SlideShare a Scribd company logo
1 of 46
Ben Johnson | Co-Founder & CTO
OWASP OC 2018-03-22
SEEING THROUGH THE FOG
@chicagoben | @obsidiansec
Background Check // Ben Johnson
Co-Founder and CTO, Obsidian
Co-Founder and Former CTO, Carbon Black
Former CNO/Cyber // NSA, CIA, DoD
@chicagoben | @obsidiansec
Today’s Goal?
TO SPARK CONTEMPLATION
(and give you something to remember!)
@chicagoben | @obsidiansec
Transformation
@chicagoben | @obsidiansec
Digital Transformation
@chicagoben | @obsidiansec
Race to the Cloud!
Lots of benefits of cloud adoption … we aren’t really here for that.
@chicagoben | @obsidiansec
Observation
@chicagoben | @obsidiansec
IT and the Cloud
“IT is the broad subject concerned with all aspects
of managing and processing information,
especially within a large organization or company.”
Cloud computing is an information technology (IT) paradigm that
enables ubiquitous access to shared pools of
configurable system resources and higher-level services that can
be rapidly provisioned with minimal management effort, often over
the Internet. Cloud computing relies on sharing of resources to
achieve coherence and economies of scale, similar to a public utility.
IT
Cloud
@chicagoben | @obsidiansec
IT and the Cloud (Reality)
“Let’s stop managing hardware and a lot of the software”
“Let’s scale up and down as necessary”
“Let’s get access to cool new technologies more quickly”
“Uptime is [mostly] someone else’s problem”
@chicagoben | @obsidiansec
Information Security and the Cloud
“Information security, sometimes shortened to InfoSec, is the practice
of preventing unauthorized access, use, disclosure, disruption,
modification, inspection, recording or destruction of information. ”
Cloud computing is an information technology (IT) paradigm that
enables ubiquitous access to shared pools of
configurable system resources and higher-level services that can
be rapidly provisioned with minimal management effort, often over
the Internet. Cloud computing relies on sharing of resources to
achieve coherence and economies of scale, similar to a public utility.
InfoSec
Cloud
@chicagoben | @obsidiansec
Information Security and the Cloud (Reality)
“IT is going from 0 to 100 in the cloud and leaving security in the dust”
- Fmr. CISO, Lending Club
“We’re blind to all these new SaaS accounts”
- Director, Cyber Intelligence, Top Athletics Brand
“We don’t know what users are doing on our AWS/Azure accounts”
- Too Many Organizations
“Hackers don’t break in, they login.”
- CISO, Cisco
@chicagoben | @obsidiansec
Modern Times are Leaky
Booz Allen
OneLogin
The RNC
Verizon
Accenture
Dow Jones
Viacom
Deloitte
Sweden
California
@chicagoben | @obsidiansec
Recent Headlines
@chicagoben | @obsidiansec
Data Breaches
@chicagoben | @obsidiansec
Data Breaches: Not Just IaaS
As of now, Deloitte cannot be "100% sure what was taken" by the hackers
https://www.ciodive.com/news/deloitte-hack-email-migration-microsoft-office-365/506946/
@chicagoben | @obsidiansec
Breach Fatigue Anyone?
Anyone getting CLOUD breach fatigue?
If not you, do you think others are?
@chicagoben | @obsidiansec
Causation
@chicagoben | @obsidiansec
Confusion Over Responsibility
@chicagoben | @obsidiansec
Providers Have Challenges
Goals are Misaligned
Focus is on availability of variety of services with a minimum layer of security built-in
Failure Can Be Easy
A simple click can share huge amounts of data publicly (e.g. S3)
Monitoring is Extra Work
Logging & monitoring often have to be enabled separately
Mo’ People, Mo’ Complexity
Identities and policies are often complex to manage (maybe an understatement?)
Sweet Spot is Elusive
Policy and control options either feel too flexible or too rigid
@chicagoben | @obsidiansec
Customers Have Challenges
Lack of Understanding
The notion of shared responsibility and the differences in built-in security are often foreign.
Taking the Plunge
Departments race to the cloud, leaving security scrambling. (Is security slowing down adoption?)
Bending the Rules
Unsanctioned cloud use or lack of reporting to security what is in use.
New Environment, Same Security Team
Surface area is expanding, changing, and dynamic, yet security team isn’t as agile.
“Operators think that once it’s in the cloud it’s no longer their responsibility”
- Fmr. CIO of the Air Force
@chicagoben | @obsidiansec
Current Trends Making Things Harder
@chicagoben | @obsidiansec
IT and Security Disconnect
