SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
Practical Cloud Security
Lessons Learned from the Bleeding Edge
Bill Burns | Executive-In-Residence | Scale Venture Partners | Bill@ScaleVP.com | @x509v3
Background
•  Production hybrid cloud security at scale
o  Deployed distributed, hybrid cloud WAF
o  Co-developed CloudHSM for IaaS HW root of trust
•  Corporate IT “all-cloud” security strategy
o  Cloud-first, mobile-first infrastructure model
o  Mix of public cloud, best-of-breed SaaS
o  This is the Future of corporate IT services
•  RSAC Program Committee, Startup Technical Advisory
Boards, ISSA CISO Forum & Career Lifecycle
•  Netflix, AOL, Netscape, Accenture Research
Topics
•  Cloud: Why now? What’s changed?
•  Forcing functions and new perimeters
•  Cloud Security Controls: What’s new?
•  Third-Party Risks: InfoSec and The Business
•  Herding Data: Getting Started
•  Security startups
Forcing Functions on IT Security
Cloud
Services
Network Access
Ubiquity
Mobility
Consumerization /
BYOD
Work/Life
Integration
Business
Risk
Agile/
DevOps
Cloud Forcing Function - Mobility
Source: Mary Meeker, KPCB
Cloud Forcing Function - Consumerization
•  58% / 42% of Americans now own a smartphone / tablet(1)
•  By 2017: 50% of employers will require employees to
BYOD for work purposes(2)
(1) Pew Research, Jan 2014
(2) Gartner, May 2013
Forcing Function - Network AccessForcing Function - Network Access
•  Network connectivity & seamless roaming
o  802.11ac – wireless networking now “just works”
§  Faster than typical wired ports, easier to provision
o  Mobile 4G LTE is “fast enough”
§  Faster than home ISPs
§  2018: 25% of corporate data will flow directly mobile-cloud(3)
•  Blending work/life integration
o  Aruba’s “#GenMobile”initiative
o  Starbucks wants to be your life’s “3rd Place”
(3) Gartner, Nov 2013
Old: Perimeter Firewalls
•  Castle and Moat defense
•  Provisioning was serialized, expensive
•  Place people, data behind datacenter firewalls
•  “Behind firewalls” = Trusted
New Perimeters : Follow the Data
•  Controls evolving to be more:
o  Proximal - Controls are close to the application/data
o  Mobile - Move with the infrastructure/application
o  Resilient - Emphasize recovery, response
o  Holistic - Technical, legal, and business-level input
o  Coordinated - Reliant on communications, automation
o  Tiered - Nothing new here
New Perimeters : Follow the Data
What’s Your Cloud Comfort Level?
•  Cloud Adoption / Maturity:
o  Naysayers: you can’t do that (but can’t articulate why)
o  Pathfinders: here’s how to do it, lessons learned
o  Optimizers: here’s how to do it well, what not to do
What’s Your Cloud Comfort Level?
•  Cloud Adoption/Maturity
o  Naysayers
o  Pathfinders
o  Optimizers
o  Cloud is inevitable. Learn how to manage it.
o  Example: “We have 10 years of legacy work to deal with,
we don’t have time to look at our cloud usage!”
•  It’s about the business
o  Board-level discussion on results, competition, risk
Cloud Security: New(ish) tech controls
•  Goal: Track movement, access to data
o  DRM/DLP-like controls, applied closer to the data
o  Encrypt data, SoD for encryption keys
o  Even though the data is not in your datacenter
•  Goal: Restrict access to data, applications
o  Forward and Reverse proxy servers
o  Old: Port/protocol-based network, subnets, host firewalls
o  New: Tags, labels, data and host classification/sensitivity
o  Log management, anomaly detection
o  IAM - Risk-based authentication, SSO (for free)
Risks: InfoSec and The Business
Q: Who owns the risk in a new business endeavor?
Risks: InfoSec and The Business
•  Who owns the risk in a new business endeavors?
•  The business does
•  InfoSec’s role:
•  Be a trusted advisor to the business
•  Anticipate security risk/controls changes and needs
