SlideShare una empresa de Scribd logo
1 de 46
Ben Johnson | Co-Founder & CTO
OWASP OC 2018-03-22
SEEING THROUGH THE FOG
@chicagoben | @obsidiansec
Background Check // Ben Johnson
Co-Founder and CTO, Obsidian
Co-Founder and Former CTO, Carbon Black
Former CNO/Cyber // NSA, CIA, DoD
@chicagoben | @obsidiansec
Today’s Goal?
TO SPARK CONTEMPLATION
(and give you something to remember!)
@chicagoben | @obsidiansec
Transformation
@chicagoben | @obsidiansec
Digital Transformation
@chicagoben | @obsidiansec
Race to the Cloud!
Lots of benefits of cloud adoption … we aren’t really here for that.
@chicagoben | @obsidiansec
Observation
@chicagoben | @obsidiansec
IT and the Cloud
“IT is the broad subject concerned with all aspects
of managing and processing information,
especially within a large organization or company.”
Cloud computing is an information technology (IT) paradigm that
enables ubiquitous access to shared pools of
configurable system resources and higher-level services that can
be rapidly provisioned with minimal management effort, often over
the Internet. Cloud computing relies on sharing of resources to
achieve coherence and economies of scale, similar to a public utility.
IT
Cloud
@chicagoben | @obsidiansec
IT and the Cloud (Reality)
“Let’s stop managing hardware and a lot of the software”
“Let’s scale up and down as necessary”
“Let’s get access to cool new technologies more quickly”
“Uptime is [mostly] someone else’s problem”
@chicagoben | @obsidiansec
Information Security and the Cloud
“Information security, sometimes shortened to InfoSec, is the practice
of preventing unauthorized access, use, disclosure, disruption,
modification, inspection, recording or destruction of information. ”
Cloud computing is an information technology (IT) paradigm that
enables ubiquitous access to shared pools of
configurable system resources and higher-level services that can
be rapidly provisioned with minimal management effort, often over
the Internet. Cloud computing relies on sharing of resources to
achieve coherence and economies of scale, similar to a public utility.
InfoSec
Cloud
@chicagoben | @obsidiansec
Information Security and the Cloud (Reality)
“IT is going from 0 to 100 in the cloud and leaving security in the dust”
- Fmr. CISO, Lending Club
“We’re blind to all these new SaaS accounts”
- Director, Cyber Intelligence, Top Athletics Brand
“We don’t know what users are doing on our AWS/Azure accounts”
- Too Many Organizations
“Hackers don’t break in, they login.”
- CISO, Cisco
@chicagoben | @obsidiansec
Modern Times are Leaky
Booz Allen
OneLogin
The RNC
Verizon
Accenture
Dow Jones
Viacom
Deloitte
Sweden
California
@chicagoben | @obsidiansec
Recent Headlines
@chicagoben | @obsidiansec
Data Breaches
@chicagoben | @obsidiansec
Data Breaches: Not Just IaaS
As of now, Deloitte cannot be "100% sure what was taken" by the hackers
https://www.ciodive.com/news/deloitte-hack-email-migration-microsoft-office-365/506946/
@chicagoben | @obsidiansec
Breach Fatigue Anyone?
Anyone getting CLOUD breach fatigue?
If not you, do you think others are?
@chicagoben | @obsidiansec
Causation
@chicagoben | @obsidiansec
Confusion Over Responsibility
@chicagoben | @obsidiansec
Providers Have Challenges
Goals are Misaligned
Focus is on availability of variety of services with a minimum layer of security built-in
Failure Can Be Easy
A simple click can share huge amounts of data publicly (e.g. S3)
Monitoring is Extra Work
Logging & monitoring often have to be enabled separately
Mo’ People, Mo’ Complexity
Identities and policies are often complex to manage (maybe an understatement?)
Sweet Spot is Elusive
Policy and control options either feel too flexible or too rigid
@chicagoben | @obsidiansec
Customers Have Challenges
Lack of Understanding
The notion of shared responsibility and the differences in built-in security are often foreign.
Taking the Plunge
Departments race to the cloud, leaving security scrambling. (Is security slowing down adoption?)
Bending the Rules
Unsanctioned cloud use or lack of reporting to security what is in use.
New Environment, Same Security Team
Surface area is expanding, changing, and dynamic, yet security team isn’t as agile.
“Operators think that once it’s in the cloud it’s no longer their responsibility”
- Fmr. CIO of the Air Force
@chicagoben | @obsidiansec
Current Trends Making Things Harder
@chicagoben | @obsidiansec
IT and Security Disconnect
