SlideShare a Scribd company logo
1 of 27
Download to read offline
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
McAfee Skyhigh: Elevating Your
AWS Security Posture
Srini Gurrapu
Chief Cloud Evangelist
McAfee-Skyhigh
S E C 3 0 7 - S
Carrie Laskowski
AVP Security
US Bank
Securing Workloads in Amazon Web Services (AWS):
A cloud native security architecture
Srini Gurrapu
Chief Cloud Evangelist
McAfee-Skyhigh
Carrie Laskowski
AVP Security
US Bank
4
Agenda
• State of Public Cloud Overview
• Security Challenges
• Cloud Native Security Considerations
• McAfee Overview
• Summary and recommendations
5
IT Cloud Disruption in Context: Infrastructure Security -> Information Security
Internet CloudMainframe
On-Premises On-Premises On-Premises
Partner/BYODCorporate
PCTerminal
Mainframe
PC
6
Sanctioned
Public Cloud
Customer Drivers for Cloud Adoption
Enterprise data center/private
cloud
Devices
IaaS/PaaS
Shadow
Personal productivity
Business agility
Business Transformation
Network
Cloud Data Usage Bypasses Existing
Network Security Controls1
7
IaaS Fastest Growing Segment of Cloud
Source: Gartner Forecasts Worldwide Public Cloud Revenue press release April 12, 2018
IaaS 35.9% CAGR
SaaS 22.2% CAGR
8
Question 1: US Bank Current Public Cloud Strategy
1
Moving
everything to
Public Cloud
2
Hybrid
Environment
(x% - AWS,
y% - Hybrid,
z% - Private)
3
Private only;
just testing out
public cloud
environments
9
US Bank’s 3-Year Cloud Strategy
US Bank can reduce operating expense and cash outlay and enable growth by adopting and
implementing an enterprise Cloud and DevOps solution with integrated information security.
2016 Onwards2017 2018
We will be embarking on a Cloud and DevOps transformation over the next severalyears
Cloud 1.0
Foundational Release
Establishing enterprise, self-service cloud
services on a pay-per-usebasis with enhanced
application stability and security
Cloud 2.0
Operational efficiency
Increasing operational efficiency through public
cloud and DevOpscapabilities,reducing
application downtime and increasing developer
productivity
Cloud 3.0
Continuous Development
Refining hybrid cloud capabilities to enable a
cloud-optimizedapplication portfolio,
leveraging microservicesand CI/CD
capabilities
10
Question 2: Driving Public Cloud Security Requirements [US Bank]
1
Cloud
Architect
2
CASB /
Data Protection
teams
3
DC
Infrastructure
teams
4
Other
11
Data Classification & Accountability
Client & End-Point Protection
Identity & Access Management
Application Level Controls
Network Control
Host Infrastructure
Physical Security
SaaSPaaSIaaS
Question 3: Do we understand the Shared Responsibility Model?
Service Provider Responsibility
Customer Responsibility
Customer’s responsibility
in securing workloads in the Cloud
is much greater than securing
SaaS applications.
“Through 2020, 99% of
cloud security failures will be
the customer’s fault”
Garnter Magic Quadrant for CASB - 2017
Securing Workloads in Cloud Environments
14
Provision
AvailabilityZone 1
AvailabilityZone 2
AvailabilityZone 3
InterConnect
RDS
Elasticache
ELB
Platform ServicesCompute
IaaS Cloud Native Security Considerations
Github
Commit
Jenkins
Build &
Verify
Push
Trigger
Pull
Deploy
Users
DevOps CloudFormation
Build
How to I protect my compute
infrastructure from malware
How to protect against
vulnerabilities in code
How to I ensure security groups aren’t
too permissive
How to I ensure that my
devops user is not
compromised
How do I ensure
complianceof stored
data
How do I ensure that my
data stores are not open to
the world
How I protect against threats that
move laterally in my VPC
How to protect the custom
application
How do I ensure complianceof data
stored on localhost
15
Security considerations requires a holistic approach
Micro-segmentation
 Cisco
 VMWare
 Illumio
Cloud Security Mgmt
 Evident.io/ Palo Alto
 Dome9/Checkpoint
 Redlock.io/Palo Alto
Cloud Provider
 AWS Security Hub
Vulnerability Mgmt
 Tenable
 Qualys
Container Security
 Twistlock
 Acquasec
 Stackrox
Server Protection
 Symantec
 Trend Micro
 Crowdstrike
16
IaaS Security Layers Simplified
Infrastructure
1
Detect and correct security
misconfigurations
2
Detect and secure
Workloads and Containers
Workloads and Containers
3 Protect the data in the apps
Apps
IaaS
AWS Cloud
17
IaaS—Securing Infrastructure and Apps
Infrastructure
1
Detect and correct security
misconfigurations
2
Detect and Secure
Workloads and Containers
Workloads and Containers
3 Protect the data in the apps
Apps
IaaS
AWS Cloud
18
Securing Infrastructure and Apps: Use Cases
2. Managing Rogue IaaS Accounts
Discover shadow IT usage and reclaim control of risky IaaS usage.
1. Security Configuration Monitoring of IaaS Resources
Identify IaaS resources with security settings that are non-compliant to CIS Level 1, 2 policies.
3. Visibility of Confidential Data
Gain visibility of regulated/high-value data stored in Amazon S3 Buckets
4. Advanced Threat Protection
Detect compromised accounts, insider/privileged user threats, malware.
5. Activity Monitoring and Forensics
Capture and categorize an audit trail of activity for forensic investigations.
19
IaaS—Securing Infrastructure and Apps
Infrastructure
1
Detect and correct security
misconfigurations
2
Detect and Secure
Workloads and Containers
Workloads and Containers
3 Protect the data in the Apps
Apps
IaaS
AWS Cloud
20
Securing Workloads and Containers —Use cases
2. Visualize Your entire IT environment on-prem to cloud
Gain visibility into North-South and East-West threat movement.
1. Discover Workloads, Containers … All Computing Resources … Instantly
Quickly discover, assess and remediate threats.
3. Protect IT from Device-to-Cloud with Comprehensive Security Solutions
Strong defense against advanced attacks.
4. Simplify Deployment, and Management Across Hybrid Infrastructures
Centralized, automated policy management of public, private and hybrid environments
21
IaaS Security: Solution Stack (McAfee coverage)
MVISION
EDR
VPCFlow
Skyhigh
EUBA/IAM
Skyhigh
Vulnerability
SIA
Visibility& SecGroup
Skyhigh
Visibility& ConfigDrift
Skyhigh
Encryption
CSP
CustomApp
Skyhigh
DLP
Skyhigh
McAfee Platform
Compute
Interconnect
Platform Services
Analytics/ML Drift & Vulnerability Data Protection
App Whitelisting
ENS
NW Firewall
NSP
IAM
SIA
AV/Malware
ENS
HostIPS
ENS
DAC
ENS
WorkloadProtectionSegmentation
McAfee Mvision Cloud/Skyhigh Overview
23
Mvision Cloud (formerly Skyhigh Networks):
Cloud Security Foundation
Founded in 2012
backed by:
Skyhigh granted 14th
seminal
CASB Patent
Only CASB to be named
“Leader” in all 3 major
analyst reports
Acquisition
announced
Custom
Apps
Expansion to IaaS
API control: Sanctioned Apps
Shadow
IT
The CASB Market is Born
Expand IaaS
CASB Connect
24
600+ Customers Including 30% of the Fortune 100
25
Skyhigh is the Only CASB Triple Crown Winner
McAfee, the McAfee logo and [insert <other relevant McAfee Names>] are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the U.S. and/or other countries.
Other names and brands may be claimed as the property of others.
Copyright © 2017 McAfee, LLC.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.