•  Communicate technical risks in business terms
•  Propose options, help the business take smart risks
•  Implement guardrails based on risk, sensitivity
•  Measure risk, managing remediation/response
•  Measure of success: Repeat business for your team!
Risks: InfoSec and The Business
•  Legal, business perspectives
•  Managing the risk – legal levers
o  Risk-based: Level of scrutiny based on data sensitivity
o  Add boilerplate language in your contracts, MSAs, etc.
o  Strive to require partners to have security
fundamentals in place: operational security basics,
secure development, security incident notification, etc.
o  Right to audit, assess => partner with your partners
Risks: InfoSec and The Business
•  Managing the risk – technical levers
o  Trust but verify their controls. It’s your data!
o  Do an initial assessment, plus ongoing automated tests
o  Partner with your partners on results you find
o  Things to watch out for …
Risks: InfoSec and The Business
•  Proving data security, good security hygiene
o  Service Providers should be more secure than SMBs
§  Laser-focused, homogeneous environment, etc.
o  Doesn’t scale: Every customer pentesting their provider
§  Open Item: Which standard should we trust?
•  Which controls are most relevant, important for
your data?
o  Encryption, incident response, audit, SoD, …
o  Prioritize those during negotiations, evaluations
Lessons learned: Getting Started
•  Start simple
o  Move least-risky workflows first
o  Orchestrate, automate security controls
o  Stage patches like other bugs and new features
o  Datacenter-to-Cloud connectivity, WAN-like latency
o  Wholesale migration vs. re-architecting apps
•  Migration phase
o  Running “hybrid”, “dual stack” or “riding roman”
o  Migrate workflows systematically
o  Inter-service dependencies
Lessons learned: Getting Started
•  Infrastructure Services
o  Plan: Pick 1-3 security metrics you’d like to improve in your
cloud, compare them to legacy infrastructure
o  Days to patch vulns, avg host uptime, fw ACLs used
o  Do: Start simple, fail fast on “uninteresting” workflows and
transactions; test response protocols
o  Improve: Start codifying security policies, patches,
automating provisioning and inventory controls
o  Good security starts with solid operational hygiene
o  Repeat: review lessons learned often, make small course
corrections.
Lessons learned: Getting Started
•  Corporate Services & “Shadow IT”
o  Baseline: Get visibility into your cloud services
§  You’re using more than you realize
§  Meet and share with IT, legal, other stakeholders
§  Facts lead to business-level conversations
o  Log: Start collecting/mining SaaS access, audit logs
o  Protect and Observe:
§  Deploy SAML, 2FA, integrate with your directory
§  Evaluate cloud service brokers, features
Evaluating Security Startups
•  Investors:
o  Management team domain expertise, background
o  Competitive advantages
o  Market readiness, fit
o  Product fit
•  Customers:
o  Support fit, scalability
o  Roadmap fit, ability to execute against it
o  Risk fit, operational hygiene / best practices
Guidance for Security Startups
o  Be 10x better - provide superior customer value
o  Look for disruptive technologies, approaches
o  What else does the solution require?
o  What can I turn off?
o  Think API first
o  Defenders & DevOps: The future is automation, interoperability,
integration
o  No cheating: Build your GUI on your API
o  Model, measure, provide insights
o  A/B testing, modeling allows safe experimentation
o  Provide insights of current risk state
o  Manage my cloud risk better than my legacy infrastructure
o  A good deployment strategy starts with a great migration strategy
Thank you
Bill Burns | Executive-In-Residence | Scale Venture Partners | Bill@ScaleVP.com | @x509v3