IT Security
Authentication
Authorization
Activity
Enablement Threat Management
DISCONNECTED
Provisioning Anomaly Detection
@chicagoben | @obsidiansec
Obligation
@chicagoben | @obsidiansec
Cloud Security: “Of” Versus “In”
Cloud Service Provider:
responsible for security OF the cloud
Customer:
responsible for security IN the cloud
@chicagoben | @obsidiansec
AWS Responsibilities?
@chicagoben | @obsidiansec
AZURE Responsibilities?
@chicagoben | @obsidiansec
SaaS: “Of” Versus “In”
The SaaS Provider handles all aspects except
for identity and access management, client
devices controls, and data accountability.
The Customer, therefore, must understand
users, devices & data related to that service.
@chicagoben | @obsidiansec
Office 365?
Microsoft handles the underlying infrastructure,
including patching and updating, and handles
accessibility of the service.
You are responsible for what is emailed, who
accesses the email, and how they access the
email.
@chicagoben | @obsidiansec
AZURE Responsibilities?Hackers want this!
@chicagoben | @obsidiansec
AWS Responsibilities?
Hackers want this!
@chicagoben | @obsidiansec
Amelioration
@chicagoben | @obsidiansec
OWASP TOP 10?
@chicagoben | @obsidiansec
Awareness, Auditing, Adaptation, Automation
@chicagoben | @obsidiansec
Awareness
๏Where are you using the cloud?
๏What “clouds” are you using?
๏Why are you using the cloud?
๏How are you using the cloud?
๏Who’s responsible for what’s in the cloud?
@chicagoben | @obsidiansec
Auditing
๏Understand current state (IT)…assets, users, devices.
๏Understand current state (Security).
๏Understand initiatives that involve cloud.
๏Understand security capabilities related to cloud.
@chicagoben | @obsidiansec
Adaptation
๏Put policies and checks in place for new deployments
๏Update security scans and tests to account for cloud
๏Enable tracking of all changes from current state
๏Have a process for monitoring all new accounts, assets, etc.
@chicagoben | @obsidiansec
Automation
๏Change your processes to reduce risk!
๏Security audits should be automated.
๏Cloud Providers have APIs – write code or use integrations to
automate the collection of data, the taking of actions, the verification
of changes.
๏Avoid manual activities.
@chicagoben | @obsidiansec
Hygiene
@chicagoben | @obsidiansec
Triple-A!
Authentication AccountingAuthorization
Industry focus Neglected Forgotten
@chicagoben | @obsidiansec
IT and Security: Hand-in-Hand
๏Change your processes to reduce risk!
๏Security audits should be automated.
๏Cloud Providers have APIs – write code or use
integrations to automate the collection of data,
the taking of actions, the verification of changes.
๏Avoid manual activities.
๏Where are you using the cloud?
๏What “clouds” are you using?
๏Why are you using the cloud?
๏How are you using the cloud?
๏Who’s responsible for what’s in the cloud?
๏Understand current state (IT)…assets, users, devices.
๏Understand current state (Security).
๏Understand initiatives that involve cloud.
๏Understand security capabilities related to cloud.
๏Put policies and checks in place for new deployments
๏Update security scans and tests to account for cloud
๏Enable tracking of all changes from current state
๏Have a process for monitoring all new accounts, assets,
etc.
@chicagoben | @obsidiansec
IT and Security: Hand-in-Hand
Automate Change to Reduce Error and Risk
Understanding Surface Area
Understand Details and Processes
Update processes and policies
@chicagoben | @obsidiansec
Journey vs. Outcomes
Security teams often focus where they
have the most autonomy; they get
comfortable in this never-ending journey
vs. driving toward new destinations.
@chicagoben | @obsidiansec
Engineering vs. Analysis
@chicagoben | @obsidiansec
Take-Aways
Understand where, how, and why you are using cloud.
Understand who is responsible.
Providers need to do more.
They could reduce users shooting themselves in the foot, improve default security levels, and
better show surface area.
(Please encourage them to do more!)
The rest is on you:
(Awareness, Auditing, Adaptation, Automation)!
Oh, yeah, Triple-A:
(Authentication, Authorization, Accounting)!
(and don’t forget hygiene.)
@chicagoben | @obsidiansec
Cloud: Massive Opportunity for Unifying IT & Security
IT Security
Enablement Enablement
Provides Appropriate Tech Provides Appropriate Risk
CONNECTED?
Ben Johnson, CTO
ben@obsidiansecurity.com
@chicagoben | @obsidiansec
THANK YOU!