More Related Content

What's hot

FireWall
FireWallFireWall
FireWallrubal_9
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
00 Hardware Of Personal Computer V1 1
00 Hardware Of Personal Computer V1 100 Hardware Of Personal Computer V1 1
00 Hardware Of Personal Computer V1 1Rajan Das
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 
ARM: Trusted Zone on Android
ARM: Trusted Zone on AndroidARM: Trusted Zone on Android
ARM: Trusted Zone on AndroidKan-Han (John) Lu
 
PARALLELISM IN MULTICORE PROCESSORS
PARALLELISM  IN MULTICORE PROCESSORSPARALLELISM  IN MULTICORE PROCESSORS
PARALLELISM IN MULTICORE PROCESSORSAmirthavalli Senthil
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)sankcomp
 
File system.
File system.File system.
File system.elyza12
 
Update and document operational procedures
Update and document operational proceduresUpdate and document operational procedures
Update and document operational proceduresGera Paulos
 
Plants vs zombies presentacion
Plants vs zombies presentacion Plants vs zombies presentacion
Plants vs zombies presentacion Jhoony Gonzalez
 
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Selvaraj Seerangan
 

What's hot (20)

FireWall
FireWallFireWall
FireWall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Remoting and serialization
Remoting and serializationRemoting and serialization
Remoting and serialization
 
00 Hardware Of Personal Computer V1 1
00 Hardware Of Personal Computer V1 100 Hardware Of Personal Computer V1 1
00 Hardware Of Personal Computer V1 1
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
ARM: Trusted Zone on Android
ARM: Trusted Zone on AndroidARM: Trusted Zone on Android
ARM: Trusted Zone on Android
 
PARALLELISM IN MULTICORE PROCESSORS
PARALLELISM  IN MULTICORE PROCESSORSPARALLELISM  IN MULTICORE PROCESSORS
PARALLELISM IN MULTICORE PROCESSORS
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
 
File system.
File system.File system.
File system.
 
