Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Security Implications of the Cloud - CSS Dallas Azure

395 views

Published on

Security Implications of the Cloud - CSS Dallas Azure

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Security Implications of the Cloud - CSS Dallas Azure

  1. 1. Thank you.
  2. 2. SECURITY IMPLICATIONS OF THE CLOUD. Sean Rohde Director of Sales, Alert Logic
  3. 3. AGENDA
  4. 4. 5 47 74 89 184 289 277 222 207 571 Denial of Service Crimeware Physical Theft / Loss Payment Card Skimmers Everything Else Cyber-espionage Privilege Misuse Miscellaneous Errors POS Intrusions Web App Attacks Security risk is shifting to unprotected web applications Web app attacks are now the #1 source of data breaches But less than 5% of data center security budgets are spent on app security Source: Verizon DBIR 2017 n= 1,935 UP 300% SINCE 2014 $23 to $1 Percentage of Breaches 10% 20% 30% Source: Gartner Web App Attacks
  5. 5. Vulnerabilities + Change + Shortage Complexity of defending web applications and workloads Risks are moving up the stack 1. Wide range of attacks at every layer of the stack 2. Rapidly changing codebase can introduces unknown vulnerabilities 3. Long tail of exposures inherited from 3rd party development tools 4. Extreme shortage of cloud and application security expertise Web App Attacks OWASP Top 10 Platform / Library Attacks System / Network Attacks Perimeter & end-point security tools fail to protect cloud attack surface Web Apps Server-side Apps App Frameworks Dev Platforms Server OS Hypervisor Databases Networking Cloud Management
  6. 6. Tame the Beast Industry Challenge: The Good, the Bad and the Ugly Known Good Known Bad Suspicious Allow Identify | Tune | Permit Block Drop | Reconfigure Application Stack Web Apps Server-side Apps App Frameworks Dev Platforms Databases Server OS Hypervisor Hardware Classification Action HUMAN EXPERT REQUIRED
  7. 7. CASE ILLUSTRATION
  8. 8. Customer X – Data Exfiltration Company Profile Retail – Ecommerce $250M Annual Revenue 1500+ Employees 4 Primary Offices (NA) 200 Retail Locations IT Dedicated Headcount – 14 Security Dedicated Headcount – 2 Hybrid Data Center (AWS & CoLo)
  9. 9. Customer X – Data Exfiltration Attack Progression Stalked company on LinkedIn and Google Gained entry through PHP (KNOWN) flaws Replaced PHP login to capture credentials Leveraged credentials to access critical system Stole Financial, Design data & Roadmap Undetected for 4 months – FBI Notification Cost of Breech - $1.8M Company Profile Retail – Ecommerce $250M Annual Revenue 1500+ Employees 4 Primary Offices (NA) 200 Retail Locations IT Dedicated Headcount – 14 Security Dedicated Headcount – 2 Hybrid Data Center (AWS & CoLo)
  10. 10. AGENDA
  11. 11. Thank you. #CSS2017
  12. 12. Thank You.

×