Más contenido relacionado

La actualidad más candente

CAMP IT Slides - Skytap - Brian White
CAMP IT Slides - Skytap - Brian White CAMP IT Slides - Skytap - Brian White
CAMP IT Slides - Skytap - Brian White
Skytap Cloud
 
Big Data beyond Apache Hadoop - How to integrate ALL your Data
Big Data beyond Apache Hadoop - How to integrate ALL your DataBig Data beyond Apache Hadoop - How to integrate ALL your Data
Big Data beyond Apache Hadoop - How to integrate ALL your Data
Kai Wähner
 
Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA
Kai Wähner
 
UAE Microsoft MVPs - How To become Microsoft MVP
UAE Microsoft MVPs - How To become Microsoft MVPUAE Microsoft MVPs - How To become Microsoft MVP
UAE Microsoft MVPs - How To become Microsoft MVP
Ammar Hasayen
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmont
scm24
 

La actualidad más candente (20)

CAMP IT Slides - Skytap - Brian White
CAMP IT Slides - Skytap - Brian White CAMP IT Slides - Skytap - Brian White
CAMP IT Slides - Skytap - Brian White
 
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming AnalyticsR, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
 
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
 
Big Data beyond Apache Hadoop - How to integrate ALL your Data
Big Data beyond Apache Hadoop - How to integrate ALL your DataBig Data beyond Apache Hadoop - How to integrate ALL your Data
Big Data beyond Apache Hadoop - How to integrate ALL your Data
 
How to plan your Modern Workplace Project - SPS Denver October 2018
How to plan your Modern Workplace Project - SPS Denver October 2018How to plan your Modern Workplace Project - SPS Denver October 2018
How to plan your Modern Workplace Project - SPS Denver October 2018
 
"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013
"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013
"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013
 
Not actually a DevOps Talk
Not actually a DevOps TalkNot actually a DevOps Talk
Not actually a DevOps Talk
 
Scenarios for building Hybrid Cloud
Scenarios for building Hybrid CloudScenarios for building Hybrid Cloud
Scenarios for building Hybrid Cloud
 
Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA
 
Analytics in the Cloud: Getting The Most Out Of Analytics Deployments
Analytics in the Cloud: Getting The Most Out Of Analytics DeploymentsAnalytics in the Cloud: Getting The Most Out Of Analytics Deployments
Analytics in the Cloud: Getting The Most Out Of Analytics Deployments
 
Webinar: Hybrid Cloud Integration - Why It's Different and Why It Matters
Webinar: Hybrid Cloud Integration - Why It's Different and Why It MattersWebinar: Hybrid Cloud Integration - Why It's Different and Why It Matters
Webinar: Hybrid Cloud Integration - Why It's Different and Why It Matters
 
Azure Cloud Security
Azure Cloud SecurityAzure Cloud Security
Azure Cloud Security
 
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
 
How a social intranet can be used to drive employee engagement and usage of I...
How a social intranet can be used to drive employee engagement and usage of I...How a social intranet can be used to drive employee engagement and usage of I...
How a social intranet can be used to drive employee engagement and usage of I...
 
UAE Microsoft MVPs - How To become Microsoft MVP
UAE Microsoft MVPs - How To become Microsoft MVPUAE Microsoft MVPs - How To become Microsoft MVP
UAE Microsoft MVPs - How To become Microsoft MVP
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmont
 
Microsoft 365 Threat Management and security - EMS E5
Microsoft 365 Threat Management and security - EMS E5Microsoft 365 Threat Management and security - EMS E5
Microsoft 365 Threat Management and security - EMS E5
 
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
 
TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...
TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...
TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 

Similar a Seeing through the Fog: Navigating the Security Landscape of a Cloud-First World

Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for itAndy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Nordic Infrastructure Conference
 
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoTIoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Academy
 

Similar a Seeing through the Fog: Navigating the Security Landscape of a Cloud-First World (20)

Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
Lean Security
Lean SecurityLean Security
Lean Security
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon us
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Practical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security EvangelismPractical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security Evangelism
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
 
