Security Teams & Tech In A Cloud World

103
Security Teams & Tech In A Cloud World Mark Nunnikhoven, Vice President Cloud Research @marknca Audience: Public

Transcript of Security Teams & Tech In A Cloud World

Page 1: Security Teams & Tech In A Cloud World

Security Teams & Tech In A Cloud WorldMark Nunnikhoven, Vice President Cloud Research @marknca

Audience: Public

Page 2: Security Teams & Tech In A Cloud World

Security “Facts”

Page 3: Security Teams & Tech In A Cloud World

Security “Facts”* About your organization or one just like it

Page 4: Security Teams & Tech In A Cloud World

We will respond quickly to an incident

Page 5: Security Teams & Tech In A Cloud World

Attackers are on a network an average of 154 days

Page 6: Security Teams & Tech In A Cloud World

We need more tools

Page 7: Security Teams & Tech In A Cloud World

Canadian companies spend just under 10% on IT security

Page 8: Security Teams & Tech In A Cloud World

Canadian companies spend just under 10% on IT security* 60% of companies didn’t mention people or process as an area of focus

Page 9: Security Teams & Tech In A Cloud World

Users are a major problem

Page 10: Security Teams & Tech In A Cloud World

Security is considered the opposite of usability

Page 11: Security Teams & Tech In A Cloud World

Security is everyone’s responsibility

Page 12: Security Teams & Tech In A Cloud World

You have one, isolated security team

Page 13: Security Teams & Tech In A Cloud World

You have one, isolated security team* …and a wildly unsuccessful “awareness” program

Page 14: Security Teams & Tech In A Cloud World
Page 15: Security Teams & Tech In A Cloud World

Mark NunnikhovenVice President, Cloud Research Trend Micro@marknca

Page 16: Security Teams & Tech In A Cloud World

Modern Security

Page 17: Security Teams & Tech In A Cloud World

Video available at https://vimeo.com/111631197

Page 18: Security Teams & Tech In A Cloud World

Video available at https://vimeo.com/111631197

Page 19: Security Teams & Tech In A Cloud World

© Trend Micro, 201615

Automated Response

Web UIWeb UIWeb UIVM

Page 20: Security Teams & Tech In A Cloud World

© Trend Micro, 201615

Automated Response

Web UIWeb UIWeb UIVM

SIEM / Log Store

Page 21: Security Teams & Tech In A Cloud World

© Trend Micro, 201615

Automated Response

Web UIWeb UIWeb UIVM

SIEM / Log StoreMonitoring

Page 22: Security Teams & Tech In A Cloud World

© Trend Micro, 201615

Automated Response

Web UIWeb UIWeb UIVM

SIEM / Log StoreMonitoring

Event-driven Function

Page 23: Security Teams & Tech In A Cloud World

© Trend Micro, 201615

Automated Response

Web UIWeb UIWeb UIVM

SIEM / Log StoreMonitoring

CSP API Event-driven Function

Page 24: Security Teams & Tech In A Cloud World

© Trend Micro, 201615

Automated Response

Web UIWeb UIWeb UIVM

SIEM / Log StoreRestrict Access Monitoring

CSP API Event-driven Function

Page 25: Security Teams & Tech In A Cloud World

© Trend Micro, 201615

Automated Response

Web UIWeb UIWeb UIVM

SIEM / Log StoreRestrict Access Monitoring

Web UI

CSP API Event-driven Function

Page 26: Security Teams & Tech In A Cloud World

2014

Page 27: Security Teams & Tech In A Cloud World

What’s the hold up?

Page 28: Security Teams & Tech In A Cloud World
Page 29: Security Teams & Tech In A Cloud World
Page 30: Security Teams & Tech In A Cloud World
Page 31: Security Teams & Tech In A Cloud World
Page 32: Security Teams & Tech In A Cloud World

Running in the Cloud

Page 33: Security Teams & Tech In A Cloud World

IaaS(Infrastructure)

PaaS(Container)

SaaS(Abstract)

Data

Application

Operating System

Virtualization

Infrastructure

Physical

Data

Application

Operating System

Virtualization

Infrastructure

Physical

Data

Application

Operating System

Virtualization

Infrastructure

Physical

Shared Responsibility Model

Page 34: Security Teams & Tech In A Cloud World

Setup

• Lock down operating system, applications, and dataHarden system according to NIST / best practices Encrypt everything

• Enable service health monitoring featuresCheck your CSP’s documentation

• Monitor service API activitiesLook for unauthorized; replication, start up, termination, etc.