Weitere ähnliche Inhalte

Was ist angesagt?

Rsac2015 burns-fighting the right battle
Rsac2015 burns-fighting the right battleRsac2015 burns-fighting the right battle
Rsac2015 burns-fighting the right battleBill Burns
 
CD and the curse of legacy
CD and the curse of legacyCD and the curse of legacy
CD and the curse of legacyBanos Solomou
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensenjaredcarst
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLPRobert Kloots
 
Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Jisc
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Tudor Damian
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anywayIRIS
 
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...PECB
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...Penelope Toth
 
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...AIIM International
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeBrenda Majewski
 
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...Penelope Toth
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor
 
Paging, Alerting, Chaos Eng Overview
Paging, Alerting, Chaos Eng OverviewPaging, Alerting, Chaos Eng Overview
Paging, Alerting, Chaos Eng Overviewmatthewbrahms
 

Was ist angesagt? (19)

Rsac2015 burns-fighting the right battle
Rsac2015 burns-fighting the right battleRsac2015 burns-fighting the right battle
Rsac2015 burns-fighting the right battle
 
CD and the curse of legacy
CD and the curse of legacyCD and the curse of legacy
CD and the curse of legacy
 
Abb e guide3
Abb e guide3Abb e guide3
Abb e guide3
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
Helping SME’S to face cybersecurity threats
Helping SME’S to face cybersecurity threatsHelping SME’S to face cybersecurity threats
Helping SME’S to face cybersecurity threats
 
Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anyway
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
 
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
 
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
 
Paging, Alerting, Chaos Eng Overview
Paging, Alerting, Chaos Eng OverviewPaging, Alerting, Chaos Eng Overview
Paging, Alerting, Chaos Eng Overview
 

Andere mochten auch

The Current State of OAuth 2
The Current State of OAuth 2The Current State of OAuth 2
The Current State of OAuth 2Aaron Parecki
 
Null Singapore 2015 accomplishments
Null Singapore 2015 accomplishmentsNull Singapore 2015 accomplishments
Null Singapore 2015 accomplishmentsMohammed A. Imran
 
Pentesting RESTful webservices
Pentesting RESTful webservicesPentesting RESTful webservices
Pentesting RESTful webservicesMohammed A. Imran
 
Exploit development 101 - Part 1 - Null Singapore
Exploit development 101 - Part 1 - Null SingaporeExploit development 101 - Part 1 - Null Singapore
Exploit development 101 - Part 1 - Null SingaporeMohammed A. Imran
 
Cross site scripting attacks and defenses
Cross site scripting attacks and defensesCross site scripting attacks and defenses
Cross site scripting attacks and defensesMohammed A. Imran
 
Automated API pentesting using fuzzapi
Automated API pentesting using fuzzapiAutomated API pentesting using fuzzapi
Automated API pentesting using fuzzapiAbhijeth D
 
System Hacking Tutorial #3 - Buffer Overflow - Egg Hunting
System Hacking Tutorial #3 - Buffer Overflow - Egg HuntingSystem Hacking Tutorial #3 - Buffer Overflow - Egg Hunting
System Hacking Tutorial #3 - Buffer Overflow - Egg Huntingsanghwan ahn
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Authorization and Authentication in Microservice Environments
Authorization and Authentication in Microservice EnvironmentsAuthorization and Authentication in Microservice Environments
Authorization and Authentication in Microservice EnvironmentsLeanIX GmbH
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityAlert Logic
 
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...Amazon Web Services
 
Deep Dive into Keystone Tokens and Lessons Learned
Deep Dive into Keystone Tokens and Lessons LearnedDeep Dive into Keystone Tokens and Lessons Learned
Deep Dive into Keystone Tokens and Lessons LearnedPriti Desai
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0Amazon Web Services
 

Andere mochten auch (17)

The Current State of OAuth 2
The Current State of OAuth 2The Current State of OAuth 2
The Current State of OAuth 2
 
Null Singapore 2015 accomplishments
Null Singapore 2015 accomplishmentsNull Singapore 2015 accomplishments
Null Singapore 2015 accomplishments
 
