SlideShare una empresa de Scribd logo
1 de 27
CONFIDENTIAL DO NOT DISTRIBUTE
STRATEGIES FOR MONITORING AND
MEASURING CLOUD SECURITY
THOMAS SCOTT Solutions Consultant
Thomas.Scott@Armor.com
@dfwcloudsec
thomas-scott-cloudsec
CONFIDENTIAL DO NOT DISTRIBUTE 2
Wheel of Doom
From A Journey into Microservices by Hailo
CONFIDENTIAL DO NOT DISTRIBUTE 3
HOW DO WE PROTECT SO MANY APPS
AND SO MUCH DATA?
CONFIDENTIAL DO NOT DISTRIBUTE 4
HOW DO WE KEEP TRACK OF WHAT WE
DEPLOY?
5
Top Strategic Predictions for 2016 and Beyond – Gartner 2016
95%OF CLOUD SECURITY FAILURES
THROUGH 2020 WILL BE THE
CUSTOMER’S FAULT
😱
http://www.gartner.com/newsroom/id/3143718
CONFIDENTIAL DO NOT DISTRIBUTE 6
OWASP TOP 10 2017 IS CRITICAL
CONFIDENTIAL DO NOT DISTRIBUTE 7
AUTHENTICATION & ACCESS CONTROL
👤 🔐 ✅
CONFIDENTIAL DO NOT DISTRIBUTE 8
UNVALIDATED CLIENT-SIDE INPUT
😈 💣 🖥🖥 💥
CONFIDENTIAL DO NOT DISTRIBUTE 9
BAD HOUSEKEEPING
🚯
CONFIDENTIAL DO NOT DISTRIBUTE 10
MOST OF THESE ARE NOT NEW
CONFIDENTIAL DO NOT DISTRIBUTE 11
DO LESS MORE OFTEN
CONFIDENTIAL DO NOT DISTRIBUTE 12
SHIFT LEFT ⬅️
CONFIDENTIAL DO NOT DISTRIBUTE 13
USE TOOLS 🖥🖥 WISELY
CONFIDENTIAL DO NOT DISTRIBUTE 14
AUTHENTICATION & ACCESS CONTROL
👤 🔐 ✅
CONFIDENTIAL DO NOT DISTRIBUTE 15
DENY BY DEFAULT
CONFIDENTIAL DO NOT DISTRIBUTE 16
CONFIDENTIAL. DO NOT
DISTRIBUTE.
CONFIDENTIAL DO NOT DISTRIBUTE 17
BEST PRACTICES
CONFIDENTIAL DO NOT DISTRIBUTE 18
UNVALIDATED CLIENT-SIDE INPUT
😈 💣 🖥🖥 💥
CONFIDENTIAL DO NOT DISTRIBUTE 19
TECHNOLOGY ALONE ISN’T THE KEY
🖥🖥
CONFIDENTIAL DO NOT DISTRIBUTE 20
BEST PRACTICES
CONFIDENTIAL DO NOT DISTRIBUTE 21
BAD HOUSEKEEPING
🚯
CONFIDENTIAL DO NOT DISTRIBUTE 22
“THE MOST COMMON FLAW IS
SIMPLY NOT ENCRYPTING SENSITIVE
DATA” 🖥
CONFIDENTIAL DO NOT DISTRIBUTE 23
USE STRONG DETECTIVE 🖥🖥
CONTROLS
CONFIDENTIAL DO NOT DISTRIBUTE 24
INSUFFICIENT LOGGING: THE
BEDROCK OF NEARLY EVERY MAJOR
INCIDENT
CONFIDENTIAL DO NOT DISTRIBUTE 25
ADDITIONAL BEST PRACTICES
CONFIDENTIAL DO NOT DISTRIBUTE
QUESTIONS?
26
CONFIDENTIAL DO NOT DISTRIBUTE
THANKYOU
THOMAS SCOTT Solutions Consultant
Thomas.Scott@Armor.com
@dfwcloudsec
thomas-scott-cloudsec

