba wiggins
 
Group 2 - Cloud Storage
Group 2 - Cloud StorageGroup 2 - Cloud Storage
Group 2 - Cloud Storage
 
IoT 2014 global challenges
IoT 2014 global challengesIoT 2014 global challenges
IoT 2014 global challenges
 
Introduction to the Typesafe Reactive Platform
Introduction to the Typesafe Reactive PlatformIntroduction to the Typesafe Reactive Platform
Introduction to the Typesafe Reactive Platform
 
Cloud computing-pdf
Cloud computing-pdfCloud computing-pdf
Cloud computing-pdf
 
Romi tech cloud workspace overview
Romi tech   cloud workspace overviewRomi tech   cloud workspace overview
Romi tech cloud workspace overview
 
The Future of IT Infrastructure is Hybrid and on Demand
The Future of IT Infrastructure is Hybrid and on DemandThe Future of IT Infrastructure is Hybrid and on Demand
The Future of IT Infrastructure is Hybrid and on Demand
 
Barriers to mana
Barriers to manaBarriers to mana
Barriers to mana
 
Webinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownWebinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs Down
 
Using OpenStack to Control VM Chaos
Using OpenStack to Control VM ChaosUsing OpenStack to Control VM Chaos
Using OpenStack to Control VM Chaos
 
Shamit Khemka talks about facts on cloud computing helping small business to ...
Shamit Khemka talks about facts on cloud computing helping small business to ...Shamit Khemka talks about facts on cloud computing helping small business to ...
Shamit Khemka talks about facts on cloud computing helping small business to ...
 

Semelhante a Camelot - Manyhats club meetup 23 10 18

Bmit cloud market_survey_visterin_2013
Bmit cloud market_survey_visterin_2013Bmit cloud market_survey_visterin_2013
Bmit cloud market_survey_visterin_2013
William Visterin
 

Semelhante a Camelot - Manyhats club meetup 23 10 18 (20)

Practical Microservice Architecture (edition 2022).pdf
Practical Microservice Architecture (edition 2022).pdfPractical Microservice Architecture (edition 2022).pdf
Practical Microservice Architecture (edition 2022).pdf
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover Track
 
Bmit cloud market_survey_visterin_2013
Bmit cloud market_survey_visterin_2013Bmit cloud market_survey_visterin_2013
Bmit cloud market_survey_visterin_2013
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover Track
 
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologySo you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technology
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
 
MCM_Publicv1.01.pptx
MCM_Publicv1.01.pptxMCM_Publicv1.01.pptx
MCM_Publicv1.01.pptx
 
Neo4j + Process Tempo present Plan Your Cloud Migration with Confidence
Neo4j + Process Tempo present Plan Your Cloud Migration with ConfidenceNeo4j + Process Tempo present Plan Your Cloud Migration with Confidence
Neo4j + Process Tempo present Plan Your Cloud Migration with Confidence
 
Choosing Public vs. Private vs. Hybrid Cloud Computing
Choosing Public vs. Private vs. Hybrid Cloud ComputingChoosing Public vs. Private vs. Hybrid Cloud Computing
Choosing Public vs. Private vs. Hybrid Cloud Computing
 
Architecting your way up in the cloud
Architecting your way up in the cloudArchitecting your way up in the cloud
Architecting your way up in the cloud
 
Avoiding Cloud Computing Planning & Implementation Failure
Avoiding Cloud Computing Planning & Implementation FailureAvoiding Cloud Computing Planning & Implementation Failure
Avoiding Cloud Computing Planning & Implementation Failure
 
Thin Air or Solid Ground? Practical Cloud Security
Thin Air or Solid Ground? Practical Cloud SecurityThin Air or Solid Ground? Practical Cloud Security
Thin Air or Solid Ground? Practical Cloud Security
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Cloud computing essentials
Cloud computing essentialsCloud computing essentials
Cloud computing essentials
 
Single Realm Multi-Cloud Security Management with Palo Alto Networks
Single Realm Multi-Cloud Security Management with Palo Alto NetworksSingle Realm Multi-Cloud Security Management with Palo Alto Networks
Single Realm Multi-Cloud Security Management with Palo Alto Networks
 
How To Leverage Cloud Computing for Business & Operational Benefit - CAMP IT
How To Leverage Cloud Computing for Business & Operational Benefit - CAMP ITHow To Leverage Cloud Computing for Business & Operational Benefit - CAMP IT
How To Leverage Cloud Computing for Business & Operational Benefit - CAMP IT
 
Conversations in the Cloud
Conversations in the CloudConversations in the Cloud
Conversations in the Cloud
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
 
What the auditor need to know about cloud computing
What the auditor need to know about cloud computingWhat the auditor need to know about cloud computing
What the auditor need to know about cloud computing
 
Moving to the Cloud-How to Develop Cloud Strategy for Your Organization
Moving to the Cloud-How to Develop Cloud Strategy for Your OrganizationMoving to the Cloud-How to Develop Cloud Strategy for Your Organization
Moving to the Cloud-How to Develop Cloud Strategy for Your Organization
 

Mais de NSC42 Ltd

Mais de NSC42 Ltd (9)

Nsc42 the security phoenix
Nsc42 the security phoenixNsc42 the security phoenix
Nsc42 the security phoenix
 