Pentesting RESTful webservices
Pentesting RESTful webservicesPentesting RESTful webservices
Pentesting RESTful webservices
 
Defense in Depth – Your Security Castle
Defense in Depth – Your Security CastleDefense in Depth – Your Security Castle
Defense in Depth – Your Security Castle
 
Exploit development 101 - Part 1 - Null Singapore
Exploit development 101 - Part 1 - Null SingaporeExploit development 101 - Part 1 - Null Singapore
Exploit development 101 - Part 1 - Null Singapore
 
Assembly language part I
Assembly language part IAssembly language part I
Assembly language part I
 
Cross site scripting attacks and defenses
Cross site scripting attacks and defensesCross site scripting attacks and defenses
Cross site scripting attacks and defenses
 
Automated API pentesting using fuzzapi
Automated API pentesting using fuzzapiAutomated API pentesting using fuzzapi
Automated API pentesting using fuzzapi
 
System Hacking Tutorial #3 - Buffer Overflow - Egg Hunting
System Hacking Tutorial #3 - Buffer Overflow - Egg HuntingSystem Hacking Tutorial #3 - Buffer Overflow - Egg Hunting
System Hacking Tutorial #3 - Buffer Overflow - Egg Hunting
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Pentesting ReST API
Pentesting ReST APIPentesting ReST API
Pentesting ReST API
 
Authorization and Authentication in Microservice Environments
Authorization and Authentication in Microservice EnvironmentsAuthorization and Authentication in Microservice Environments
Authorization and Authentication in Microservice Environments
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
 
Deep Dive into Keystone Tokens and Lessons Learned
Deep Dive into Keystone Tokens and Lessons LearnedDeep Dive into Keystone Tokens and Lessons Learned
Deep Dive into Keystone Tokens and Lessons Learned
 
Fuzzing: An introduction to Sulley Framework
Fuzzing: An introduction to Sulley FrameworkFuzzing: An introduction to Sulley Framework
Fuzzing: An introduction to Sulley Framework
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 

Ähnlich wie Cloud Security Summit - InfoSec World 2014

What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsBill Burns
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The CloudPECB
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015Shannon Lietz
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015Shannon Lietz
 
Cloud forum-lessons-learned-20110405c-final
Cloud forum-lessons-learned-20110405c-finalCloud forum-lessons-learned-20110405c-final
Cloud forum-lessons-learned-20110405c-finalMauricio Godoy
 
Observability in serverless solutions
Observability in serverless solutionsObservability in serverless solutions
Observability in serverless solutionsLeonardo Murillo
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired
 
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...Security Innovation
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To CloudMichael Yung
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessAmazon Web Services
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessAmazon Web Services
 
Unblocking Innovation for Digital Transformation
Unblocking Innovation for Digital TransformationUnblocking Innovation for Digital Transformation
Unblocking Innovation for Digital TransformationAmazon Web Services
 

Ähnlich wie Cloud Security Summit - InfoSec World 2014 (20)

What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burns
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
Cloud forum-lessons-learned-20110405c-final
Cloud forum-lessons-learned-20110405c-finalCloud forum-lessons-learned-20110405c-final
Cloud forum-lessons-learned-20110405c-final
 
Observability in serverless solutions
Observability in serverless solutionsObservability in serverless solutions
Observability in serverless solutions
 
AWS Services 7 Transformation Media
AWS Services 7 Transformation MediaAWS Services 7 Transformation Media
AWS Services 7 Transformation Media
 
Cloud versus On Premise
Cloud versus On PremiseCloud versus On Premise
Cloud versus On Premise
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
 
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloud
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To Cloud
 
Unc charlotte prezo2016
Unc charlotte prezo2016Unc charlotte prezo2016
Unc charlotte prezo2016
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
Unblocking Innovation for Digital Transformation
Unblocking Innovation for Digital TransformationUnblocking Innovation for Digital Transformation
Unblocking Innovation for Digital Transformation
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 