Más contenido relacionado

La actualidad más candente

Breaking Through the Digital Wall
Breaking Through the Digital WallBreaking Through the Digital Wall
Breaking Through the Digital WallSamuel Scott
 
The Biggest Lies That Digital Marketers Tell Themselves
The Biggest Lies That Digital Marketers Tell ThemselvesThe Biggest Lies That Digital Marketers Tell Themselves
The Biggest Lies That Digital Marketers Tell ThemselvesSamuel Scott
 
[US] The Content Evolution - Marcus Tober
[US] The Content Evolution - Marcus Tober[US] The Content Evolution - Marcus Tober
[US] The Content Evolution - Marcus ToberSearchmetrics
 
Consumer uk email tracker 2016
Consumer uk email tracker 2016Consumer uk email tracker 2016
Consumer uk email tracker 2016Grégory Depasse
 
Evolving and remaining relevant as QA - TConf 2018
Evolving and remaining relevant as QA - TConf 2018Evolving and remaining relevant as QA - TConf 2018
Evolving and remaining relevant as QA - TConf 2018Theresa Neate
 
Dedicated social networks at virtual events. Imaste 5.0
Dedicated social networks at virtual events. Imaste 5.0Dedicated social networks at virtual events. Imaste 5.0
Dedicated social networks at virtual events. Imaste 5.0Miguel Fernandez Lapique
 
Game Theory Network Security Research Projects
Game Theory Network Security  Research ProjectsGame Theory Network Security  Research Projects
Game Theory Network Security Research ProjectsNetwork Simulation Tools
 
Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]
Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]
Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]Stefan Baumschlager
 
Timothy Gillman - SMX East 2015 - Using Data to Tell an SEO Story
Timothy Gillman - SMX East 2015 -  Using Data to Tell an SEO StoryTimothy Gillman - SMX East 2015 -  Using Data to Tell an SEO Story
Timothy Gillman - SMX East 2015 - Using Data to Tell an SEO StoryTim Gillman
 
Causal space-time pattern search for safe planning
Causal space-time pattern search for safe planningCausal space-time pattern search for safe planning
Causal space-time pattern search for safe planningAnton Osika
 
Analytics For Switch To Airtel Kenya Campaign Safaricom Teaser
Analytics For Switch To Airtel Kenya Campaign Safaricom TeaserAnalytics For Switch To Airtel Kenya Campaign Safaricom Teaser
Analytics For Switch To Airtel Kenya Campaign Safaricom TeaserBrand Sauce
 
iovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suiteiovation's Dynamic Authentication Suite
iovation's Dynamic Authentication SuiteMichael Thelander
 
Kred.com is Your Influencer Network
Kred.com is Your Influencer NetworkKred.com is Your Influencer Network
Kred.com is Your Influencer NetworkPeopleBrowsr
 
Small Business Week 2018
Small Business Week 2018Small Business Week 2018
Small Business Week 2018Dan Belhassen
 

La actualidad más candente (17)

Breaking Through the Digital Wall
Breaking Through the Digital WallBreaking Through the Digital Wall
Breaking Through the Digital Wall
 
The Biggest Lies That Digital Marketers Tell Themselves
The Biggest Lies That Digital Marketers Tell ThemselvesThe Biggest Lies That Digital Marketers Tell Themselves
The Biggest Lies That Digital Marketers Tell Themselves
 
[US] The Content Evolution - Marcus Tober
[US] The Content Evolution - Marcus Tober[US] The Content Evolution - Marcus Tober
[US] The Content Evolution - Marcus Tober
 
Naswiz facebook app
Naswiz facebook appNaswiz facebook app
Naswiz facebook app
 
Social Media Campaign
Social Media CampaignSocial Media Campaign
Social Media Campaign
 
Consumer uk email tracker 2016
Consumer uk email tracker 2016Consumer uk email tracker 2016
Consumer uk email tracker 2016
 
Evolving and remaining relevant as QA - TConf 2018
Evolving and remaining relevant as QA - TConf 2018Evolving and remaining relevant as QA - TConf 2018
Evolving and remaining relevant as QA - TConf 2018
 