IT Security
Authentication
Authorization
Activity
Enablement Threat Management
DISCONNECTED
Provisioning Anomaly Detection
@chicagoben | @obsidiansec
Obligation
@chicagoben | @obsidiansec
Cloud Security: “Of” Versus “In”
Cloud Service Provider:
responsible for security OF the cloud
Customer:
responsible for security IN the cloud
@chicagoben | @obsidiansec
AWS Responsibilities?
@chicagoben | @obsidiansec
AZURE Responsibilities?
@chicagoben | @obsidiansec
SaaS: “Of” Versus “In”
The SaaS Provider handles all aspects except
for identity and access management, client
devices controls, and data accountability.
The Customer, therefore, must understand
users, devices & data related to that service.
@chicagoben | @obsidiansec
Office 365?
Microsoft handles the underlying infrastructure,
including patching and updating, and handles
accessibility of the service.
You are responsible for what is emailed, who
accesses the email, and how they access the
email.
@chicagoben | @obsidiansec
AZURE Responsibilities?Hackers want this!
@chicagoben | @obsidiansec
AWS Responsibilities?
Hackers want this!
@chicagoben | @obsidiansec
Amelioration
@chicagoben | @obsidiansec
OWASP TOP 10?
@chicagoben | @obsidiansec
Awareness, Auditing, Adaptation, Automation
@chicagoben | @obsidiansec
Awareness
๏Where are you using the cloud?
๏What “clouds” are you using?
๏Why are you using the cloud?
๏How are you using the cloud?
๏Who’s responsible for what’s in the cloud?
@chicagoben | @obsidiansec
Auditing
๏Understand current state (IT)…assets, users, devices.
๏Understand current state (Security).
๏Understand initiatives that involve cloud.
๏Understand security capabilities related to cloud.
@chicagoben | @obsidiansec
Adaptation
๏Put policies and checks in place for new deployments
๏Update security scans and tests to account for cloud
๏Enable tracking of all changes from current state
๏Have a process for monitoring all new accounts, assets, etc.
@chicagoben | @obsidiansec
Automation
๏Change your processes to reduce risk!
๏Security audits should be automated.
๏Cloud Providers have APIs – write code or use integrations to
automate the collection of data, the taking of actions, the verification
of changes.
๏Avoid manual activities.
@chicagoben | @obsidiansec
Hygiene
@chicagoben | @obsidiansec
Triple-A!
Authentication AccountingAuthorization
Industry focus Neglected Forgotten
@chicagoben | @obsidiansec
IT and Security: Hand-in-Hand
๏Change your processes to reduce risk!
๏Security audits should be automated.
๏Cloud Providers have APIs – write code or use
integrations to automate the collection of data,
the taking of actions, the verification of changes.
๏Avoid manual activities.
๏Where are you using the cloud?
๏What “clouds” are you using?
๏Why are you using the cloud?
๏How are you using the cloud?
๏Who’s responsible for what’s in the cloud?
๏Understand current state (IT)…assets, users, devices.
๏Understand current state (Security).
๏Understand initiatives that involve cloud.
๏Understand security capabilities related to cloud.
๏Put policies and checks in place for new deployments
๏Update security scans and tests to account for cloud
๏Enable tracking of all changes from current state
๏Have a process for monitoring all new accounts, assets,
etc.
@chicagoben | @obsidiansec
IT and Security: Hand-in-Hand
Automate Change to Reduce Error and Risk
Understanding Surface Area
Understand Details and Processes
Update processes and policies
@chicagoben | @obsidiansec
Journey vs. Outcomes
Security teams often focus where they
have the most autonomy; they get
comfortable in this never-ending journey
vs. driving toward new destinations.
@chicagoben | @obsidiansec
Engineering vs. Analysis
@chicagoben | @obsidiansec
Take-Aways
Understand where, how, and why you are using cloud.
Understand who is responsible.
Providers need to do more.
They could reduce users shooting themselves in the foot, improve default security levels, and
better show surface area.
(Please encourage them to do more!)
The rest is on you:
(Awareness, Auditing, Adaptation, Automation)!
Oh, yeah, Triple-A:
(Authentication, Authorization, Accounting)!
(and don’t forget hygiene.)
@chicagoben | @obsidiansec
Cloud: Massive Opportunity for Unifying IT & Security
IT Security
Enablement Enablement
Provides Appropriate Tech Provides Appropriate Risk
CONNECTED?
Ben Johnson, CTO
ben@obsidiansecurity.com
@chicagoben | @obsidiansec
THANK YOU!