Kürzlich hochgeladen

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 

Kürzlich hochgeladen (20)

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 

Cloud Security Summit - InfoSec World 2014

  • 1. Practical Cloud Security Lessons Learned from the Bleeding Edge Bill Burns | Executive-In-Residence | Scale Venture Partners | Bill@ScaleVP.com | @x509v3
  • 2. Background •  Production hybrid cloud security at scale o  Deployed distributed, hybrid cloud WAF o  Co-developed CloudHSM for IaaS HW root of trust •  Corporate IT “all-cloud” security strategy o  Cloud-first, mobile-first infrastructure model o  Mix of public cloud, best-of-breed SaaS o  This is the Future of corporate IT services •  RSAC Program Committee, Startup Technical Advisory Boards, ISSA CISO Forum & Career Lifecycle •  Netflix, AOL, Netscape, Accenture Research
  • 3. Topics •  Cloud: Why now? What’s changed? •  Forcing functions and new perimeters •  Cloud Security Controls: What’s new? •  Third-Party Risks: InfoSec and The Business •  Herding Data: Getting Started •  Security startups
  • 4. Forcing Functions on IT Security Cloud Services Network Access Ubiquity Mobility Consumerization / BYOD Work/Life Integration Business Risk Agile/ DevOps
  • 5. Cloud Forcing Function - Mobility Source: Mary Meeker, KPCB
  • 6. Cloud Forcing Function - Consumerization •  58% / 42% of Americans now own a smartphone / tablet(1) •  By 2017: 50% of employers will require employees to BYOD for work purposes(2) (1) Pew Research, Jan 2014 (2) Gartner, May 2013
  • 7. Forcing Function - Network AccessForcing Function - Network Access •  Network connectivity & seamless roaming o  802.11ac – wireless networking now “just works” §  Faster than typical wired ports, easier to provision o  Mobile 4G LTE is “fast enough” §  Faster than home ISPs §  2018: 25% of corporate data will flow directly mobile-cloud(3) •  Blending work/life integration o  Aruba’s “#GenMobile”initiative o  Starbucks wants to be your life’s “3rd Place” (3) Gartner, Nov 2013
  • 8. Old: Perimeter Firewalls •  Castle and Moat defense •  Provisioning was serialized, expensive •  Place people, data behind datacenter firewalls •  “Behind firewalls” = Trusted
  • 9. New Perimeters : Follow the Data •  Controls evolving to be more: o  Proximal - Controls are close to the application/data o  Mobile - Move with the infrastructure/application o  Resilient - Emphasize recovery, response o  Holistic - Technical, legal, and business-level input o  Coordinated - Reliant on communications, automation o  Tiered - Nothing new here New Perimeters : Follow the Data
  • 10. What’s Your Cloud Comfort Level? •  Cloud Adoption / Maturity: o  Naysayers: you can’t do that (but can’t articulate why) o  Pathfinders: here’s how to do it, lessons learned o  Optimizers: here’s how to do it well, what not to do
  • 11. What’s Your Cloud Comfort Level? •  Cloud Adoption/Maturity o  Naysayers o  Pathfinders o  Optimizers o  Cloud is inevitable. Learn how to manage it. o  Example: “We have 10 years of legacy work to deal with, we don’t have time to look at our cloud usage!” •  It’s about the business o  Board-level discussion on results, competition, risk
  • 12. Cloud Security: New(ish) tech controls •  Goal: Track movement, access to data o  DRM/DLP-like controls, applied closer to the data o  Encrypt data, SoD for encryption keys o  Even though the data is not in your datacenter •  Goal: Restrict access to data, applications o  Forward and Reverse proxy servers o  Old: Port/protocol-based network, subnets, host firewalls o  New: Tags, labels, data and host classification/sensitivity o  Log management, anomaly detection o  IAM - Risk-based authentication, SSO (for free)
  • 13. Risks: InfoSec and The Business Q: Who owns the risk in a new business endeavor?