Dedicated social networks at virtual events. Imaste 5.0
Dedicated social networks at virtual events. Imaste 5.0Dedicated social networks at virtual events. Imaste 5.0
Dedicated social networks at virtual events. Imaste 5.0
 
Game Theory Network Security Research Projects
Game Theory Network Security  Research ProjectsGame Theory Network Security  Research Projects
Game Theory Network Security Research Projects
 
Top 10-strategic-predictions-for-2018-and-beyond-by-gartner
Top 10-strategic-predictions-for-2018-and-beyond-by-gartnerTop 10-strategic-predictions-for-2018-and-beyond-by-gartner
Top 10-strategic-predictions-for-2018-and-beyond-by-gartner
 
Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]
Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]
Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]
 
Timothy Gillman - SMX East 2015 - Using Data to Tell an SEO Story
Timothy Gillman - SMX East 2015 -  Using Data to Tell an SEO StoryTimothy Gillman - SMX East 2015 -  Using Data to Tell an SEO Story
Timothy Gillman - SMX East 2015 - Using Data to Tell an SEO Story
 
Causal space-time pattern search for safe planning
Causal space-time pattern search for safe planningCausal space-time pattern search for safe planning
Causal space-time pattern search for safe planning
 
Analytics For Switch To Airtel Kenya Campaign Safaricom Teaser
Analytics For Switch To Airtel Kenya Campaign Safaricom TeaserAnalytics For Switch To Airtel Kenya Campaign Safaricom Teaser
Analytics For Switch To Airtel Kenya Campaign Safaricom Teaser
 
iovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suiteiovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suite
 
Kred.com is Your Influencer Network
Kred.com is Your Influencer NetworkKred.com is Your Influencer Network
Kred.com is Your Influencer Network
 
Small Business Week 2018
Small Business Week 2018Small Business Week 2018
Small Business Week 2018
 

Similar a Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Measuring Cloud Security"

Critical online success factors with dynatrace
Critical online success factors with dynatraceCritical online success factors with dynatrace
Critical online success factors with dynatraceDynatraceANZ
 
Moving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessMoving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessJoAnna Cheshire
 
2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study2015 Future of Cloud Computing Study
2015 Future of Cloud Computing StudyNorth Bridge
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study RoadshowScalar Decisions
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Analytics That Drive The Value Of Content
Analytics That Drive The Value Of Content  Analytics That Drive The Value Of Content
Analytics That Drive The Value Of Content Pajama Program
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing StudyNorth Bridge
 
It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016NowSecure
 
HPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly InnovateHPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly Innovatescoopnewsgroup
 
Presentation Webinar Convertising: Creative Content X Social Advertising
Presentation Webinar Convertising: Creative Content X Social AdvertisingPresentation Webinar Convertising: Creative Content X Social Advertising
Presentation Webinar Convertising: Creative Content X Social AdvertisingKomfo
 
Scot-Cloud 2015
Scot-Cloud 2015Scot-Cloud 2015
Scot-Cloud 2015Ray Bugg
 
Samantha and Susan's Marketing Predictions for 2023
Samantha and Susan's Marketing Predictions for 2023Samantha and Susan's Marketing Predictions for 2023
Samantha and Susan's Marketing Predictions for 2023Samantha Russell
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the CloudMike Spaulding
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital AgeCA Technologies
 
The 2015 Guide to B2B Marketing Technology
The 2015 Guide to B2B Marketing Technology The 2015 Guide to B2B Marketing Technology
The 2015 Guide to B2B Marketing Technology Radius
 
Ryan Smith's talk from the AWS Chicago user group May 22 - Security
Ryan Smith's talk from the AWS Chicago user group May 22 - Security Ryan Smith's talk from the AWS Chicago user group May 22 - Security
Ryan Smith's talk from the AWS Chicago user group May 22 - Security AWS Chicago
 
PRSA Digital Impact - Does Your Brand Have ESP? Experience Styling Professionals
PRSA Digital Impact - Does Your Brand Have ESP? Experience Styling ProfessionalsPRSA Digital Impact - Does Your Brand Have ESP? Experience Styling Professionals
PRSA Digital Impact - Does Your Brand Have ESP? Experience Styling ProfessionalsKatrina Klier
 
