doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app...

27
SHADOW IT doesn’t have to be SHADY SHADY Joey Peloquin Standing in for Netskope

Transcript of doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app...

Page 1: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

SHADOW IT doesn’t have to be SHADY SHADY

Joey Peloquin Standing in for Netskope

Page 2: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

Cloud app revenue explosion

2

Page 3: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

Cloud app projects double in 12 months

3

First&Half& Second&Half&

2013&

x 2x 451&Research&

Page 4: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

4

There are 5,000 enterprise apps today (and growing).

Page 5: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

People love their cloud apps, and for good reason

Anywhere Access Collaboration Productivity

5

Page 6: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

6

Actual:

461

IT estimate:

40-50

Source:&Netskope&Data&

Business underestimates

cloud app usage by &

90%

Page 7: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

7

Actual:

461

IT estimate:

40-50

Source:&Netskope&Data&

App redundancy&

41 HR 27 Storage 27 Finance

This was controlled by IT in the past&

Page 8: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

8

61% Of&those&surveyed&don’t&have&a&or&don’t&know&about&their&cloud&app&policy.&

17%&&don’t&know&

44%&&don’t&have&

Page 9: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

People love their cloud apps, and for good reason

9

Love doesn’t have to be blind

Page 10: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

10

STEP 1: Discover the cloud

apps running in your enterprise

Page 11: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

11

STEP 1: Discover the cloud

apps running in your enterprise

•  3rd&party&tools&like&Netskope&can&analyze&firewall&logs&(and&others)&for&this&informaNon&

•  Resist&the&urge&to&immediately&blacklist&unsancNoned&apps&

Page 12: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

12

User Location Device

Time

Activity

App Content

Risk

w/Whom

STEP 2: Understand the context of

usage at a deeper level

Page 13: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

13

STEP 3: Plot a course of action based on risk, usage criticality

Page 14: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

14

STEP 3: Plot a course of action based on risk, usage criticality

•  Use&an&objecNve&criteria&for&assessing&app.&The&Cloud&Controls&Matrix&from&CSA&is&good&start&and&vendors&have&taken&this&to&a&whole&new&level.&

•  AVer&risk,&look&at&usage,&including&the&nature&of&the&content.&This&will&help&triage&next&steps,&especially&when&hundreds&of&apps&are&in&play.&&

•  Risky&usage&can&be&more&important&than&app&risk.&

Page 15: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

STEP 4:

15

Enact a cloud app policy that people can get behind

Page 16: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

16

STEP 4: Enact a cloud app policy that people can get behind

•  ConsumerizaNon&is&a&strong&force&—&being&too&heavyYhanded&with&policy&is&a&recipe&for&revolt&

•  Consider&what&other&policies&need&to&be&modified&

•  Be&transparent&about&how&you’ll&treat&unsancNoned&apps&

•  Create&an&amnesty&program&for&cloud&app&admins&that&are&embedded&in&business&units&

Page 17: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

17

STEP 5: Monitor usage, detect anomalies, conduct forensics

Page 18: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

18

STEP 5: Monitor usage, detect anomalies, conduct forensics

•  Use&machine&learning&tools&to&establish&baselines&and&monitor&anomalous&behavior&in&realYNme&

•  Use&context&to&reduce&false&posiNves&and&false&negaNves&

•  Establish&clear&rules&for&forensic&analysis&to&maintain&user&privacy&while&protecNng&data&&

Page 19: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

19

STEP 6: Identify and prevent the loss of sensitive data

Page 20: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

20

STEP 6: Identify and prevent the loss of sensitive data

•  Rely&on&tools&that&are&built&for&analysis&of&content&in&the&cloud&(don’t&backhaul&data&onYpremises&for&analysis)&

•  Leverage&rich&context&around&app,&user,&Nme,&etc.&before&you&look&at&the&data&to&help&reduce&unnecessary&analysis&&

Page 21: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

21

STEP 7: Implement security without breaking business process

Page 22: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

22

STEP 7: Implement security without breaking business process

•  Understand&app&usage&and&dependencies.&Talk&to&users&and&find&out&what&they’re&doing&with&these&apps&

•  Stop&blocking&by&default.&Think&about&how&stopping&a&specific&behavior&(i.e.,&sharing&outside&of&the&company)&might&be&enough&

Page 23: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

23

STEP 8: Don’t leave users in the dark. Coach them on safe usage.

Page 24: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

24

STEP 8: Don’t leave users in the dark. Coach them on safe usage.

•  Users&are&acutely&aware&of&how&an&app&should&work.&If&you’re&doing&something&that&changes&that&experience,&let&them&know.&

•  A&li^le&coaching&goes&a&long&ways.&You’re&buying&good&will.&

•  Tell&them&what&you’d&like&them&to&do&instead.&Offer&alternaNves&if&you’re&going&to&stop&something.&

Page 25: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

4: Enact a cloud app policy that people can get behind

3: Plot your course of action based on risk, usage, criticality

2: Understand the context of usage at a deeper level

8: Don’t leave users in the dark. Coach them on safe usage.

7: Implement security without breaking business process

6: Identify and prevent the loss of sensitive data

5: Monitor usage, detect anomalies, conduct forensics 1: Discover the cloud apps

running in your enterprise

Page 26: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

The real face of shadow IT is you, me and even IT. We’re being asked to solve this and to be strategic. It’s a new dynamic that we need to embrace. (big picture/words) Business Risk is the real shadow

26

The real face of shadow IT is you and me.

Ultimately, this is simply unmanaged risk.

Page 27: doesn’t have to be SHADY - OWASP · SHADY Joey Peloquin Standing in for Netskope. Cloud app revenue explosion 2. Cloud app projects double in 12 months 3 First&Half& Second&Half&

Allow is the new block (allow is new block green light slide)

27