Steps:

IaaS

Page 35: Security Teams & Tech In A Cloud World

Setup

• Read all the documentationSeriously, RTFM

• Implement strong code quality systemsAutomation is critical to success

• Configure access control and other security featuresCheck your CSP’s documentation

Steps:

PaaS

Page 36: Security Teams & Tech In A Cloud World

Setup

• Read all the documentationSeriously, RTFM

• Configure access control and other security featuresCheck your CSP’s documentation

Steps:

SaaS

Page 37: Security Teams & Tech In A Cloud World

Setup

• Evaluate controls against acceptable level of risk for data used in serviceI shouldn’t have to say this

• Monitor all service provider status updates and communications channelsRemember to include them in your IR plans

Steps:

Any Cloud Service

Page 38: Security Teams & Tech In A Cloud World

IaaS(Infrastructure)

PaaS(Container)

SaaS(Abstract)

Data

Application

Operating System

Virtualization

Infrastructure

Physical

Data

Application

Operating System

Virtualization

Infrastructure

Physical

Data

Application

Operating System

Virtualization

Infrastructure

Physical

Shared Responsibility Model

Page 39: Security Teams & Tech In A Cloud World

Opportunity

Page 40: Security Teams & Tech In A Cloud World

© Trend Micro, 201627

PhysicalWeeks

VirtualDays

CloudMinutes

ContainerSeconds

FunctionImmediate

{ Time to deploy }

{ Environment }

Page 41: Security Teams & Tech In A Cloud World

© Trend Micro, 201628

PhysicalWeeks

VirtualDays

CloudMinutes

ContainerSeconds

FunctionImmediate

{ Time to deploy }

{ Environment }

Page 42: Security Teams & Tech In A Cloud World

© Trend Micro, 201629

Move faster Focus on value

Goal

Page 43: Security Teams & Tech In A Cloud World

© Trend Micro, 201630

Deploy using the method that delivers the most value

Goal

Page 44: Security Teams & Tech In A Cloud World

© Trend Micro, 201631

Every tool adds overhead

Constraint

Page 45: Security Teams & Tech In A Cloud World

© Trend Micro, 201632

Automation allows for the speed, scale, and consistency required

Relief

Page 46: Security Teams & Tech In A Cloud World

© Trend Micro, 201633

Deploy using the method that delivers the most value

Goal

Page 47: Security Teams & Tech In A Cloud World

© Trend Micro, 201634

…with minimal operational impact

Deploy using the method that delivers the most value

Goal

Page 48: Security Teams & Tech In A Cloud World

DevOps

Page 49: Security Teams & Tech In A Cloud World

Flickr deploys 10+/day

Success

Page 50: Security Teams & Tech In A Cloud World

Etsy deploys 50+/day

Flickr deploys 10+/day

Success

Page 51: Security Teams & Tech In A Cloud World

Etsy deploys 50+/day

Amazon deploys 11.7 seconds

Flickr deploys 10+/day

Success

Page 52: Security Teams & Tech In A Cloud World

Etsy deploys 50+/day

Amazon deploys 11.7 seconds

Adobe +60% app development

Flickr deploys 10+/day

Success

Page 53: Security Teams & Tech In A Cloud World

Etsy deploys 50+/day

Amazon deploys 11.7 seconds

Adobe +60% app development

Fidelity $2.3M saved for one app

Flickr deploys 10+/day

Success

Page 54: Security Teams & Tech In A Cloud World

Where’s security?

Page 55: Security Teams & Tech In A Cloud World

…can have a much stronger security posture in AWS and the cloud than they can on-premises

Andy Jassy, AWS CEO

* From an interview with the Wall Street Journal, http://www.wsj.com/articles/amazons-andy-jassy-on-the-promise-of-the-cloud-1477880220

Page 56: Security Teams & Tech In A Cloud World

Security is everyone’s responsibility

Page 57: Security Teams & Tech In A Cloud World

Security Everyone

Page 58: Security Teams & Tech In A Cloud World

Team Challenges

Page 59: Security Teams & Tech In A Cloud World
Page 60: Security Teams & Tech In A Cloud World

New Skills Needed

• Basic understanding of development practices & ability to write simple code Everything in the cloud is an API. Security MUST BE automated

• Puts the user f irst We make the tech that they “can’t use right” … not their fault