B2B Marketing and The Power of Twitter
B2B Marketing and The Power of TwitterB2B Marketing and The Power of Twitter
B2B Marketing and The Power of TwitterSteve Yanor
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 

Similar a Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Measuring Cloud Security" (20)

Critical online success factors with dynatrace
Critical online success factors with dynatraceCritical online success factors with dynatrace
Critical online success factors with dynatrace
 
Moving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessMoving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration Painless
 
2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Analytics That Drive The Value Of Content
Analytics That Drive The Value Of Content  Analytics That Drive The Value Of Content
Analytics That Drive The Value Of Content
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study
 
It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016
 
HPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly InnovateHPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly Innovate
 
Presentation Webinar Convertising: Creative Content X Social Advertising
Presentation Webinar Convertising: Creative Content X Social AdvertisingPresentation Webinar Convertising: Creative Content X Social Advertising
Presentation Webinar Convertising: Creative Content X Social Advertising
 
Scot-Cloud 2015
Scot-Cloud 2015Scot-Cloud 2015
Scot-Cloud 2015
 
Samantha and Susan's Marketing Predictions for 2023
Samantha and Susan's Marketing Predictions for 2023Samantha and Susan's Marketing Predictions for 2023
Samantha and Susan's Marketing Predictions for 2023
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the Cloud
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
 
The 2015 Guide to B2B Marketing Technology
The 2015 Guide to B2B Marketing Technology The 2015 Guide to B2B Marketing Technology
The 2015 Guide to B2B Marketing Technology
 
Ryan Smith's talk from the AWS Chicago user group May 22 - Security
Ryan Smith's talk from the AWS Chicago user group May 22 - Security Ryan Smith's talk from the AWS Chicago user group May 22 - Security
Ryan Smith's talk from the AWS Chicago user group May 22 - Security
 
PRSA Digital Impact - Does Your Brand Have ESP? Experience Styling Professionals
PRSA Digital Impact - Does Your Brand Have ESP? Experience Styling ProfessionalsPRSA Digital Impact - Does Your Brand Have ESP? Experience Styling Professionals
PRSA Digital Impact - Does Your Brand Have ESP? Experience Styling Professionals
 
B2B Marketing and The Power of Twitter
B2B Marketing and The Power of TwitterB2B Marketing and The Power of Twitter
B2B Marketing and The Power of Twitter
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 

Más de AWS Chicago

AWS reInvent 2023 recaps from Chicago AWS user group
AWS reInvent 2023 recaps from Chicago AWS user groupAWS reInvent 2023 recaps from Chicago AWS user group
AWS reInvent 2023 recaps from Chicago AWS user groupAWS Chicago
 
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...AWS Chicago
 
WilliamCollins_Road-to-Transit-Gateway.pptx
WilliamCollins_Road-to-Transit-Gateway.pptxWilliamCollins_Road-to-Transit-Gateway.pptx
WilliamCollins_Road-to-Transit-Gateway.pptxAWS Chicago
 
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdfSuresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdfAWS Chicago
 
Streamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
Streamlined Entitlements with AWS Lake Formation - Anusha DwivedulaStreamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
Streamlined Entitlements with AWS Lake Formation - Anusha DwivedulaAWS Chicago
 
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptxSteve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptxAWS Chicago
 
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptxSaurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptxAWS Chicago
 
Sanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdfSanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdfAWS Chicago
 
Ross Stuart_Using ML to Solve Lifes Problems.pptx
Ross Stuart_Using ML to Solve Lifes Problems.pptxRoss Stuart_Using ML to Solve Lifes Problems.pptx
Ross Stuart_Using ML to Solve Lifes Problems.pptxAWS Chicago
 
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdfrobsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdfAWS Chicago
 
Sanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdfSanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdfAWS Chicago
 
Mohamed Wali_AWS Security Reference Architecture.pptx
Mohamed Wali_AWS Security Reference Architecture.pptxMohamed Wali_AWS Security Reference Architecture.pptx
Mohamed Wali_AWS Security Reference Architecture.pptxAWS Chicago
 
