Effec%ve	
  Security	
  Response	
  in	
  the	
  Cloud	
  
Sasha	
  Pavlovic,	
  Senior	
  Cloud	
  Security	
  Architect	
...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Abstract	
  
Effective Security Response in the Cloud
===========================...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
*	
  hAp://aws.amazon.com/about-­‐aws/	
  
A	
  infrastructure	
  plaJorm	
  defin...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
and	
  your	
   	
  company	
  doesn’t	
  need	
  to	
  	
  
worry	
  about	
  it...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Development	
   OperaPons	
  
Driving	
  change	
  
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Development	
   OperaPons	
  
+	
  
Driving	
  change	
  
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
New	
  goals	
  
Breakdown	
  silos	
  
Directly	
  align	
  with	
  business	
  ...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Security	
  needs	
  to	
  keep	
  pace	
  
Our	
  Challenge	
  
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
You	
  
FaciliPes	
  
Physical	
  Security	
  
Physical	
  Infrastructure	
  
Net...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
AWS	
  
FaciliPes	
  
Physical	
  Security	
  
Physical	
  Infrastructure	
  
Net...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Applied	
  at	
  the	
  boundary	
  
Operator	
  
TradiPonal	
  Security	
  
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Applied	
  to	
  each	
  instance	
  
Cloud	
  defences	
  
VPC	
  
VPC	
  
VPC	
...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Management	
  Deployment	
  
New	
  challenges	
  
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Leverage	
  exisPng	
  distribuPon	
  channels	
  
Addressing	
  the	
  challenge...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Recommended	
  choices	
  
AWS	
  OpsWorks	
  
Chef	
  
Puppet	
  
Salt	
  
Deplo...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Centralise	
  control	
  management	
  
Addressing	
  the	
  challenges	
  -­‐	
 ...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
In	
  acPon	
  
Our	
  challenge	
  
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
On	
  the	
  clock	
  
Our	
  challenge	
  
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
PreparaPon	
  
IdenPficaPon	
  
Containment	
  
EradicaPon	
  
Recovery	
  
Lesson...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Server	
  
Analyse	
   Verify	
   Adjust	
  
Replacement	
  Defend	
  
TradiPonal...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Instance	
  
Analyse	
   Verify	
   Adjust	
  
Defend	
  Replacement	
  
Cloud	
 ...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Need	
  to	
  automate	
  
isolaPon	
  
Cloud	
  process	
  –	
  automaPon	
  req...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Instance	
   Replacement	
  
1.	
  Monitor	
  the	
  	
  
log	
  stream	
  
API	
...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
In	
  acPon	
  
Our	
  Challenge	
  
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Cloud	
  process	
  
Instance	
  
Analyse	
   Verify	
   Adjust	
  
Defend	
  Rep...
©	
  2014,	
  Trend	
  Micro	
  Inc.	
  
Piggyback	
  on	
  provisioning	
  
Central	
  management	
  
AutomaPon	
  
Keys	...
Thank	
  you.	
  Learn	
  more	
  at	
  hAp://www.trendmicro.com/aws	
  
AWS Summit Auckland 2014 | Effective Security Response in the Cloud - Session Sponsored by Trend Micro
AWS Summit Auckland 2014 | Effective Security Response in the Cloud - Session Sponsored by Trend Micro
AWS Summit Auckland 2014 | Effective Security Response in the Cloud - Session Sponsored by Trend Micro
AWS Summit Auckland 2014 | Effective Security Response in the Cloud - Session Sponsored by Trend Micro
AWS Summit Auckland 2014 | Effective Security Response in the Cloud - Session Sponsored by Trend Micro
Upcoming SlideShare
Loading in …5
×

AWS Summit Auckland 2014 | Effective Security Response in the Cloud - Session Sponsored by Trend Micro

685 views
498 views

Published on

The cloud is a highly dynamic environment that changes the way organizations need to think about security, underpinned by the shared security model. Learn how to increase the effectiveness of your security response as you move to the cloud. We’ll discuss how to leverage features in AWS and our security tools to reduce downtime with minimal impact to your security and business operations. Pulling from experiences helping clients move to the cloud, this talk will help provide practical advice you can apply today.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
685
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

AWS Summit Auckland 2014 | Effective Security Response in the Cloud - Session Sponsored by Trend Micro