  • 14. Risks: InfoSec and The Business •  Who owns the risk in a new business endeavors? •  The business does •  InfoSec’s role: •  Be a trusted advisor to the business •  Anticipate security risk/controls changes and needs •  Communicate technical risks in business terms •  Propose options, help the business take smart risks •  Implement guardrails based on risk, sensitivity •  Measure risk, managing remediation/response •  Measure of success: Repeat business for your team!
  • 15. Risks: InfoSec and The Business •  Legal, business perspectives •  Managing the risk – legal levers o  Risk-based: Level of scrutiny based on data sensitivity o  Add boilerplate language in your contracts, MSAs, etc. o  Strive to require partners to have security fundamentals in place: operational security basics, secure development, security incident notification, etc. o  Right to audit, assess => partner with your partners
  • 16. Risks: InfoSec and The Business •  Managing the risk – technical levers o  Trust but verify their controls. It’s your data! o  Do an initial assessment, plus ongoing automated tests o  Partner with your partners on results you find o  Things to watch out for …
  • 17. Risks: InfoSec and The Business •  Proving data security, good security hygiene o  Service Providers should be more secure than SMBs §  Laser-focused, homogeneous environment, etc. o  Doesn’t scale: Every customer pentesting their provider §  Open Item: Which standard should we trust? •  Which controls are most relevant, important for your data? o  Encryption, incident response, audit, SoD, … o  Prioritize those during negotiations, evaluations
  • 18. Lessons learned: Getting Started •  Start simple o  Move least-risky workflows first o  Orchestrate, automate security controls o  Stage patches like other bugs and new features o  Datacenter-to-Cloud connectivity, WAN-like latency o  Wholesale migration vs. re-architecting apps •  Migration phase o  Running “hybrid”, “dual stack” or “riding roman” o  Migrate workflows systematically o  Inter-service dependencies
  • 19. Lessons learned: Getting Started •  Infrastructure Services o  Plan: Pick 1-3 security metrics you’d like to improve in your cloud, compare them to legacy infrastructure o  Days to patch vulns, avg host uptime, fw ACLs used o  Do: Start simple, fail fast on “uninteresting” workflows and transactions; test response protocols o  Improve: Start codifying security policies, patches, automating provisioning and inventory controls o  Good security starts with solid operational hygiene o  Repeat: review lessons learned often, make small course corrections.
  • 20. Lessons learned: Getting Started •  Corporate Services & “Shadow IT” o  Baseline: Get visibility into your cloud services §  You’re using more than you realize §  Meet and share with IT, legal, other stakeholders §  Facts lead to business-level conversations o  Log: Start collecting/mining SaaS access, audit logs o  Protect and Observe: §  Deploy SAML, 2FA, integrate with your directory §  Evaluate cloud service brokers, features
  • 21. Evaluating Security Startups •  Investors: o  Management team domain expertise, background o  Competitive advantages o  Market readiness, fit o  Product fit •  Customers: o  Support fit, scalability o  Roadmap fit, ability to execute against it o  Risk fit, operational hygiene / best practices
  • 22. Guidance for Security Startups o  Be 10x better - provide superior customer value o  Look for disruptive technologies, approaches o  What else does the solution require? o  What can I turn off? o  Think API first o  Defenders & DevOps: The future is automation, interoperability, integration o  No cheating: Build your GUI on your API o  Model, measure, provide insights o  A/B testing, modeling allows safe experimentation o  Provide insights of current risk state o  Manage my cloud risk better than my legacy infrastructure o  A good deployment strategy starts with a great migration strategy
  • 23. Thank you Bill Burns | Executive-In-Residence | Scale Venture Partners | Bill@ScaleVP.com | @x509v3