Nick-Walter-HOB_Migrating_Dinosaurs.pptx
Nick-Walter-HOB_Migrating_Dinosaurs.pptxNick-Walter-HOB_Migrating_Dinosaurs.pptx
Nick-Walter-HOB_Migrating_Dinosaurs.pptxAWS Chicago
 
Pat_Davies_AWSCostOptimization_Final.pdf
Pat_Davies_AWSCostOptimization_Final.pdfPat_Davies_AWSCostOptimization_Final.pdf
Pat_Davies_AWSCostOptimization_Final.pdfAWS Chicago
 
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...AWS Chicago
 
MichaelSoule-UsingJupyterNotebooks.pptx
MichaelSoule-UsingJupyterNotebooks.pptxMichaelSoule-UsingJupyterNotebooks.pptx
MichaelSoule-UsingJupyterNotebooks.pptxAWS Chicago
 
Michal Brygidyn_CloudHackingScenarios.pdf
Michal Brygidyn_CloudHackingScenarios.pdfMichal Brygidyn_CloudHackingScenarios.pdf
Michal Brygidyn_CloudHackingScenarios.pdfAWS Chicago
 
Kamil Kolodziejski_Structura-AWS.pptx
Kamil Kolodziejski_Structura-AWS.pptxKamil Kolodziejski_Structura-AWS.pptx
Kamil Kolodziejski_Structura-AWS.pptxAWS Chicago
 
John Merline AWS Certification FAQ.pptx
John Merline AWS Certification FAQ.pptxJohn Merline AWS Certification FAQ.pptx
John Merline AWS Certification FAQ.pptxAWS Chicago
 
JuliaFMorgado_Breaking_bad_habits.pptx
JuliaFMorgado_Breaking_bad_habits.pptxJuliaFMorgado_Breaking_bad_habits.pptx
JuliaFMorgado_Breaking_bad_habits.pptxAWS Chicago
 

Más de AWS Chicago (20)

AWS reInvent 2023 recaps from Chicago AWS user group
AWS reInvent 2023 recaps from Chicago AWS user groupAWS reInvent 2023 recaps from Chicago AWS user group
AWS reInvent 2023 recaps from Chicago AWS user group
 
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
 
WilliamCollins_Road-to-Transit-Gateway.pptx
WilliamCollins_Road-to-Transit-Gateway.pptxWilliamCollins_Road-to-Transit-Gateway.pptx
WilliamCollins_Road-to-Transit-Gateway.pptx
 
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdfSuresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
 
Streamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
Streamlined Entitlements with AWS Lake Formation - Anusha DwivedulaStreamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
Streamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
 
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptxSteve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
 
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptxSaurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
 
Sanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdfSanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdf
 
Ross Stuart_Using ML to Solve Lifes Problems.pptx
Ross Stuart_Using ML to Solve Lifes Problems.pptxRoss Stuart_Using ML to Solve Lifes Problems.pptx
Ross Stuart_Using ML to Solve Lifes Problems.pptx
 
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdfrobsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
 
Sanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdfSanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdf
 
Mohamed Wali_AWS Security Reference Architecture.pptx
Mohamed Wali_AWS Security Reference Architecture.pptxMohamed Wali_AWS Security Reference Architecture.pptx
Mohamed Wali_AWS Security Reference Architecture.pptx
 
Nick-Walter-HOB_Migrating_Dinosaurs.pptx
Nick-Walter-HOB_Migrating_Dinosaurs.pptxNick-Walter-HOB_Migrating_Dinosaurs.pptx
Nick-Walter-HOB_Migrating_Dinosaurs.pptx
 
Pat_Davies_AWSCostOptimization_Final.pdf
Pat_Davies_AWSCostOptimization_Final.pdfPat_Davies_AWSCostOptimization_Final.pdf
Pat_Davies_AWSCostOptimization_Final.pdf
 