  1. 1. Effec%ve  Security  Response  in  the  Cloud   Sasha  Pavlovic,  Senior  Cloud  Security  Architect   Trend  Micro  
  2. 2. ©  2014,  Trend  Micro  Inc.   Abstract   Effective Security Response in the Cloud ===================================== The cloud is a highly dynamic environment that changes the way organisations need to think about security, underpinned by the shared security model. Learn how to increase the effectiveness of your security response as you move to the cloud. We’ll discuss how to leverage features in AWS and our security tools to reduce downtime with minimal impact to your security and business operations. Pulling from experiences helping clients move to the cloud, this talk will help provide practical advice you can apply today.
  3. 3. ©  2014,  Trend  Micro  Inc.   *  hAp://aws.amazon.com/about-­‐aws/   A  infrastructure  plaJorm  defined  as   Low  cost   Agile  &  ElasPc   Open  &  Flexible   Secure   AWS  
  4. 4. ©  2014,  Trend  Micro  Inc.   and  your    company  doesn’t  need  to     worry  about  it   asked  ironically  by  Peter  Waterhouse,  InformaPon  Week,  31-­‐Mar-­‐2014   hAp://www.informaPonweek.com/soXware/enterprise-­‐applicaPons/busPng-­‐5-­‐devops-­‐myths/d/d-­‐id/1141597   DevOps  is  a  technology  movement  for   right? The  movement  
  5. 5. ©  2014,  Trend  Micro  Inc.   Development   OperaPons   Driving  change  
  6. 6. ©  2014,  Trend  Micro  Inc.   Development   OperaPons   +   Driving  change  
  7. 7. ©  2014,  Trend  Micro  Inc.   New  goals   Breakdown  silos   Directly  align  with  business   Rapidly  deploy  &  iterate   DevOps   Driving  change  
  8. 8. ©  2014,  Trend  Micro  Inc.   Security  needs  to  keep  pace   Our  Challenge  
  9. 9. ©  2014,  Trend  Micro  Inc.   You   FaciliPes   Physical  Security   Physical  Infrastructure   Network  Infrastructure   VirtualisaPon  Infrastructure       OperaPng  System   ApplicaPon   Account  Management   The  tradiPonal  responsibility  model  
  10. 10. ©  2014,  Trend  Micro  Inc.   AWS   FaciliPes   Physical  Security   Physical  Infrastructure   Network  Infrastructure   VirtualisacPon  Infrastructure   You   OperaPng  System   ApplicaPon   Account  Management   Security  Groups   Network  ConfiguraPon   Shared  Responsibility  model  
  11. 11. ©  2014,  Trend  Micro  Inc.   Applied  at  the  boundary   Operator   TradiPonal  Security  
  12. 12. ©  2014,  Trend  Micro  Inc.   Applied  to  each  instance   Cloud  defences   VPC   VPC   VPC  
  13. 13. ©  2014,  Trend  Micro  Inc.   Management  Deployment   New  challenges  
  14. 14. ©  2014,  Trend  Micro  Inc.   Leverage  exisPng  distribuPon  channels   Addressing  the  challenges  -­‐  deployment  
  15. 15. ©  2014,  Trend  Micro  Inc.   Recommended  choices   AWS  OpsWorks   Chef   Puppet   Salt   Deployment  channels  
  16. 16. ©  2014,  Trend  Micro  Inc.   Centralise  control  management   Addressing  the  challenges  -­‐  management  
  17. 17. ©  2014,  Trend  Micro  Inc.   In  acPon   Our  challenge  
  18. 18. ©  2014,  Trend  Micro  Inc.   On  the  clock   Our  challenge  
  19. 19. ©  2014,  Trend  Micro  Inc.   PreparaPon   IdenPficaPon   Containment   EradicaPon   Recovery   Lessons  Learned   SANS  incident  response  process  
  20. 20. ©  2014,  Trend  Micro  Inc.   Server   Analyse   Verify   Adjust   Replacement  Defend   TradiPonal  process  
  21. 21. ©  2014,  Trend  Micro  Inc.   Instance   Analyse   Verify   Adjust   Defend  Replacement   Cloud  process  
  22. 22. ©  2014,  Trend  Micro  Inc.   Need  to  automate   isolaPon   Cloud  process  –  automaPon  requirements   Instance   Analyse   Verify   Adjust   Defend  Replacement  
  23. 23. ©  2014,  Trend  Micro  Inc.   Instance   Replacement   1.  Monitor  the     log  stream   API   2.  Call  the  AWS  API  to    isolate  the  instance   Cloud  process  -­‐  soluPon  
  24. 24. ©  2014,  Trend  Micro  Inc.   In  acPon   Our  Challenge  
  25. 25. ©  2014,  Trend  Micro  Inc.   Cloud  process   Instance   Analyse   Verify   Adjust   Defend  Replacement  
  26. 26. ©  2014,  Trend  Micro  Inc.   Piggyback  on  provisioning   Central  management   AutomaPon   Keys  to  success  
  27. 27. Thank  you.  Learn  more  at  hAp://www.trendmicro.com/aws  

×