More Related Content

What's hot

CAMP IT Slides - Skytap - Brian White
CAMP IT Slides - Skytap - Brian White CAMP IT Slides - Skytap - Brian White
CAMP IT Slides - Skytap - Brian White Skytap Cloud
 
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming AnalyticsR, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming AnalyticsKai Wähner
 
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...Amazon Web Services
 
Big Data beyond Apache Hadoop - How to integrate ALL your Data
Big Data beyond Apache Hadoop - How to integrate ALL your DataBig Data beyond Apache Hadoop - How to integrate ALL your Data
Big Data beyond Apache Hadoop - How to integrate ALL your DataKai Wähner
 
How to plan your Modern Workplace Project - SPS Denver October 2018
How to plan your Modern Workplace Project - SPS Denver October 2018How to plan your Modern Workplace Project - SPS Denver October 2018
How to plan your Modern Workplace Project - SPS Denver October 2018Ammar Hasayen
 
"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013
"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013
"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013Kai Wähner
 
Not actually a DevOps Talk
Not actually a DevOps TalkNot actually a DevOps Talk
Not actually a DevOps TalkVMware Tanzu
 
Scenarios for building Hybrid Cloud
Scenarios for building Hybrid CloudScenarios for building Hybrid Cloud
Scenarios for building Hybrid CloudPracheta Budhwar
 
Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA Kai Wähner
 
Analytics in the Cloud: Getting The Most Out Of Analytics Deployments
Analytics in the Cloud: Getting The Most Out Of Analytics DeploymentsAnalytics in the Cloud: Getting The Most Out Of Analytics Deployments
Analytics in the Cloud: Getting The Most Out Of Analytics DeploymentsVMware Tanzu
 
Webinar: Hybrid Cloud Integration - Why It's Different and Why It Matters
Webinar: Hybrid Cloud Integration - Why It's Different and Why It MattersWebinar: Hybrid Cloud Integration - Why It's Different and Why It Matters
Webinar: Hybrid Cloud Integration - Why It's Different and Why It MattersSnapLogic
 
Azure Cloud Security
Azure Cloud SecurityAzure Cloud Security
Azure Cloud SecurityAmmar Hasayen
 
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...Kai Wähner
 
How a social intranet can be used to drive employee engagement and usage of I...
How a social intranet can be used to drive employee engagement and usage of I...How a social intranet can be used to drive employee engagement and usage of I...
How a social intranet can be used to drive employee engagement and usage of I...LetsConnect
 
UAE Microsoft MVPs - How To become Microsoft MVP
UAE Microsoft MVPs - How To become Microsoft MVPUAE Microsoft MVPs - How To become Microsoft MVP
UAE Microsoft MVPs - How To become Microsoft MVPAmmar Hasayen
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmontscm24
 
Microsoft 365 Threat Management and security - EMS E5
Microsoft 365 Threat Management and security - EMS E5Microsoft 365 Threat Management and security - EMS E5
Microsoft 365 Threat Management and security - EMS E5Ammar Hasayen
 
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)Rackspace Academy
 
TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...
TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...
TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...Chris Richardson
 

What's hot (20)

CAMP IT Slides - Skytap - Brian White
CAMP IT Slides - Skytap - Brian White CAMP IT Slides - Skytap - Brian White
CAMP IT Slides - Skytap - Brian White
 
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming AnalyticsR, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
 
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
 
Big Data beyond Apache Hadoop - How to integrate ALL your Data
Big Data beyond Apache Hadoop - How to integrate ALL your DataBig Data beyond Apache Hadoop - How to integrate ALL your Data
Big Data beyond Apache Hadoop - How to integrate ALL your Data
 
