SlideShare uma empresa Scribd logo
1 de 41
@RADUVUNVULEA
COVID-19 IS A CLOUD SECURITY
CATALYST
GLOBAL ADOPTION OF DIGITIZATION HAS
INCREASED TO 55% IN THE LAST SEVEN
YEARS
h t t p s : / / w w w . m c k i n s e y. c o m / b u s i n e s s - f u n c t i o n s / s t r a t e g y - a n d - c o r p o r a t e - f i n a n c e / o u r - i n s i g h t s / h o w - c o v i d - 1 9 - h a s - p u s h e d - c o m p a n i e s - o v e r - t h e - t e c h n o l o g y - t i p p i n g - p o i n t - a n d - t r a n s f o r m e d - b u s i n e s s - f o r e v e r
48% HAD TO ACCELERATE CLOUD MIGRATION
DURING THE PANDEMIC
h t t p s : / / w w w . c e n t r i f y. c o m /
h t t p s : / / w w w . c e n t r i f y. c o m /
60% ADJUSTED CLOUD CYBERSECURITY
POSTURES AS A RESULT OF DISTRIBUTED
WORKFORCES
60% ADJUSTED CLOUD CYBERSECURITY
POSTURES AS A RESULT OF DISTRIBUTED
WORKFORCES
h t t p s : / / w w w . c e n t r i f y. c o m /
TOP PRIORITIES FOR THE NEXT YEAR:
• 38% SECURING REMOTE WORKFORCE
• 36% USING CLOUD NATIVE SERVICES
COVID-19 SECURITY
IMPACT
H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L
COVID-19 SECURITY
IMPACT
H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L
250% increase of
cyber-attacks in EU
H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L
273% increase of large-scale
breaches in 2020
COVID-19 SECURITY
IMPACT
H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L
47% of individuals fall for phishing
scams while working at home
COVID-19 SECURITY
IMPACT
H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L
Phishing attacks increased by
350%
COVID-19 SECURITY
IMPACT
H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L
February to May 2020 more than 500.000
people globally were affected by breaches
where personal data of video conferencing
users was stolen and sold on the dark web.
WHAT ABOUT CLOUD?
H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L
INCREASES IN CLOUD WORKLOADS PER REGION
INCREASES IN CLOUD WORKLOADS BY INDUSTRY
H T T P S : / / W W W . P A L O A L T O N E T W O R K S . C O M / R E S O U R C E S / I N F O G R A P H I C S / U N I T 4 2 - C O V I D - 1 9 - A M P L I F I E S - C L O U D - S E C U R I T Y - C H A L L E N G E S
VEEAM | 200GB | CUSTOMER DATA |
AWS S3
AWS EC2 | PUBLIC IP | UNSECURE
DATABASE
https://www.venafi.com/blog/7 -data-breaches-caused-human-error-did-encryption-play-role
Dev Hero
Repository
(e.g. GitHub
Application Repo
CI/CD Machine(s)
Infrastructure Repo
Pipelines Repo
Pipeline Dev
Pipeline Testing
Pipeline Production
Storage
Account Key
OPERATION
AUDIT
LOG
MANAGEMENT
ACCESS
CONTROL
AUTHORIZATION
AUTHENTIFICATION
CLOUD PLATFORM PROTECTION
CLOUD PRODUCT PROTECTION
DATA PROTECTION PRODUCT
CLOUD ENV PROTECTION
PHYSICAL
SECURITY
HW
SECURITY
VRTLZTN
SECURITY
DATA
ENCRYPTION
DATA
RECOVERY
DATA
INTEGRITY
DATA
DISCOVERY
DATA
DESENSITIZATION DLP
DDOS WAF
THREAD
DETECTION
WHAT CAN
WE DO?
WHAT CAN WE DO?
Limit the use the cloud preview
services and features
Private preview
Public preview
General Availability
NO SLA
NO FORMAL SUPPORT
NO SLA
SLA
FORMAL SUPPORT
PRODUCTION &
PERSONAL / SENSITIVE
DATA ENV
WHAT CAN WE DO?
Limit the use the cloud preview
services and features
Private preview
Public preview
General Availability
NO SLA
NO FORMAL SUPPORT
SLA
FORMAL SUPPORT
HTTPS://AZURE.MICROSOFT.COM/EN-US/SERVICE