Nsc42 - the security phoenix devsecops - risk-present_0_3 share
Nsc42 - the security phoenix devsecops - risk-present_0_3 shareNsc42 - the security phoenix devsecops - risk-present_0_3 share
Nsc42 - the security phoenix devsecops - risk-present_0_3 share
 
The security phoenix - from the ashes of DEV-OPS Appsec California 2020
The security phoenix - from the ashes of DEV-OPS Appsec California 2020The security phoenix - from the ashes of DEV-OPS Appsec California 2020
The security phoenix - from the ashes of DEV-OPS Appsec California 2020
 
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_shareNsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
 
Nsc42-CSA AGM is the cloud secure - is easy if you do it smart
Nsc42-CSA AGM is the cloud secure - is easy if you do it smartNsc42-CSA AGM is the cloud secure - is easy if you do it smart
Nsc42-CSA AGM is the cloud secure - is easy if you do it smart
 
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
 
Nsc42 - is the cloud secure - is easy if you do it smart UNICOM
Nsc42 - is the cloud secure - is easy if you do it smart UNICOMNsc42 - is the cloud secure - is easy if you do it smart UNICOM
Nsc42 - is the cloud secure - is easy if you do it smart UNICOM
 
Nsc42 - is the cloud secure - is easy if you do it smart Cybersecurity&Cloud ...
Nsc42 - is the cloud secure - is easy if you do it smart Cybersecurity&Cloud ...Nsc42 - is the cloud secure - is easy if you do it smart Cybersecurity&Cloud ...
Nsc42 - is the cloud secure - is easy if you do it smart Cybersecurity&Cloud ...
 
CSA - Nsc42 - London chapter keynote - cloud transformation security challenges
 CSA - Nsc42 - London chapter keynote - cloud transformation security challenges CSA - Nsc42 - London chapter keynote - cloud transformation security challenges
CSA - Nsc42 - London chapter keynote - cloud transformation security challenges
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Camelot - Manyhats club meetup 23 10 18

  • 1. I’m a security architect with my head in the cloud Oct 2018 Francesco Cipollone David Boda Public
  • 2. Intro to the talk Public
  • 3. Agenda • Security architecture – traditional vs cloud • Cloud – what’s different? • Intro to Camelot and our AWS journey • How to sell cloud security architecture to the business • What worked for us and what did not work so well • Key Take aways Our Agenda Public
  • 4. Intro Francesco Cipollone Cloud Security Architect @ Camelot Francesco is a security Consultant focused on Cloud problems working as Security Architect in Camelot @FraSEC42 David Boda Head of Information security @ Camelot David Boda is the Head of information security at Camelot Public
  • 5. Intro to Security Architecture • What is a security architect? • What’s the architect role in the strategy? • What is the role of a security architect in this modern word ? • What is the added value? Public
  • 6. What is this cloud and can I have a piece of it • Cloud: Just someone else’s computer • Comes in different flavours and acronyms: IaaS, PaaS, SaaS, IDaaS… • Scalable and ‘rapid’ • Different models: Cloud provider or specific service providers Public
  • 7. Challenges of a Security Architect • Traditional challenge of a security architect • Cloud challenges plus a bag of classical security issues • Tech Stack constant changing
  • 8. Bringing it all together • Why is the cloud different? • Note – we will be focusing on AWS • Due diligence on SaaS and PaaS Public
  • 9. Security @ Camelot APPs interfaces code Terminals Datacentre Physical/Cloud Payment Interfaces Infrastructure Cloud solution (SaaS) accounts ...as well as supporting our sister business and it’s customers VSATs Retailers Draws Offices Staff 800+ High tier prize payments / yr 5000 investigations / yr Public
  • 11. How to sell security architecture to the business? • How do we do it in Camelot? • What has worked and what has not worked? Public
  • 12. Security Architecture – Selling Point • Security by design – avoid delays • Minimal incremental security improvements • Effective and efficient controls • Strategy and vision built in each project
  • 13. Cloud Architecture – Is it just blueprint right? • Architecting in cloud is different Technology • Leveraging on blueprints • Looking forward and thinking strategically is challenging • Everyone thinks is an architect in the cloud • Challenges for Security as anyone spins services Public
  • 14. Traditional vs Cloud Security Architecture • Traditional vs cloud • Different Technology • Different patterns • Some similarities (e.g. IaaS traditional) Public
  • 15. Cloud Architecture – Examples – where it did work Where it did work: • Cloud transformation supported by strategy • Strong Foundation • Use of native controls • Monitoring and alerting • Make use of automation • Train and plan hiring Public
  • 16. Cloud Architecture – Examples – where it didn't work Where it didn’t work: • Weak Foundation • No management involved/strategy • Weak Processes • No monitoring/Alerting • No plan in hiring Public
  • 17. Cloud Security Incidents management in the cloud • You can’t pull cables in the cloud • Incident management and detecting can be harder • Monitor and alerting on billing and your resources • Education on the various services…is not just another VM in the Datacentre • Prevention of spinning up expensive service with policies Public
  • 18. Key Take Away Cloud transformations can be a treacherous journey especially for security professionals: - Cloud is different than traditional - Do your due diligence up front - Start early create a solid foundation - Automate where possible - Native cloud controls! Use them - Decisions based on risk - Skill shortage: be prepared to learn Public
  • 19. Why do we do all this - Video Public
  • 21. Get in touch Get in touch: FC-LinkedIn Camelot Careers Thank you @FraSEC42 DB-LinkedIn Public