How to plan your Modern Workplace Project - SPS Denver October 2018
How to plan your Modern Workplace Project - SPS Denver October 2018How to plan your Modern Workplace Project - SPS Denver October 2018
How to plan your Modern Workplace Project - SPS Denver October 2018
 
"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013
"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013
"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013
 
Not actually a DevOps Talk
Not actually a DevOps TalkNot actually a DevOps Talk
Not actually a DevOps Talk
 
Scenarios for building Hybrid Cloud
Scenarios for building Hybrid CloudScenarios for building Hybrid Cloud
Scenarios for building Hybrid Cloud
 
Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA
 
Analytics in the Cloud: Getting The Most Out Of Analytics Deployments
Analytics in the Cloud: Getting The Most Out Of Analytics DeploymentsAnalytics in the Cloud: Getting The Most Out Of Analytics Deployments
Analytics in the Cloud: Getting The Most Out Of Analytics Deployments
 
Webinar: Hybrid Cloud Integration - Why It's Different and Why It Matters
Webinar: Hybrid Cloud Integration - Why It's Different and Why It MattersWebinar: Hybrid Cloud Integration - Why It's Different and Why It Matters
Webinar: Hybrid Cloud Integration - Why It's Different and Why It Matters
 
Azure Cloud Security
Azure Cloud SecurityAzure Cloud Security
Azure Cloud Security
 
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
 
How a social intranet can be used to drive employee engagement and usage of I...
How a social intranet can be used to drive employee engagement and usage of I...How a social intranet can be used to drive employee engagement and usage of I...
How a social intranet can be used to drive employee engagement and usage of I...
 
UAE Microsoft MVPs - How To become Microsoft MVP
UAE Microsoft MVPs - How To become Microsoft MVPUAE Microsoft MVPs - How To become Microsoft MVP
UAE Microsoft MVPs - How To become Microsoft MVP
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmont
 
Microsoft 365 Threat Management and security - EMS E5
Microsoft 365 Threat Management and security - EMS E5Microsoft 365 Threat Management and security - EMS E5
Microsoft 365 Threat Management and security - EMS E5
 
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
 
TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...
TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...
TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 

Similar to Seeing through the Fog: Navigating the Security Landscape of a Cloud-First World

Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon usJonathan Sinclair
 
Practical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security EvangelismPractical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security EvangelismBen Johnson
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingJohn D. Johnson
 
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119lior mazor
 
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016Amazon Web Services Korea
 
Enterprise Data Center and Cloud: "Efficiency, Speed, Disruption"
Enterprise Data Center and Cloud: "Efficiency, Speed, Disruption"Enterprise Data Center and Cloud: "Efficiency, Speed, Disruption"
Enterprise Data Center and Cloud: "Efficiency, Speed, Disruption"Cisco Canada
 
Keynote Roberto Delamora - AWS Cloud Experience Argentina
Keynote Roberto Delamora - AWS Cloud Experience ArgentinaKeynote Roberto Delamora - AWS Cloud Experience Argentina
Keynote Roberto Delamora - AWS Cloud Experience ArgentinaAmazon Web Services LATAM
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCisco
 
Wikibon 2018 Predictions
Wikibon 2018 PredictionsWikibon 2018 Predictions
Wikibon 2018 Predictionsplburris
 
Redgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptxRedgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptxKellyn Pot'Vin-Gorman
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance InstituteHenrique Centieiro
 
How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and ...
How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and ...How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and ...
How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and ...Enterprise Management Associates
 
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for itAndy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for itNordic Infrastructure Conference
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship Zscaler
 
Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016Adrian Cockcroft
 
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoTIoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoTIoT Academy
 

Similar to Seeing through the Fog: Navigating the Security Landscape of a Cloud-First World (20)

Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
Lean Security
Lean SecurityLean Security
Lean Security
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon us
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Practical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security EvangelismPractical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security Evangelism
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
 
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
 
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
 
Enterprise Data Center and Cloud: "Efficiency, Speed, Disruption"
Enterprise Data Center and Cloud: "Efficiency, Speed, Disruption"Enterprise Data Center and Cloud: "Efficiency, Speed, Disruption"
Enterprise Data Center and Cloud: "Efficiency, Speed, Disruption"
 
Keynote Roberto Delamora - AWS Cloud Experience Argentina
Keynote Roberto Delamora - AWS Cloud Experience ArgentinaKeynote Roberto Delamora - AWS Cloud Experience Argentina
Keynote Roberto Delamora - AWS Cloud Experience Argentina
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
 
Wikibon 2018 Predictions
Wikibon 2018 PredictionsWikibon 2018 Predictions
Wikibon 2018 Predictions
 
Redgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptxRedgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptx
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and ...
How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and ...How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and ...
How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and ...
 