Installing Ubuntu
Installing UbuntuInstalling Ubuntu
Installing Ubuntu
 
Boot process: BIOS vs UEFI
Boot process: BIOS vs UEFIBoot process: BIOS vs UEFI
Boot process: BIOS vs UEFI
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Update and document operational procedures
Update and document operational proceduresUpdate and document operational procedures
Update and document operational procedures
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
 
Plants vs zombies presentacion
Plants vs zombies presentacion Plants vs zombies presentacion
Plants vs zombies presentacion
 
Samba server
Samba serverSamba server
Samba server
 
HDD Partition
HDD PartitionHDD Partition
HDD Partition
 
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
 

Similar to McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Invent 2018

Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Amazon Web Services
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAmazon Web Services
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simpleSameer Paradia
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Cynthia Hsieh
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero Amazon Web Services
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...Amazon Web Services
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecurityAmazon Web Services
 
Unified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud InfrastructureUnified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud InfrastructureMarketingArrowECS_CZ
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud ApplicationsIBM Security
 
Cloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfCloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfInfosec Train
 
Cloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfCloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfinfosec train
 
The 3 Recommendations for Cloud Security
The 3 Recommendations for Cloud SecurityThe 3 Recommendations for Cloud Security
The 3 Recommendations for Cloud SecurityVAST
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
mcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdfmcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdfAndreBolo1
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Amazon Web Services
 

Similar to McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Invent 2018 (20)

Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
 
Unified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud InfrastructureUnified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud Infrastructure
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 
Cloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfCloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdf
 
Cloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfCloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdf
 
The 3 Recommendations for Cloud Security
The 3 Recommendations for Cloud SecurityThe 3 Recommendations for Cloud Security
The 3 Recommendations for Cloud Security
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
mcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdfmcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdf
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Invent 2018

