csv f03 secure innovation in public cloud myth or reality

白帽子

2019/03/16 发布于 技术 分类

文字内容
1. SESSION ID: CSV-F03 Secure Innovation in Public Cloud, Myth or Reality? Rehman Khan Brajesh Moni Director, Cloud & Data Security TD Ameritrade @cryptorak https://www.linkedin.com/in/rehmankhan/ Sr. Security Consultant, Cloud & Data Security TD Ameritrade https://www.linkedin.com/in/brajeshmoni/ #RSAC
2. #RSAC Innovation in Public Cloud External Drivers Businesses continue to find ways to move at a rapid pace due to competition, and new business models Aspirations of social integration, digital innovation, agility, and scale rapidly Acquisitions continue to pressure the markets demanding agility Business efficiency, reliability and margins Presenter’s Company Logo – replace or delete on master slide 2
3. #RSAC Innovation in Public Cloud Internal Drivers Access to information anywhere from any device by authorized users Developers wanting to experiment with new technologies such as voice, AI, Analytics, and chat. Reduce IT cost – transform technology spend from capital expenditure to operational expenditure. Leverage cloud’s agility to address internal customer needs through rapid prototyping, development and deployment product services Disrupt legacy competitors using public cloud economy of scale Presenter’s Company Logo – replace or delete on master slide 3
4. Impediments for Innovation in Public Cloud Default answer is “No” Organizations culture; fear of unknown Lack of knowledge; public, hybrid, private, IaaS, PaaS, SaaS. Without understanding the business usecases, you can’t understand what are real threats and risks to the use-case. Security teams are not equipped with technical skills that provide developers, data scientists with confidence. Presenter’s Company Logo – replace or delete on master slide 4 #RSAC
5. Innovation in Public Cloud – Use Cases Business Use-cases Analytics in the cloud – Speech to text Mechanical Turk - Outsourced Data Annotation Artificial Intelligence & ML - knowledge base, Data classification IOTs - Alexa WeChat, Apple Pay - Expanded sales Channel Presenter’s Company Logo – replace or delete on master slide 5 #RSAC
6. Foundational Components: Deliverable #1 #RSAC Get Executive Buy-in First because Cloud Security is Job Zero Step 1: Present to Executive leadership such as CRO, CPO, CLO, CFO and even sometimes CEO about the basics of Cloud Computing Story Step 2: Be transparent about current realities, there are already cloud applications being used Step 3: Share what you are going to do to manage risk about it in the short and long term. Step 4: Walk-through your capability roadmap and execution delivery plan Step 5: Go back and present iterative progress or lack thereof Presenter’s Company Logo – replace or delete on master slide 6
7. Foundational Components: Deliverable #2 #RSAC Establish a Cloud Security Department Bring in talent with cloud, security and technical (development) skills. Understand the actual business problem & use-cases, opens up the communications. Build relationship with Key stakeholders – Innovation, development and procurement teams. Establish clarity on what data is being worked on and how to protect it Focus on security controls that apply to usecases instead of blanket controls Presenter’s Company Logo – replace or delete on master slide 7
8. Foundational Components: Deliverable #3 Create & Communicate Cloud Security Product Goals 1. Reduce Risk: Establish an effective cloud security product to protect data and provide lite governance using complementary set of best-in-class tools and methods. 2. Agile Transformation: Enable, automate and integrate security controls day zero. Make it easy for business and developers to go fast securely in the cloud. 3. Left-Shift with Partnerships : Innovate securely with teams and make cloud secure from day zero 4. Technology specific solutions: Accelerate security solution deployment (e.g. Public Cloud workload, Mobile, SaaS and Vendor applications) 5. Create a nimble cloud security roadmap 8
9. Foundational Components: Deliverable #4 Cloud Security Engagement Model • • • • Presenter’s Company Logo – replace or delete on master slide 9 #RSAC Identify and build relationships with innovation teams Build partnership with Supply management. Augment Vendor assessment with Cloud Security Specific Questionnaire. Communicate proactively • Monthly Cloud Security Tech Talks • Cloud Security Immersion Day • Create a collaborative channels for innovators and developers.
10. Foundational Components: Deliverable #5 Cloud Security Policy and Standards Set high level cloud security policy statement. Create Cloud Security Standards, includes – Identity and Access Management – Cloud Data security and information lifecycle. – Encryption and Key Management – Audit logging and log management – Security alerting and monitoring Presenter’s Company Logo – replace or delete on master slide Leverage existing security standards 10 #RSAC