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for itAndy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship
 
Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016
 
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoTIoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Seeing through the Fog: Navigating the Security Landscape of a Cloud-First World

  • 1. Ben Johnson | Co-Founder & CTO OWASP OC 2018-03-22 SEEING THROUGH THE FOG
  • 2. @chicagoben | @obsidiansec Background Check // Ben Johnson Co-Founder and CTO, Obsidian Co-Founder and Former CTO, Carbon Black Former CNO/Cyber // NSA, CIA, DoD
  • 3. @chicagoben | @obsidiansec Today’s Goal? TO SPARK CONTEMPLATION (and give you something to remember!)
  • 6. @chicagoben | @obsidiansec Race to the Cloud! Lots of benefits of cloud adoption … we aren’t really here for that.
  • 8. @chicagoben | @obsidiansec IT and the Cloud “IT is the broad subject concerned with all aspects of managing and processing information, especially within a large organization or company.” Cloud computing is an information technology (IT) paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a public utility. IT Cloud
  • 9. @chicagoben | @obsidiansec IT and the Cloud (Reality) “Let’s stop managing hardware and a lot of the software” “Let’s scale up and down as necessary” “Let’s get access to cool new technologies more quickly” “Uptime is [mostly] someone else’s problem”
  • 10. @chicagoben | @obsidiansec Information Security and the Cloud “Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. ” Cloud computing is an information technology (IT) paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a public utility. InfoSec Cloud
  • 11. @chicagoben | @obsidiansec Information Security and the Cloud (Reality) “IT is going from 0 to 100 in the cloud and leaving security in the dust” - Fmr. CISO, Lending Club “We’re blind to all these new SaaS accounts” - Director, Cyber Intelligence, Top Athletics Brand “We don’t know what users are doing on our AWS/Azure accounts” - Too Many Organizations “Hackers don’t break in, they login.” - CISO, Cisco
  • 12. @chicagoben | @obsidiansec Modern Times are Leaky Booz Allen OneLogin The RNC Verizon Accenture Dow Jones Viacom Deloitte Sweden California
  • 15. @chicagoben | @obsidiansec Data Breaches: Not Just IaaS As of now, Deloitte cannot be "100% sure what was taken" by the hackers https://www.ciodive.com/news/deloitte-hack-email-migration-microsoft-office-365/506946/
  • 16. @chicagoben | @obsidiansec Breach Fatigue Anyone? Anyone getting CLOUD breach fatigue? If not you, do you think others are?
  • 19. @chicagoben | @obsidiansec Providers Have Challenges Goals are Misaligned Focus is on availability of variety of services with a minimum layer of security built-in Failure Can Be Easy A simple click can share huge amounts of data publicly (e.g. S3) Monitoring is Extra Work Logging & monitoring often have to be enabled separately Mo’ People, Mo’ Complexity Identities and policies are often complex to manage (maybe an understatement?) Sweet Spot is Elusive Policy and control options either feel too flexible or too rigid
  • 20. @chicagoben | @obsidiansec Customers Have Challenges Lack of Understanding The notion of shared responsibility and the differences in built-in security are often foreign. Taking the Plunge Departments race to the cloud, leaving security scrambling. (Is security slowing down adoption?) Bending the Rules Unsanctioned cloud use or lack of reporting to security what is in use. New Environment, Same Security Team Surface area is expanding, changing, and dynamic, yet security team isn’t as agile. “Operators think that once it’s in the cloud it’s no longer their responsibility” - Fmr. CIO of the Air Force
  • 21. @chicagoben | @obsidiansec Current Trends Making Things Harder
  • 22. @chicagoben | @obsidiansec IT and Security Disconnect IT Security Authentication Authorization Activity Enablement Threat Management DISCONNECTED Provisioning Anomaly Detection
