Advertisement
Advertisement

More Related Content

Advertisement

More from Resolver Inc.(20)

Advertisement

Information Security Best Practices: Keeping Your Company's Data Safe

  1. Information Security Best Practices: Keeping Your Company’s Data Safe
  2. Hello! I am James Patterson COO & CISO, Resolver james@resolver.com Your Photo Here!
  3. Information Security Confidentiality Integrity Availability
  4. Principle Least Privilege • Every module (process, user, program, environment) must be able to only access the information and resources that are necessary for its legitimate purpose • Start from nothing, only add what is needed
  5. Defense in Depth Use of all available security mechanisms in the different aspects of the application deployment infrastructure to minimise potential attack vectors by creating multiple layers of protection in case one mechanism fails.
  6. Layer Cake • BCP & DR • Monitoring • Procedures • Automation • Policies • Penetration Testing • Third Party Validation • Corporate Environment • People • Technical Controls • Network • OS • Application • Data Storage and Access • Physical Security
  7. Corporate Environment • Security Culture • Tone at the Top • Trusted Guardian of Your Data • Transparency • Risk Assessment • Documentation • Investment
  8. People Security Roles Job Descriptions Hiring Decisions (background checks) Onboarding/ Offboarding (least privilege) Ongoing security training
  9. Security Architecture Principles ▪ Segmented Environments ▪ Server Isolation ▪ Least Privilege ▪ Private Network for Server Management ▪ Minimal public surface area ▪ AWS Managed Services Wherever Possible ▪ MFA and Credential Complexity
  10. Technical Controls - Network ▪ ALB (Application Load Balancer) or Nginx secure reverse proxy ▪ CloudFront for Content Distribution, DDOS attacks ▪ AWS Shield (WAF) ▪ EC2 Security Groups (AWS Firewall) ▪ IAM Users and Roles ▪ Transport Encryption ▪ Private Management Subnet through MFA Enabled VPN
  11. Technical Controls - Operating System ▪ Server Hardening ▪ Anti-virus ▪ Anti-malware ▪ Intrusion detection systems – AlienVault and AWS GuardDuty ▪ Monthly Patch Management ▪ Critical patches analyzed for applicability within 48 hours
  12. Technical Controls - Application ▪ Security by Design ▪ Access and Authorization checked at every level ▪ Resolver Application Level Authentication control ▪ Resolver as identity provider ▪ Single Sign On ▪ Role and Data Based Authorization Control
  13. Encryption at Rest Data Segregation Access Review High Availability and Durability Access Controls • Least privilege • Encrypted credentials Data Storage and Access
  14. Physical Security - AWS ▪ Site selection ▪ AWS employee access only ▪ Access logs ▪ Access review ▪ CCTV and MFA access
  15. • AWS Regions and Availability Zones • Regular Backups with Validation • Monthly Testing • Auto Scale and Self Healing Business Continuity Planning & Disaster Recovery
  16. Monitoring ▪ AWS Cloud Watch – Log Aggregation preservation ▪ Cloud Trail – AWS Account Config Changes ▪ Application Audit Trail ▪ Alien Vault – SIEM, HIDS ▪ Site 24x7 – External availability ▪ Pager Duty – Notification ▪ Nessus – Vulnerability Scanning ▪ Guard Duty – Machine Learning SIEM
  17. Standard Operating Procedures ▪ Disaster Recovery ▪ Change Management ▪ Incident Management ▪ Monthly Maintenance ▪ Vulnerability Management ▪ Other SOPs ▪ Common operations (onboard & offboard customers)
  18. ▪ Faster ▪ Removes human error ▪ Scripting for common tasks ▪ New customer ▪ Resolver Core environment deploy ▪ Cattle, not pets ▪ Replace servers with secure versions ▪ No need to remote into containers Automation
  19. Policies ▪ InfoSec Policy ▪ Change Control ▪ Hiring Process ▪ Termination Process ▪ Security Assessment Process ▪ Incident Management Policy ▪ Security Awareness Training Policy ▪ Server Capacity Policy ▪ Server Hardening Policy ▪ Data Classification ▪ Password Policy ▪ Cryptography Policy ▪ Patch Management Policy ▪ Remote Access Policy
  20. Penetration Testing ▪ Annual ▪ Third Party ▪ Black box, authenticated, comprehensive ▪ OWASP ▪ Top 10 ▪ Application Security Verification Standard ▪ Data segregation ▪ Application logic
  21. Third Party Validation
  22. Thanks! Any questions? james@resolver.com
Advertisement