HTTPS://DOCS.MICROSOFT.COM/EN-US/AZURE/SEARCH/SEARCH-API-PREVIEW
WHAT CAN WE DO?
MORE:
Education
LESS:
Neglect and ignore
IT
HR
FINANCIAL
…
HTTPS://PARTNER.MICROSOFT.COM/EN-US/TRAINING/TRAINING-CENTER
HTTPS://EXPLORE.SKILLBUILDER.AWS/LEARN/SIGNIN
WHAT CAN WE DO?
MORE:
Identity and Access Management
LESS:
’Master users’
‘Account master keys/tokens’
IAM POLICIES
AZURE AD RBAC
AWS SIGNATURE
AZURE SAS
LIMIT ANONYMOUS PUBLIC READ ACCESS
ENABLE FIREWALL RULES
Azure
RBAC
Azure
role-based
access
control
User Group Service
Principal
Managed
Identity
Security Principal
Role
Operation type (R/W/C/D)
Scope
Management Group
Subscription
Resource Group
Resource
Role assignment
Assign a security principal
Assign a scope
Assign a role
Development Group
Contributor
Dev and Playground Resource Group
WHAT CAN WE DO?
MORE:
Secrets scanning
LESS:
Assume that the repo is safe
Secrets scanning
Protectingyourcode,yoursecrets,youridentity
SCAN COMMITS BEFORE A PUSH
(1)Placegit-secretssomewhereinthePATHtobeeasilyaccessiblebygit
(2)./install.ps1|Commandtoinstallgit-secretsonaWindowsmachine
(3)cd/path/RaduVRepo/IoTHome|Navigatetotherepothatyouwanttoprotect.You
needtodothisactionforeachrepositorythatyouwanttosecure
(4)gitsecretsinstall|Installthetool
(5)gitsecrets-register-azure|RegistertheAzureplugin
(6)gitsecrets-register-aws|RegistertheAWSplugin
(7)gitsecrets-register-gcp|RegistertheGCPplugin
Secrets scanning
Protectingyourcode,yoursecrets,youridentity
SCAN COMMITS BEFORE A PUSH
> Reject commits when secrets are detected
PIPELINE INTEGRATION
> Build fail
> Remove secrets
NIGHTLY SCAN
> Remove secrets
> Repository and Pipelines freeze
WHAT CAN WE DO?
MORE:
Tracing and monitoring
LESS:
Rely only on app logs
Metrics
Logs
Audit
Alerts Dashboards
Metric
Explorer
Azure
Monitor
Advisor &
Service
Health
Activity Log
Application
Insights
Security Center
& Defender
Log
Analytics
Network
Monitoring
Service Map
PROCESSED EVENTS DATA PLANE LOGS
CONTROL & MANAGEMENT
LOGS
PROVIDE INFORMATION
ABOUT AZURE RESOURCE
MANAGER CREATE, UPDATE,
AND DELETE OPERATIONS
PROVIDE INFORMATION ABOUT
EVENTS RAISED AS PART OF
AZURE RESOURCE USAGE
PROVIDE INFORMATION ABOUT
ANALYZED EVENTS / ALERTS
THAT HAVE BEEN PROCESSED
ON YOUR BEHALF
Windows Event System, security, and app logs in
a VM and the diagnostics logs that are configured
through Azure Monitor
Azure Security Center alerts where Azure
Security Center has processed and analyzed
your subscription and provides concise
security alerts
Change in a resource configuration,
change of the resource tier size
AZURE MONITORING LOGS
AZURE MONITORING METRICS
WHAT CAN WE DO?
MORE:
Integrate the build-in security systems
LESS:
Rely less on custom dashboards
Azure
Security
Center
Discover
and
assess
the
security
of
your
workloads
Secure Score
Overall secure score
Security controls
Compliance
Azure CIS
PCI DSS 3.2
ISO 2007
SOC TSP
Custom definition
Azure Defender
Security Alerts
Advance Thread
Protection
Vulnerability
assessment and mng
On-premises and
Azure protection
Inventory
Explore, filter and
enhanced your
resources
Azure
Defender
Cloud
workload
protection
Azure Advisor
Proactive,actionable,andpersonalizedbestpracticesrecommendations
Reliability
Security
Performance
Cost
Operational Excellence
FINAL
THOUGHTS
THANK
YOU
@RaduVunvulea
COVID-19 are a cloud security catalyst
COVID-19 are a cloud security catalyst