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
 
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
 
Enterprise Data Center and Cloud: "Efficiency, Speed, Disruption"
Enterprise Data Center and Cloud: "Efficiency, Speed, Disruption"Enterprise Data Center and Cloud: "Efficiency, Speed, Disruption"
Enterprise Data Center and Cloud: "Efficiency, Speed, Disruption"
 
Keynote Roberto Delamora - AWS Cloud Experience Argentina
Keynote Roberto Delamora - AWS Cloud Experience ArgentinaKeynote Roberto Delamora - AWS Cloud Experience Argentina
Keynote Roberto Delamora - AWS Cloud Experience Argentina
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
 
Wikibon 2018 Predictions
Wikibon 2018 PredictionsWikibon 2018 Predictions
Wikibon 2018 Predictions
 
Redgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptxRedgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptx
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and ...
How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and ...How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and ...
How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and ...
 
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for itAndy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship
 
Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016
 
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoTIoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Seeing through the Fog: Navigating the Security Landscape of a Cloud-First World

  • 1. Ben Johnson | Co-Founder & CTO OWASP OC 2018-03-22 SEEING THROUGH THE FOG
  • 2. @chicagoben | @obsidiansec Background Check // Ben Johnson Co-Founder and CTO, Obsidian Co-Founder and Former CTO, Carbon Black Former CNO/Cyber // NSA, CIA, DoD
  • 3. @chicagoben | @obsidiansec Today’s Goal? TO SPARK CONTEMPLATION (and give you something to remember!)
  • 6. @chicagoben | @obsidiansec Race to the Cloud! Lots of benefits of cloud adoption … we aren’t really here for that.
  • 8. @chicagoben | @obsidiansec IT and the Cloud “IT is the broad subject concerned with all aspects of managing and processing information, especially within a large organization or company.” Cloud computing is an information technology (IT) paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a public utility. IT Cloud
  • 9. @chicagoben | @obsidiansec IT and the Cloud (Reality) “Let’s stop managing hardware and a lot of the software” “Let’s scale up and down as necessary” “Let’s get access to cool new technologies more quickly” “Uptime is [mostly] someone else’s problem”
  • 10. @chicagoben | @obsidiansec Information Security and the Cloud “Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. ” Cloud computing is an information technology (IT) paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a public utility. InfoSec Cloud
  • 11. @chicagoben | @obsidiansec Information Security and the Cloud (Reality) “IT is going from 0 to 100 in the cloud and leaving security in the dust” - Fmr. CISO, Lending Club “We’re blind to all these new SaaS accounts” - Director, Cyber Intelligence, Top Athletics Brand “We don’t know what users are doing on our AWS/Azure accounts” - Too Many Organizations “Hackers don’t break in, they login.” - CISO, Cisco
  • 12. @chicagoben | @obsidiansec Modern Times are Leaky Booz Allen OneLogin The RNC Verizon Accenture Dow Jones Viacom Deloitte Sweden California
  • 15. @chicagoben | @obsidiansec Data Breaches: Not Just IaaS As of now, Deloitte cannot be "100% sure what was taken" by the hackers https://www.ciodive.com/news/deloitte-hack-email-migration-microsoft-office-365/506946/
  • 16. @chicagoben | @obsidiansec Breach Fatigue Anyone? Anyone getting CLOUD breach fatigue? If not you, do you think others are?
  • 19. @chicagoben | @obsidiansec Providers Have Challenges Goals are Misaligned Focus is on availability of variety of services with a minimum layer of security built-in Failure Can Be Easy A simple click can share huge amounts of data publicly (e.g. S3) Monitoring is Extra Work Logging & monitoring often have to be enabled separately Mo’ People, Mo’ Complexity Identities and policies are often complex to manage (maybe an understatement?) Sweet Spot is Elusive Policy and control options either feel too flexible or too rigid
  • 20. @chicagoben | @obsidiansec Customers Have Challenges Lack of Understanding The notion of shared responsibility and the differences in built-in security are often foreign. Taking the Plunge Departments race to the cloud, leaving security scrambling. (Is security slowing down adoption?) Bending the Rules Unsanctioned cloud use or lack of reporting to security what is in use. New Environment, Same Security Team Surface area is expanding, changing, and dynamic, yet security team isn’t as agile. “Operators think that once it’s in the cloud it’s no longer their responsibility” - Fmr. CIO of the Air Force