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
 
MichaelSoule-UsingJupyterNotebooks.pptx
MichaelSoule-UsingJupyterNotebooks.pptxMichaelSoule-UsingJupyterNotebooks.pptx
MichaelSoule-UsingJupyterNotebooks.pptx
 
Michal Brygidyn_CloudHackingScenarios.pdf
Michal Brygidyn_CloudHackingScenarios.pdfMichal Brygidyn_CloudHackingScenarios.pdf
Michal Brygidyn_CloudHackingScenarios.pdf
 
Kamil Kolodziejski_Structura-AWS.pptx
Kamil Kolodziejski_Structura-AWS.pptxKamil Kolodziejski_Structura-AWS.pptx
Kamil Kolodziejski_Structura-AWS.pptx
 
John Merline AWS Certification FAQ.pptx
John Merline AWS Certification FAQ.pptxJohn Merline AWS Certification FAQ.pptx
John Merline AWS Certification FAQ.pptx
 
JuliaFMorgado_Breaking_bad_habits.pptx
JuliaFMorgado_Breaking_bad_habits.pptxJuliaFMorgado_Breaking_bad_habits.pptx
JuliaFMorgado_Breaking_bad_habits.pptx
 

Último

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Measuring Cloud Security"

Notas del editor

  1. Microservice, application, and infrastructure ecosystems are exploding in both variety and complexity. We live in a copycat industry. On multiple occasions, I’ve heard colleagues say “Well Netflix and CapitalOne are utilizing this microservice and they’re great at DevOps…so if I use that microservice I will be great at DevOps too!”. Unfortunately, these lines of thinking lead to two fundamental problems.
  2. The reality is you own responsibility for securing the entirety of your application stack. Gartner predicts that, “95% of Cloud security failures through 2020 will be the customers fault.” Failure to protect against any of the OWASP top 10 is a sadly a contributing factor to this statistic.
  3. Application of the OWASP top 10 is critical to determining and protecting Organizations against common issues. The top 10, as I’m sure many of you are aware, can be divided out into three categories.
  4. For Authentication & Access Control, you’ve got Broken Authentication and Broken Access Control
  5. Unvalidated Client-side Input incorporates 4 of the top 10. Injection XML External Entities Cross-site Scripting Insecure Deserialization
  6. Finally, Bad Housekeeping rounds out the remaining top 10. Sensitive Data Exposure Security Misconfiguration Using Components with Known Vulnerabilities Insufficient Logging & Monitoring
  7. However, I’m not here to teach you all the OWASP top 10 and why they are important. As I stated before, I am by no means an expert. OWASP has done all of the heavy lifting for us. These critical security risks are not new. We all know that the bad practices and methodologies that lead to these risks are extremely common. It is up to us to follow through on eliminating these security failures.
  8. A forward looking theme is to Do Less More Often. Rather than retrofitting a variety of security controls and practices after code/infrastructure is running in the wild can be Time consuming Error prone And most importantly it can be extremely costly
  9. At every opportunity you get, shift security as far left in the development lifecycle as possible. Security should be baked into development, deployment, and operations, as well as being thoroughly and frequently tested at all levels. Shifting left encourages automation thereby reducing errors created from manual actions and codifying organizational and departmental security standards.
  10. This slide is where most vendors love to begin pitching how their solution is going to solve all of your problems and if you’d just give them 5 minutes of your time, they’ll show you how! Unfortunately, the mentality of buying a new tool to solve every new problem has created an unmanageable task for security professionals. To create an effective application security program, you need to strike a balance between native and third party tools to help you. Cloud native tools have a tremendous upside in that they often have simple integrations from an architectural perspective. The downside is in generally requires the knowledge and bandwidth of your team to manage and operationalize them. Third party integrations and services can help eliminate the tedious and low-value aspect of SecOps for things like creating and updating rules and policies. This is generally a great benefit from a resource constraint perspective but often comes with a higher upfront cost.
  11. With the increasing popularity of microservices and code based infrastructure, authentication and access control is becoming one of the final frontiers of security in the cloud. Let’s talk a little about what AWS does for you natively and what things you can do to help round out your portion of the shared responsibility model.
  12. The good news is that access to your infrastructures and AWS resources is deny by default. AWS wants to make things easy for you but don’t want you to get in too much trouble right out of the gate.
  13. One thing to keep in mind however is that in the cloud we cannot take a perimeter security approach in regards to access control. Authorization must be validated at more than just the request initialization level.