Mais conteúdo relacionado

Semelhante a COVID-19 are a cloud security catalyst

ICTON 2020 KeyNote: Evolving Network Security & Resilience
ICTON 2020 KeyNote:  Evolving Network Security & ResilienceICTON 2020 KeyNote:  Evolving Network Security & Resilience
ICTON 2020 KeyNote: Evolving Network Security & Resilience
University of Hertfordshire
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
University of Hertfordshire
 
Logistics Warehousing Transportation and Distrbution Analysis and Commentary ...
Logistics Warehousing Transportation and Distrbution Analysis and Commentary ...Logistics Warehousing Transportation and Distrbution Analysis and Commentary ...
Logistics Warehousing Transportation and Distrbution Analysis and Commentary ...
paul young cpa, cga
 

Semelhante a COVID-19 are a cloud security catalyst (20)

Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application Development
 
Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application Development
 
ICTON 2020 KeyNote: Evolving Network Security & Resilience
ICTON 2020 KeyNote:  Evolving Network Security & ResilienceICTON 2020 KeyNote:  Evolving Network Security & Resilience
ICTON 2020 KeyNote: Evolving Network Security & Resilience
 
Let’s spread Phishing and escape the blocklists
Let’s spread Phishing and escape the blocklistsLet’s spread Phishing and escape the blocklists
Let’s spread Phishing and escape the blocklists
 
Internet of Things (IoT) Past, Present, and Future
Internet of Things (IoT) Past, Present, and FutureInternet of Things (IoT) Past, Present, and Future
Internet of Things (IoT) Past, Present, and Future
 
Borcelle.pdf
Borcelle.pdfBorcelle.pdf
Borcelle.pdf
 
Telecom service futures driven by customer need
Telecom service futures driven by customer needTelecom service futures driven by customer need
Telecom service futures driven by customer need
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
 
Dell CIO Rally 2015
Dell CIO Rally 2015Dell CIO Rally 2015
Dell CIO Rally 2015
 
The Red Hat Way
The Red Hat WayThe Red Hat Way
The Red Hat Way
 
Logistics Warehousing Transportation and Distrbution Analysis and Commentary ...
Logistics Warehousing Transportation and Distrbution Analysis and Commentary ...Logistics Warehousing Transportation and Distrbution Analysis and Commentary ...
Logistics Warehousing Transportation and Distrbution Analysis and Commentary ...
 
Logistics Warehousing Transportation and Distrbution Analysis and Commentary ...
Logistics Warehousing Transportation and Distrbution Analysis and Commentary ...Logistics Warehousing Transportation and Distrbution Analysis and Commentary ...
Logistics Warehousing Transportation and Distrbution Analysis and Commentary ...
 
Building Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe HarborBuilding Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe Harbor
 
What is up with the Stock Market - April 2, 2022.pptx
What is up with the Stock Market - April 2, 2022.pptxWhat is up with the Stock Market - April 2, 2022.pptx
What is up with the Stock Market - April 2, 2022.pptx
 
How Romanian companies are developing secure applications on Azure.pptx
How Romanian companies are developing secure applications on Azure.pptxHow Romanian companies are developing secure applications on Azure.pptx
How Romanian companies are developing secure applications on Azure.pptx
 
Transportation and Logistic - Analysis and Commentary - April 2022.pptx
Transportation and Logistic - Analysis and Commentary - April 2022.pptxTransportation and Logistic - Analysis and Commentary - April 2022.pptx
Transportation and Logistic - Analysis and Commentary - April 2022.pptx
 
A Vision for Minnesota Solar: Lessons and Barriers from the North Star State
A Vision for Minnesota Solar: Lessons and Barriers from the North Star StateA Vision for Minnesota Solar: Lessons and Barriers from the North Star State
A Vision for Minnesota Solar: Lessons and Barriers from the North Star State
 
How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.
 
EMA Network Security Survey and Recommendations
EMA Network Security Survey and RecommendationsEMA Network Security Survey and Recommendations
EMA Network Security Survey and Recommendations
 
Customer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfCustomer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdf
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