  • 21. @chicagoben | @obsidiansec Current Trends Making Things Harder
  • 22. @chicagoben | @obsidiansec IT and Security Disconnect IT Security Authentication Authorization Activity Enablement Threat Management DISCONNECTED Provisioning Anomaly Detection
  • 24. @chicagoben | @obsidiansec Cloud Security: “Of” Versus “In” Cloud Service Provider: responsible for security OF the cloud Customer: responsible for security IN the cloud
  • 25. @chicagoben | @obsidiansec AWS Responsibilities?
  • 26. @chicagoben | @obsidiansec AZURE Responsibilities?
  • 27. @chicagoben | @obsidiansec SaaS: “Of” Versus “In” The SaaS Provider handles all aspects except for identity and access management, client devices controls, and data accountability. The Customer, therefore, must understand users, devices & data related to that service.
  • 28. @chicagoben | @obsidiansec Office 365? Microsoft handles the underlying infrastructure, including patching and updating, and handles accessibility of the service. You are responsible for what is emailed, who accesses the email, and how they access the email.
  • 29. @chicagoben | @obsidiansec AZURE Responsibilities?Hackers want this!
  • 30. @chicagoben | @obsidiansec AWS Responsibilities? Hackers want this!
  • 33. @chicagoben | @obsidiansec Awareness, Auditing, Adaptation, Automation
  • 34. @chicagoben | @obsidiansec Awareness ๏Where are you using the cloud? ๏What “clouds” are you using? ๏Why are you using the cloud? ๏How are you using the cloud? ๏Who’s responsible for what’s in the cloud?
  • 35. @chicagoben | @obsidiansec Auditing ๏Understand current state (IT)…assets, users, devices. ๏Understand current state (Security). ๏Understand initiatives that involve cloud. ๏Understand security capabilities related to cloud.
  • 36. @chicagoben | @obsidiansec Adaptation ๏Put policies and checks in place for new deployments ๏Update security scans and tests to account for cloud ๏Enable tracking of all changes from current state ๏Have a process for monitoring all new accounts, assets, etc.
  • 37. @chicagoben | @obsidiansec Automation ๏Change your processes to reduce risk! ๏Security audits should be automated. ๏Cloud Providers have APIs – write code or use integrations to automate the collection of data, the taking of actions, the verification of changes. ๏Avoid manual activities.
  • 39. @chicagoben | @obsidiansec Triple-A! Authentication AccountingAuthorization Industry focus Neglected Forgotten
  • 40. @chicagoben | @obsidiansec IT and Security: Hand-in-Hand ๏Change your processes to reduce risk! ๏Security audits should be automated. ๏Cloud Providers have APIs – write code or use integrations to automate the collection of data, the taking of actions, the verification of changes. ๏Avoid manual activities. ๏Where are you using the cloud? ๏What “clouds” are you using? ๏Why are you using the cloud? ๏How are you using the cloud? ๏Who’s responsible for what’s in the cloud? ๏Understand current state (IT)…assets, users, devices. ๏Understand current state (Security). ๏Understand initiatives that involve cloud. ๏Understand security capabilities related to cloud. ๏Put policies and checks in place for new deployments ๏Update security scans and tests to account for cloud ๏Enable tracking of all changes from current state ๏Have a process for monitoring all new accounts, assets, etc.
  • 41. @chicagoben | @obsidiansec IT and Security: Hand-in-Hand Automate Change to Reduce Error and Risk Understanding Surface Area Understand Details and Processes Update processes and policies
  • 42. @chicagoben | @obsidiansec Journey vs. Outcomes Security teams often focus where they have the most autonomy; they get comfortable in this never-ending journey vs. driving toward new destinations.
  • 44. @chicagoben | @obsidiansec Take-Aways Understand where, how, and why you are using cloud. Understand who is responsible. Providers need to do more. They could reduce users shooting themselves in the foot, improve default security levels, and better show surface area. (Please encourage them to do more!) The rest is on you: (Awareness, Auditing, Adaptation, Automation)! Oh, yeah, Triple-A: (Authentication, Authorization, Accounting)! (and don’t forget hygiene.)
  • 45. @chicagoben | @obsidiansec Cloud: Massive Opportunity for Unifying IT & Security IT Security Enablement Enablement Provides Appropriate Tech Provides Appropriate Risk CONNECTED?