• Perspective & understanding of practical securityNo more “the sky is falling”

• EducatorsWritten, video, presentations, Slack,…anywhere teams are working

Steps:

Security Specialist

Page 61: Security Teams & Tech In A Cloud World
Page 62: Security Teams & Tech In A Cloud World

Your Org Chart Is Wrong

Page 63: Security Teams & Tech In A Cloud World

Typical Org Chart

CISO Dev

GRC Ops

Infrastructure

CIO

Ops

Page 64: Security Teams & Tech In A Cloud World

Updated Org Chart

CISO Dev

GRC Ops

Infrastructure

CIO

Ops

Page 65: Security Teams & Tech In A Cloud World

Updated Org Chart

CISO Dev

GRC

OpsInfrastructure

CIO

Ops

Page 66: Security Teams & Tech In A Cloud World

Updated Org Chart

CISO Dev

GRC

OpsInfrastructure

CIO

Ops

GrC

Page 67: Security Teams & Tech In A Cloud World

@petermePeter Merholz Kristin Skinner

@bettay

Page 68: Security Teams & Tech In A Cloud World

Specialist Distribution

Page 69: Security Teams & Tech In A Cloud World

Specialist Distribution

Page 70: Security Teams & Tech In A Cloud World

Specialist Distribution

Page 71: Security Teams & Tech In A Cloud World

Specialist Distribution

Page 72: Security Teams & Tech In A Cloud World

Specialist Distribution

Page 73: Security Teams & Tech In A Cloud World

Specialist Distribution

Page 74: Security Teams & Tech In A Cloud World

Specialist Distribution

Page 75: Security Teams & Tech In A Cloud World
Page 76: Security Teams & Tech In A Cloud World

Coffee Shadowing Teaching

Bridges

Page 77: Security Teams & Tech In A Cloud World

Goal

Page 78: Security Teams & Tech In A Cloud World

Fabric

Page 79: Security Teams & Tech In A Cloud World
Page 80: Security Teams & Tech In A Cloud World

1 min

Page 81: Security Teams & Tech In A Cloud World

1 min

Slow lane

Page 82: Security Teams & Tech In A Cloud World

1 min

Slow lane

Fast lane

Page 83: Security Teams & Tech In A Cloud World

1 min

Slow lane

Fast lane

Page 84: Security Teams & Tech In A Cloud World

1 min

Page 85: Security Teams & Tech In A Cloud World

1 min

Page 86: Security Teams & Tech In A Cloud World

1 min

Is this bad?

Page 87: Security Teams & Tech In A Cloud World

1 min

Is this bad?

Page 88: Security Teams & Tech In A Cloud World

1 min

Is this bad?

Is this malicious?and

Page 89: Security Teams & Tech In A Cloud World

1 min

Is this bad?

Is this malicious?and

Page 90: Security Teams & Tech In A Cloud World

1 min

Is this bad?

Is this malicious?and

Page 91: Security Teams & Tech In A Cloud World

1 min

Is this bad?

Page 92: Security Teams & Tech In A Cloud World

1 min

Aggregate information

Is this bad?

Page 93: Security Teams & Tech In A Cloud World

1 min

Aggregate information

Is this bad?

1m, h, d, w, m Trends

Page 94: Security Teams & Tech In A Cloud World

1 min

Aggregate information1m, h, d, w, m Trends

Page 95: Security Teams & Tech In A Cloud World

1 min

Aggregate information1m, h, d, w, m Trends

Evidence of compliance

Page 96: Security Teams & Tech In A Cloud World

1 min

Aggregate information1m, h, d, w, m Trends

Evidence of complianceConfiguration Processes

Page 97: Security Teams & Tech In A Cloud World

1 min

Aggregate information1m, h, d, w, m Trends

Evidence of complianceConfiguration Processes

Deployment data

Page 98: Security Teams & Tech In A Cloud World

1 min

Aggregate information1m, h, d, w, m Trends

Evidence of complianceConfiguration Processes

Deployment dataPerformance Debug

Page 99: Security Teams & Tech In A Cloud World

1 min

Page 100: Security Teams & Tech In A Cloud World

1 min

SecOps

Page 101: Security Teams & Tech In A Cloud World

1 minAggregate Evidence Deployments

SecOps

Page 102: Security Teams & Tech In A Cloud World

Get stuff done

Page 103: Security Teams & Tech In A Cloud World

© Trend Micro, 201660

Thank [email protected] | @marknca