COVID-19 are a cloud security catalyst

  • 1.
  • 2. @RADUVUNVULEA COVID-19 IS A CLOUD SECURITY CATALYST
  • 3. GLOBAL ADOPTION OF DIGITIZATION HAS INCREASED TO 55% IN THE LAST SEVEN YEARS h t t p s : / / w w w . m c k i n s e y. c o m / b u s i n e s s - f u n c t i o n s / s t r a t e g y - a n d - c o r p o r a t e - f i n a n c e / o u r - i n s i g h t s / h o w - c o v i d - 1 9 - h a s - p u s h e d - c o m p a n i e s - o v e r - t h e - t e c h n o l o g y - t i p p i n g - p o i n t - a n d - t r a n s f o r m e d - b u s i n e s s - f o r e v e r
  • 4. 48% HAD TO ACCELERATE CLOUD MIGRATION DURING THE PANDEMIC h t t p s : / / w w w . c e n t r i f y. c o m /
  • 5. h t t p s : / / w w w . c e n t r i f y. c o m / 60% ADJUSTED CLOUD CYBERSECURITY POSTURES AS A RESULT OF DISTRIBUTED WORKFORCES
  • 6. 60% ADJUSTED CLOUD CYBERSECURITY POSTURES AS A RESULT OF DISTRIBUTED WORKFORCES h t t p s : / / w w w . c e n t r i f y. c o m / TOP PRIORITIES FOR THE NEXT YEAR: • 38% SECURING REMOTE WORKFORCE • 36% USING CLOUD NATIVE SERVICES
  • 7. COVID-19 SECURITY IMPACT H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L
  • 8. COVID-19 SECURITY IMPACT H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L 250% increase of cyber-attacks in EU
  • 9. H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L 273% increase of large-scale breaches in 2020
  • 10. COVID-19 SECURITY IMPACT H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L 47% of individuals fall for phishing scams while working at home
  • 11. COVID-19 SECURITY IMPACT H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L Phishing attacks increased by 350%
  • 12. COVID-19 SECURITY IMPACT H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L February to May 2020 more than 500.000 people globally were affected by breaches where personal data of video conferencing users was stolen and sold on the dark web.
  • 13. WHAT ABOUT CLOUD? H T T P S : / / W W W 2 . D E L O I T T E . C O M / C H / E N / P A G E S / R I S K / A R T I C L E S / I M P A C T - C O V I D - C Y B E R S E C U R I T Y . H T M L
  • 14. INCREASES IN CLOUD WORKLOADS PER REGION INCREASES IN CLOUD WORKLOADS BY INDUSTRY H T T P S : / / W W W . P A L O A L T O N E T W O R K S . C O M / R E S O U R C E S / I N F O G R A P H I C S / U N I T 4 2 - C O V I D - 1 9 - A M P L I F I E S - C L O U D - S E C U R I T Y - C H A L L E N G E S
  • 15. VEEAM | 200GB | CUSTOMER DATA | AWS S3 AWS EC2 | PUBLIC IP | UNSECURE DATABASE https://www.venafi.com/blog/7 -data-breaches-caused-human-error-did-encryption-play-role
  • 16. Dev Hero Repository (e.g. GitHub Application Repo CI/CD Machine(s) Infrastructure Repo Pipelines Repo Pipeline Dev Pipeline Testing Pipeline Production Storage Account Key
  • 17. OPERATION AUDIT LOG MANAGEMENT ACCESS CONTROL AUTHORIZATION AUTHENTIFICATION CLOUD PLATFORM PROTECTION CLOUD PRODUCT PROTECTION DATA PROTECTION PRODUCT CLOUD ENV PROTECTION PHYSICAL SECURITY HW SECURITY VRTLZTN SECURITY DATA ENCRYPTION DATA RECOVERY DATA INTEGRITY DATA DISCOVERY DATA DESENSITIZATION DLP DDOS WAF THREAD DETECTION
  • 19. WHAT CAN WE DO? Limit the use the cloud preview services and features Private preview Public preview General Availability NO SLA NO FORMAL SUPPORT NO SLA SLA FORMAL SUPPORT
  • 20. PRODUCTION & PERSONAL / SENSITIVE DATA ENV WHAT CAN WE DO? Limit the use the cloud preview services and features Private preview Public preview General Availability NO SLA NO FORMAL SUPPORT SLA FORMAL SUPPORT
  • 22. WHAT CAN WE DO? MORE: Education LESS: Neglect and ignore IT HR FINANCIAL …
  • 24. WHAT CAN WE DO? MORE: Identity and Access Management LESS: ’Master users’ ‘Account master keys/tokens’
  • 25. IAM POLICIES AZURE AD RBAC AWS SIGNATURE AZURE SAS LIMIT ANONYMOUS PUBLIC READ ACCESS ENABLE FIREWALL RULES
  • 26. Azure RBAC Azure role-based access control User Group Service Principal Managed Identity Security Principal Role Operation type (R/W/C/D) Scope Management Group Subscription Resource Group Resource Role assignment Assign a security principal Assign a scope Assign a role Development Group Contributor Dev and Playground Resource Group
  • 27. WHAT CAN WE DO? MORE: Secrets scanning LESS: Assume that the repo is safe
  • 28. Secrets scanning Protectingyourcode,yoursecrets,youridentity SCAN COMMITS BEFORE A PUSH (1)Placegit-secretssomewhereinthePATHtobeeasilyaccessiblebygit (2)./install.ps1|Commandtoinstallgit-secretsonaWindowsmachine (3)cd/path/RaduVRepo/IoTHome|Navigatetotherepothatyouwanttoprotect.You needtodothisactionforeachrepositorythatyouwanttosecure (4)gitsecretsinstall|Installthetool (5)gitsecrets-register-azure|RegistertheAzureplugin (6)gitsecrets-register-aws|RegistertheAWSplugin (7)gitsecrets-register-gcp|RegistertheGCPplugin
  • 29. Secrets scanning Protectingyourcode,yoursecrets,youridentity SCAN COMMITS BEFORE A PUSH > Reject commits when secrets are detected PIPELINE INTEGRATION > Build fail > Remove secrets NIGHTLY SCAN > Remove secrets > Repository and Pipelines freeze
  • 30. WHAT CAN WE DO? MORE: Tracing and monitoring LESS: Rely only on app logs
  • 31. Metrics Logs Audit Alerts Dashboards Metric Explorer Azure Monitor Advisor & Service Health Activity Log Application Insights Security Center & Defender Log Analytics Network Monitoring Service Map
  • 32. PROCESSED EVENTS DATA PLANE LOGS CONTROL & MANAGEMENT LOGS PROVIDE INFORMATION ABOUT AZURE RESOURCE MANAGER CREATE, UPDATE, AND DELETE OPERATIONS PROVIDE INFORMATION ABOUT EVENTS RAISED AS PART OF AZURE RESOURCE USAGE PROVIDE INFORMATION ABOUT ANALYZED EVENTS / ALERTS THAT HAVE BEEN PROCESSED ON YOUR BEHALF Windows Event System, security, and app logs in a VM and the diagnostics logs that are configured through Azure Monitor Azure Security Center alerts where Azure Security Center has processed and analyzed your subscription and provides concise security alerts Change in a resource configuration, change of the resource tier size AZURE MONITORING LOGS AZURE MONITORING METRICS
  • 33. WHAT CAN WE DO? MORE: Integrate the build-in security systems LESS: Rely less on custom dashboards
  • 34. Azure Security Center Discover and assess the security of your workloads Secure Score Overall secure score Security controls Compliance Azure CIS PCI DSS 3.2 ISO 2007 SOC TSP Custom definition Azure Defender Security Alerts Advance Thread Protection Vulnerability assessment and mng On-premises and Azure protection Inventory Explore, filter and enhanced your resources
  • 38.