  14. The wealth of information provided to you by AWS in regards to Authentication and Access control is invaluable. However, implementing best practices is where AWS stops doing all the work for you. What are these best practices... First start with Enabling MFA for AWS console and application access Disable the root account Apply security policies to groups rather than individual users For those who manage their IAM environment, they’ll know that AWS already has a nice Security Status section with big green check marks to know whether or not your doing what you should be doing Although it shouldn’t have to be said, never open up an S3 bucket to the world unless it absolutely needs to be Leverage AWS Config to use prebaked rules or build your own in order to evaluate your resource configurations against a set of rules or policies. You can then be alerted anytime a config drifts from your policy or build a Lambda trigger than will roll back the change. Services like Cognito User Pools will help add layers of security to authentication such as MFA via SMS or time-based OTP (one-time passwords) Encryption at-rest and in-transit for authentication transactions It gives you the ability to perform Checking of Compromised Credentials that will protect your users from using credentials that have been exposed from breaches of other websites Finally you can utilize API Gateway Usage Plans to rate limit API calls made from clients
  15. When it comes to unvalidated client side input, this is where you will get the most help. The AWS Marketplace is full of WAFs and AWS’s own WAF offering can be easily integrate with AWS Application Load Balancers and CloudFront Distributions.
  16. However, in many ways, technology alone is not the key. There is no flip we can simply switch on and we are secure. How we use the technology is critical to our success.
  17. AWS has a whitepaper titled “Use AWS WAF to mitigate OWASP’s top 10 Web Application Vulnerabilities”. This will help you define baseline rules. However, remember that these rules are not exhaustive and should be used as a great starting point. After you read the whitepaper on using the AWS WAF....actually use the AWS WAF! Implement rate-based rules to prevent specific IPs from spamming you too hard If you can identify stolen tokens, use a token blacklist rule to block further requests with that token. Use the built in capabilities of WAFs to implement policies to prevent file traversal Also, consider managed rules. These managed rules will help take the operational burden of your organization from a maintenance perspective.
  18. Now let’s wrap it up with just general bad housekeeping that is pervasive in our industry.
  19. When it comes to Sensitive Data Exposure, the most common flaw is simply not encrypting sensitive data. That seems unbelievable but it is the reality we live in.
  20. In order to be successful from a security perspective, you HAVE TO KNOW your environment. Strong detective controls are crucial for security operations and forensics.
  21. Logging is where my world and your worlds collide. Insufficient logging is the bedrock of nearly every major incident. It’s very difficult to know what happened, if there is no record of it. AWS provides a variety of ways to log and ingest service data and to monitor and respond to log output and security findings. A shocking revelation I’ve found throughout my conversations with peers in this industry over the last few years is that CloudTrail is not always enabled. This is unbelievable since CloudTrail is free! A logging standard should also be built to determine what activities and sensitive information your applications do and don’t log. These logs should also have an established guideline for what the output looks like. A big point to stress is that logging should not be used only for forensics and post-mortems. All logging should be monitored for suspicious activity and you should know how to respond in real time. Streaming these logs to a central repository for analysis and correlation is essential. However, please keep in mind data sovereignty.
  22. I know we’re all full and getting sleepy so I’ll wrap it up with just a few final best practices. User Amazon Inspector to assess vulnerabilities in your environment such as insecure protocol usage or SSH misconfiguration. Use segmentation throughout your stack to prevent unauthorized access to a Database server from anything other than an application server...and transversely any access to an app server from something other than a web server. Encrypt S3 buckets and use HTTP headers to fail uploads that don’t use encryption. Build workflows that refuse new unencrypted content or alert you for configurations that aren’t using encryption. The final note for good housekeeping is to please don’t enable or install unnecessary services. This simply expands your vulnerability footprint with no value add to your organization.