  • 24. @chicagoben | @obsidiansec Cloud Security: “Of” Versus “In” Cloud Service Provider: responsible for security OF the cloud Customer: responsible for security IN the cloud
  • 25. @chicagoben | @obsidiansec AWS Responsibilities?
  • 26. @chicagoben | @obsidiansec AZURE Responsibilities?
  • 27. @chicagoben | @obsidiansec SaaS: “Of” Versus “In” The SaaS Provider handles all aspects except for identity and access management, client devices controls, and data accountability. The Customer, therefore, must understand users, devices & data related to that service.
  • 28. @chicagoben | @obsidiansec Office 365? Microsoft handles the underlying infrastructure, including patching and updating, and handles accessibility of the service. You are responsible for what is emailed, who accesses the email, and how they access the email.
  • 29. @chicagoben | @obsidiansec AZURE Responsibilities?Hackers want this!
  • 30. @chicagoben | @obsidiansec AWS Responsibilities? Hackers want this!
  • 33. @chicagoben | @obsidiansec Awareness, Auditing, Adaptation, Automation
  • 34. @chicagoben | @obsidiansec Awareness ๏Where are you using the cloud? ๏What “clouds” are you using? ๏Why are you using the cloud? ๏How are you using the cloud? ๏Who’s responsible for what’s in the cloud?
  • 35. @chicagoben | @obsidiansec Auditing ๏Understand current state (IT)…assets, users, devices. ๏Understand current state (Security). ๏Understand initiatives that involve cloud. ๏Understand security capabilities related to cloud.
  • 36. @chicagoben | @obsidiansec Adaptation ๏Put policies and checks in place for new deployments ๏Update security scans and tests to account for cloud ๏Enable tracking of all changes from current state ๏Have a process for monitoring all new accounts, assets, etc.
  • 37. @chicagoben | @obsidiansec Automation ๏Change your processes to reduce risk! ๏Security audits should be automated. ๏Cloud Providers have APIs – write code or use integrations to automate the collection of data, the taking of actions, the verification of changes. ๏Avoid manual activities.
  • 39. @chicagoben | @obsidiansec Triple-A! Authentication AccountingAuthorization Industry focus Neglected Forgotten
  • 40. @chicagoben | @obsidiansec IT and Security: Hand-in-Hand ๏Change your processes to reduce risk! ๏Security audits should be automated. ๏Cloud Providers have APIs – write code or use integrations to automate the collection of data, the taking of actions, the verification of changes. ๏Avoid manual activities. ๏Where are you using the cloud? ๏What “clouds” are you using? ๏Why are you using the cloud? ๏How are you using the cloud? ๏Who’s responsible for what’s in the cloud? ๏Understand current state (IT)…assets, users, devices. ๏Understand current state (Security). ๏Understand initiatives that involve cloud. ๏Understand security capabilities related to cloud. ๏Put policies and checks in place for new deployments ๏Update security scans and tests to account for cloud ๏Enable tracking of all changes from current state ๏Have a process for monitoring all new accounts, assets, etc.
  • 41. @chicagoben | @obsidiansec IT and Security: Hand-in-Hand Automate Change to Reduce Error and Risk Understanding Surface Area Understand Details and Processes Update processes and policies
  • 42. @chicagoben | @obsidiansec Journey vs. Outcomes Security teams often focus where they have the most autonomy; they get comfortable in this never-ending journey vs. driving toward new destinations.
  • 44. @chicagoben | @obsidiansec Take-Aways Understand where, how, and why you are using cloud. Understand who is responsible. Providers need to do more. They could reduce users shooting themselves in the foot, improve default security levels, and better show surface area. (Please encourage them to do more!) The rest is on you: (Awareness, Auditing, Adaptation, Automation)! Oh, yeah, Triple-A: (Authentication, Authorization, Accounting)! (and don’t forget hygiene.)
  • 45. @chicagoben | @obsidiansec Cloud: Massive Opportunity for Unifying IT & Security IT Security Enablement Enablement Provides Appropriate Tech Provides Appropriate Risk CONNECTED?