Notas do Editor

  1. Veeam—Customer records compromised by unprotected database Near the end of August 2018, the Shodan search engine indexed an Amazon-hosted IP. Bob Diachenko, director of cyber risk research at Hacken.io, came across the IP on 5 September and quickly determined that the IP resolved to a database left unprotected by the lack of a password. The exposed database contained 200 gigabytes worth of data belonging to Veeam, a backup and data recovery company. Among that data were customer records including names, email addresses and some IP addresses.   How encryption may become a factor in scenarios like this: User names and passwords are a relatively weak way of securing private access. Plus, if an organization does not maintain complete control of the private keys that govern access for internal systems, attackers have a better chance of gaining access.   Impact: Within three hours of learning about the exposure, Veeam took the server offline. The company also reassured TechCrunch that it would “conduct a deeper investigation and… take appropriate actions based on our findings.”
  2. <Key point>: Cloud Adoption Framework—modular phases of adoption. As your organization evolves, the Cloud Adoption Framework adapts to your business needs. Each module in the diagram is an iterative phase that advances your business through the complete lifecycle of cloud adoption. Customers can choose the phase best-suited to their degree of cloud adoption maturity. The Cloud Adoption Framework offers a guiding methodology to cloud adoption, with specific approaches to overcoming common blockers to cloud adoption in each module, such as “Define Strategy,” “Plan,”, etc. The Cloud Adoption Framework offers the enterprise a modular framework of how to incrementally onboard to the cloud. Cloud adoption shifts how companies obtain, make use of, and lock down their technology resources. And—this kind of modular framework flips the model of how enterprises operate: Transitions organizations to need-based consumption of technology resources Change from cap-ex (capital expenditure) to op-ex (operating expenditure) model Cloud model assumes security, governance, cost-optimization, and hybrid cloud by default Develop a future-ready workforce—developing and deploying cloud skill readiness organization-wide As an organization progress through the Cloud Adoption Framework, what are the main goals of each methodology of “Define Strategy,” “Plan,” you can focus efforts on? <Transition>: Now that we have taken look at the phases and modular approach, lets look at about some common business blockers that the Cloud Adoption Framework can help you resolve.