Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cloud security evolution


Published on

A brief slidedeck on the the evolution of the cloud and the security approach to it

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Cloud security evolution

  1. 1. Cloud Security Evolution Jay Harrison Technical Operations Site Reliability Engineering Manager, EMEA
  2. 2. My credentials 22 years in the industry, a decade in the cloud Technical Operations & SRE at ● Okta - billion dollar cloud SaaS integrator ● Centrica Hive - IoT company - millions of devices ● EA Games, Playfish - social media games - over a billion players Previous talks on this topic at ● AWS London Summit 2018 ● Computing Cloud & Infrastructure Summit 2017 ● Cloud World Forum 2015 Who am I and why am I here Leading independent provider of identity for the enterprise - 2017 & 2018 Leader, Gartner Magic Quadrant for Access Management, Worldwide ● Built in the cloud, compatible with on-prem ● Over 6,000 pre-built applications and infrastructure provider integrations ● Over 6,100 customers, including 21st Century Fox, Experian, Adobe, Gatwick Airport, Western Union. ● Hundreds of millions of users & billions of authentications per month
  3. 3. Evolution of Cloud Services Amazon Web Services (AWS) in 2006 Google Cloud Platform (GCP) in 2008 Rackspace Cloud in 2009 Microsoft Azure & OpenStack in 2010 Oracle Cloud Infrastructure v2 in 2018 All started with compute and storage as MVP All have iterated towards full IaaS, SaaS, PaaS vendors Compliance is built in - SOC, PCI-DSS, FIPS, ISO, HIPAA Public cloud services accrued $175.8 billion in revenue in 2018 … we can be far more secure in the cloud and achieve a higher level of assurance at a much lower cost … - John Brady, FINRA, 2017
  4. 4. Evolution of Threats Phone Phreaks & Script Kiddies Organised Hacker groups Virus & Malware distributors Cyber Vandalism Phishers & Social Engineers Ransomware & Botnet collectives Nation State Actors Ever more sophisticated attacks With threat actors now able to access data owned by larger organisations through smaller businesses within the chain, it’s no longer enough for enterprises to understand just their own security set up. - Chris O’Brien, EclecticIQ, 2018
  5. 5. Distribution of Threats Victims ● 10% financial industry ● 15% healthcare organisations ● 16% public sector entities ● 43% small business Tactics ● 4% physical action ● 15% misuse by authorised users ● 21% caused by errors ● 28% malware ● 33% social attack component ● 52% hacking Actors ● 34% involved internal actors ● 69% involved outsiders ● 23% identified as nation-state or state-affiliated ● 39% organised criminal groups Commonalities ● 25% for strategic advantage gain (espionage) ● 29% use of stolen credentials ● 32% involved phishing ● 56% took months or longer to discover ● 71% financially motivated Verizon 2019 Data Breach Investigations Report
  6. 6. Evolution of the Responses Dedicated roles ● DevSecOps ● Offensive/Defensive Engineers (Red/Blue Teams) ● Security Data Scientist ● Security and Compliance Analyst ● Security Automation ● Security Architect ● CSO/CISO Dedicated products ● Security information and event management (SIEM) ● Intrusion Detection/Prevention ● Customer Identity and Access Management (CIAM) ● Penetration & DDOS protection ● Device Trust & Endpoint Protection ● External Audit & Compliance More and more security frameworks and regulations require a dedicated security officer, and it is a best practice in all but the smallest of organizations. - Derek Boczenowski, Compass Compliance, 2018
  7. 7. Evolution of Technology Cloud vendors know their services & have the closest integrations Cloud Vendor Solutions ● AWS Guardduty ● Azure Sentinel ● GCP Cloud Security Scanner Traditional tools & approaches rarely work ● Unable to cope with scale & pace of change ● Don’t account for new factors Security as Code ● Automated Policy Governance ● Security configuration under source control Enterprise Cloud Security is a big-data problem - Shannon Leitz, Intuit, 2015
  8. 8. Evolution of Security Models The network perimeter can no longer be the only line of defence Defence in Depth ● Physical Security ● Secure Hiring Practices ● Secure User Access with MFA ● Secure Local Environments ● Policy, Procedure & Awareness ● Defensive Programming ● Data Encryption at rest and on the wire ● Network Compartmentalisation ● Least Privilege for both users and software ● Vulnerability Management ● Secure OS ● Attack & Intrusion detection ● Monitoring & Alerting Thanks to the rise of cloud services and remote working … what matters now is how people access their resources, no matter where in the world they come from. - Yassir Abousselham, Okta, 2018
  9. 9. Evolution of the Perimeter Zero trust approach ● People, workloads, and devices are just as untrustworthy as network traffic ● 81% of data breaches involve stolen/weak credentials ● 91% of phishing attacks target credentials ● 73% of passwords are duplicates Authentication and Authorisation ● Pervasive ● Skeptical ● Adaptive ● Contextual ● Automated ● Centralised Identity is the new perimeter - John Hawley, CA Technologies, 2012
  10. 10. Security as a Keystone It’s not just the remit of Engineering, CSO/CISO, HR or Building Security Keys to success ● Detect and resolve issues quickly ● Use native security capabilities wherever possible ● Enlist and enable the entire organisation ● Educate progressively and in simple chunks ● Review policy, procedure and permissions regularly Security is everyone’s problem - Robert Reeves, Datical, 2016
  11. 11. Thank you Questions?