  • 1.
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. McAfee Skyhigh: Elevating Your AWS Security Posture Srini Gurrapu Chief Cloud Evangelist McAfee-Skyhigh S E C 3 0 7 - S Carrie Laskowski AVP Security US Bank
  • 3. Securing Workloads in Amazon Web Services (AWS): A cloud native security architecture Srini Gurrapu Chief Cloud Evangelist McAfee-Skyhigh Carrie Laskowski AVP Security US Bank
  • 4. 4 Agenda • State of Public Cloud Overview • Security Challenges • Cloud Native Security Considerations • McAfee Overview • Summary and recommendations
  • 5. 5 IT Cloud Disruption in Context: Infrastructure Security -> Information Security Internet CloudMainframe On-Premises On-Premises On-Premises Partner/BYODCorporate PCTerminal Mainframe PC
  • 6. 6 Sanctioned Public Cloud Customer Drivers for Cloud Adoption Enterprise data center/private cloud Devices IaaS/PaaS Shadow Personal productivity Business agility Business Transformation Network Cloud Data Usage Bypasses Existing Network Security Controls1
  • 7. 7 IaaS Fastest Growing Segment of Cloud Source: Gartner Forecasts Worldwide Public Cloud Revenue press release April 12, 2018 IaaS 35.9% CAGR SaaS 22.2% CAGR
  • 8. 8 Question 1: US Bank Current Public Cloud Strategy 1 Moving everything to Public Cloud 2 Hybrid Environment (x% - AWS, y% - Hybrid, z% - Private) 3 Private only; just testing out public cloud environments
  • 9. 9 US Bank’s 3-Year Cloud Strategy US Bank can reduce operating expense and cash outlay and enable growth by adopting and implementing an enterprise Cloud and DevOps solution with integrated information security. 2016 Onwards2017 2018 We will be embarking on a Cloud and DevOps transformation over the next severalyears Cloud 1.0 Foundational Release Establishing enterprise, self-service cloud services on a pay-per-usebasis with enhanced application stability and security Cloud 2.0 Operational efficiency Increasing operational efficiency through public cloud and DevOpscapabilities,reducing application downtime and increasing developer productivity Cloud 3.0 Continuous Development Refining hybrid cloud capabilities to enable a cloud-optimizedapplication portfolio, leveraging microservicesand CI/CD capabilities
  • 10. 10 Question 2: Driving Public Cloud Security Requirements [US Bank] 1 Cloud Architect 2 CASB / Data Protection teams 3 DC Infrastructure teams 4 Other
  • 11. 11 Data Classification & Accountability Client & End-Point Protection Identity & Access Management Application Level Controls Network Control Host Infrastructure Physical Security SaaSPaaSIaaS Question 3: Do we understand the Shared Responsibility Model? Service Provider Responsibility Customer Responsibility Customer’s responsibility in securing workloads in the Cloud is much greater than securing SaaS applications.
  • 12. “Through 2020, 99% of cloud security failures will be the customer’s fault” Garnter Magic Quadrant for CASB - 2017
  • 13. Securing Workloads in Cloud Environments
  • 14. 14 Provision AvailabilityZone 1 AvailabilityZone 2 AvailabilityZone 3 InterConnect RDS Elasticache ELB Platform ServicesCompute IaaS Cloud Native Security Considerations Github Commit Jenkins Build & Verify Push Trigger Pull Deploy Users DevOps CloudFormation Build How to I protect my compute infrastructure from malware How to protect against vulnerabilities in code How to I ensure security groups aren’t too permissive How to I ensure that my devops user is not compromised How do I ensure complianceof stored data How do I ensure that my data stores are not open to the world How I protect against threats that move laterally in my VPC How to protect the custom application How do I ensure complianceof data stored on localhost
  • 15. 15 Security considerations requires a holistic approach Micro-segmentation  Cisco  VMWare  Illumio Cloud Security Mgmt  Evident.io/ Palo Alto  Dome9/Checkpoint  Redlock.io/Palo Alto Cloud Provider  AWS Security Hub Vulnerability Mgmt  Tenable  Qualys Container Security  Twistlock  Acquasec  Stackrox Server Protection  Symantec  Trend Micro  Crowdstrike
  • 16. 16 IaaS Security Layers Simplified Infrastructure 1 Detect and correct security misconfigurations 2 Detect and secure Workloads and Containers Workloads and Containers 3 Protect the data in the apps Apps IaaS AWS Cloud
  • 17. 17 IaaS—Securing Infrastructure and Apps Infrastructure 1 Detect and correct security misconfigurations 2 Detect and Secure Workloads and Containers Workloads and Containers 3 Protect the data in the apps Apps IaaS AWS Cloud
  • 18. 18 Securing Infrastructure and Apps: Use Cases 2. Managing Rogue IaaS Accounts Discover shadow IT usage and reclaim control of risky IaaS usage. 1. Security Configuration Monitoring of IaaS Resources Identify IaaS resources with security settings that are non-compliant to CIS Level 1, 2 policies. 3. Visibility of Confidential Data Gain visibility of regulated/high-value data stored in Amazon S3 Buckets 4. Advanced Threat Protection Detect compromised accounts, insider/privileged user threats, malware. 5. Activity Monitoring and Forensics Capture and categorize an audit trail of activity for forensic investigations.
  • 19. 19 IaaS—Securing Infrastructure and Apps Infrastructure 1 Detect and correct security misconfigurations 2 Detect and Secure Workloads and Containers Workloads and Containers 3 Protect the data in the Apps Apps IaaS AWS Cloud
  • 20. 20 Securing Workloads and Containers —Use cases 2. Visualize Your entire IT environment on-prem to cloud Gain visibility into North-South and East-West threat movement. 1. Discover Workloads, Containers … All Computing Resources … Instantly Quickly discover, assess and remediate threats. 3. Protect IT from Device-to-Cloud with Comprehensive Security Solutions Strong defense against advanced attacks. 4. Simplify Deployment, and Management Across Hybrid Infrastructures Centralized, automated policy management of public, private and hybrid environments
  • 21. 21 IaaS Security: Solution Stack (McAfee coverage) MVISION EDR VPCFlow Skyhigh EUBA/IAM Skyhigh Vulnerability SIA Visibility& SecGroup Skyhigh Visibility& ConfigDrift Skyhigh Encryption CSP CustomApp Skyhigh DLP Skyhigh McAfee Platform Compute Interconnect Platform Services Analytics/ML Drift & Vulnerability Data Protection App Whitelisting ENS NW Firewall NSP IAM SIA AV/Malware ENS HostIPS ENS DAC ENS WorkloadProtectionSegmentation
  • 23. 23 Mvision Cloud (formerly Skyhigh Networks): Cloud Security Foundation Founded in 2012 backed by: Skyhigh granted 14th seminal CASB Patent Only CASB to be named “Leader” in all 3 major analyst reports Acquisition announced Custom Apps Expansion to IaaS API control: Sanctioned Apps Shadow IT The CASB Market is Born Expand IaaS CASB Connect
  • 24. 24 600+ Customers Including 30% of the Fortune 100
  • 25. 25 Skyhigh is the Only CASB Triple Crown Winner
  • 26. McAfee, the McAfee logo and [insert <other relevant McAfee Names>] are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others. Copyright © 2017 McAfee, LLC.
  • 27. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.