11. Technical Components: Deliverable #6 #RSAC Deploy Cloud native security Platforms & security as code capabilities Create your own pipeline and agile practice Don’t boil the security tools ocean to address the risks – start with low hanging CSP native security tools – e.g.: tenant restrictions, IP whitelisting Focus on key risk attributes, access flow and data elements - (Restricted, PII, PCI). – Scrub, tokenize/mask restricted/confidential data Don’t try to integrate security to the mothership for all security capabilities Presenter’s Company Logo – replace or delete on master slide 11
12. Technical Components: Deliverable #7 Deploy secure account/subscription model • Adopt a secure account/subscription model. • Focus on Blast radius reduction model. Presenter’s Company Logo – replace or delete on master slide 12 #RSAC
13. Technical Components: Deliverable #8 Establish strong Cloud Identity and Access Management • Identity is the security perimeter and the control plane • Establish all cloud workload authentication and authorization through enterprise identity store. • Enable CSP native Identity protection capabilities Presenter’s Company Logo – replace or delete on master slide 13 #RSAC
14. Technical Components: Deliverable #9 #RSAC Establish strong encryption and key management solutions Enable Cloud Native Key Management Solutions – Azure Key Vault – AWS Key Management Service (KMS) Bring Your Own Key (BYOK) – Protect keys using Hardware Security Modules (HSMs) Automate the rotation of keys – Develop a process/timeline for rotating keys in and out of management solutions Enable Data At Rest / Data In Transit Encryption – At Rest – Virtual Disks, Databases, Storage – In Transit – SSL/TLS Presenter’s Company Logo – replace or delete on master slide 14
15. Technical Components: Deliverable #10 Establish ML enabled data classification Enable Cloud Native Data Classification solutions – Azure Information Protection (AIP) – Amazon Macie Presenter’s Company Logo – replace or delete on master slide – Classify o Automate data classification(AIP, Macie) – Label o Automate data labeling – Protect o Apply policies based on the data risk level. 15 #RSAC
16. Technical Components: Deliverable #11 #RSAC Cloud logging & Monitoring Presenter’s Company Logo – replace or delete on master slide • Centralize & Ingest Cloud Log Data • Explore the data – for critical operational & security insight. • Define alerts, security events • – categorize & Score risk events • – collaborate and provide visibility to Incident response and Vulnerability teams. • Enable native logging and monitoring dashboards – Azure Security, AWS Security • Automate event response and apply ML by enabling native CSP and SIEM tool sets. • Evaluate the results and iterate logging and monitoring deployment model. 16
17. #RSAC Technical Components: Deliverable #12 Cloud Access Security Broker Presenter’s Company Logo – replace or delete on master slide 17 • Discovery & Visibility • Granular Identity access control. • Tighten integration with on-perm tools • Threat Protection • Data Loss Prevention
18. Cloud Security Insights Matter Presenter’s Company Logo – replace or delete on master slide 18 #RSAC
19. #RSAC Putting it all Together Cloud Security Platform ! Cloud Security Governance, Policies & Standards DevSecOps SaaS Security PaaS Security IaaS Security API Security Cloud Identity & Access Services Cloud Access Security Broker Cloud Security Logging, Analytics, Artificial Intel & Monitoring Virtual Private Cloud Tagging & Config Rules Security Groups Event Auditing Incident Response Workload Security Automated Metrics Traditional Security Engineering Services Presenter’s Company Logo – replace or delete on master slide Certificate Mgmt. Endpoint DLP Database Monitoring Network DLP Endpoint AV Endpoint APT Network Firewall Network APT 19
20. Leverage Cloud based Security solutions Key Benefits: Cloud Service and Application Providers are fast, better equipped with advanced security tools, automation and security engineering resources than traditional IT organizations • Builds trust model with the business results into more engagements • Remove traditional IT obstacles by partnering early with infrastructure organizations • Enable Automated Cloud management security solution. • Start integrating with enterprise solutions such as aggregated Cloud logging solution or SIEM Integration. • Risk Information sharing across the Security organization for visibility and actions/exceptions that are required for an innovation Presenter’s Company Logo – replace or delete on master slide 20 #RSAC
21. #RSAC Reality Checklist  Get Executive Buy-in First   Establish a Cloud Security Organization with a Governance program Deploy secure account/subscription model  Communicate Cloud Security Product Goals Establish strong Cloud Identity and Access Management  Establish strong encryption and key management solutions  Establish ML enabled data classification  Cloud logging & Monitoring  Cloud Access Security Broker(CASB)     Cloud security engagement model Cloud Security Policy and Standards Deploy Cloud native security Platforms & security as code capabilities Presenter’s Company Logo – replace or delete on master slide 21
23. #RSAC APPENDIX Presenter’s Company Logo – replace or delete on master slide 23