SlideShare a Scribd company logo
Automating Security in the AWS Cloud
Copyright 2017 Trend Micro Inc.2
ContainersCloudVirtualPhysical Serverless
101
010
SecondsMinutesDaysWeeks ImmediateTime to deploy
Deep Security
Protecting the server compute evolution
Teams: SecOps to DevSecOps
Applications: Changing more frequently, shorter lifespan
Threat Sophistication: Known Threats to Unknown, Targeted Threats
Licensing & Procurement: Static to Consumption-based, cross-environment
Protecting the Compute Evolution
Copyright 2017 Trend Micro Inc.3
Deep Security vs. Point Solutions over the
Evolving Server Threat Landscape
Firewall
Intrusion
Prevention
Application
Control
Sandbox
Analysis
Web
Reputation
Log
Inspection
Anti-Malware
File Integrity
Virtualization
Optimized
Machine
Learning
ThreatSophistication
“History has clearly shown that no single approach will be successful for thwarting all types of malware
attacks. Organizations and solution providers have to use an adaptive and strategic approach to malware
protection.” - Gartner EPP MQ 2016 quote
Copyright 2017 Trend Micro Inc.4
Anti-Malware & Web Reputation
Intrusion Prevention (IPS) & Firewall
Integrity Monitoring & Log Inspection
Application Control
Safe files &
actions allowed
Malicious files &
actions blocked
LEGEND
Known
Good
Known
Bad
Unknown
Machine Learning
Behavioral Analysis
Custom Sandbox Analysis
Cross-generational Blend of
Threat Defense Techniques
SOON!
NEW!
NEW!
NEW!
Copyright 2017 Trend Micro Inc.5
Threat Researchers
• 450 researchers
• Threat lifecycle and
distribution research
• 3k+ external vulnerability &
exploit researchers (ZDI)
Algorithm Accuracy Determined by Quality &
Volume of Training Data from SPN
Global Threat Intelligence
• 100 TB analyzed daily
• 500k new threats daily
• 800M+ good file whitelist
• 100s of millions of sensors
Copyright 2017 Trend Micro Inc.6
Network Based Security is Great
• It can be really expensive in
the beginning of operations
• Throughput is capped by
appliance
• Network Re-Configuration is
required
Copyright 2017 Trend Micro Inc.7
East-West Traffic80% of Network Traffic is East-West
Copyright 2017 Trend Micro Inc.8
Defend Against
Network & App
Threats
Response &
Containment
Intrusion
Prevention
Integrity
Monitoring
Anti-Malware &
Content Filtering
Machine
Learning
SOON!
Sandbox
Analysis
NEW!
Behavioral
Analysis
NEW!
Application
Control
NEW!
Copyright 2017 Trend Micro Inc.9
Threat Sophistication
Evolving Infrastructure
Speed of App Changes
IT Dynamics
Hybrid Cloud Security Challenges
Customer Pain
Lack of resources, need to
simplify
Threat protection & audit
Performance across hybrid
cloud
Overwhelmed
Incompatible
Audit
TooMany Tools
ZeroDay
ScanStorm
Copyright 2017 Trend Micro Inc.10
Customized views with Smart Folders
• Different teams have different requirements
• The security team is responsible for protecting
the computers within that infrastructure
• The infrastructure team is usually responsible for deploying computers
and ensuring the infrastructure remains stable and reliable
• Deep Security Smart Folders allow Security Administrators to arrange computers in a way that
makes sense from a security perspective – regardless of where the infrastructure team has
provisioned them
• Security Administrators can specify criteria that will dynamically populate the smart folder
Copyright 2017 Trend Micro Inc.11
Customized View of Computers and Workloads
1. Create your Smart Folder 2. Define filter rules based on Computer Properties
3. Custom organized
system-wide view of Data
Center and Cloud
workloads
Copyright 2017 Trend Micro Inc.12
AWS Simple Notification Service (SNS) Integration
• Send key events to the right system or team
via SNS topic
• Create automated responses to security
events
– Anti-malware events
– Web reputation events
– Firewall events
– Intrusion prevention events
– Integrity events
– Log inspection events
Block unknown software from running
on Protected Servers
• When enabled, Application Control will scan
servers and create a whitelist of approved
software
• Administrator defined rules can block all
unknown software (not included in the whitelist)
until explicitly allowed
– Effectively “locks down” servers to
significantly reduce its attack surface
• Real-time protection against unknown software
• Included with the System Security License (along
with Integrity Monitoring and Log Inspection)
Application
Control
Many ways for malware to install on your servers
• Intrusions
• Lateral Movement
• Human Error
• Authorized users installing custom/personalized tools
Copyright 2017 Trend Micro Inc.14
Administrator Control See how many unknown
software events occurred
hourly, daily, monthly or in
total
Customize view by File or
Computer
Lockdown Servers
across the Hybrid
Cloud even when
workloads are elastic
Choose ”Allow” to add
software to whitelist
Choose ”Block” to exclude
from whitelist
List view of all unknown
software events
Share rulesets with
other computers
Detailed view shows who
changed the file
Copyright 2017 Trend Micro Inc.15
Application Control CI/CD Integration
Build Software
Notify Deep
Security - New
Software
Deploy Software
Notify Deep
Security -
Deployment
Complete
Analyze,
Detect,
and
Prevent
Use Deep Security API's to
notify DS that new software
will be deployed to host
Use Deep Security API's to
notify DS that the deployment
is complete
OR
Application
Control
16
Trend Micro Control Manager
Detect, analyze and contain suspicious document files
ANALYZE DETECT
PREVENTRESPOND
Insight & Control
Deep Security
Deep Security receives updated
signature and policy (eg. Quarantine)
Suspicious files are detected
by Deep Security and
submitted to Deep
Discovery Analyzer
Sandbox analysis results are sent to
Trend Micro Control Manager where
remediation actions are set
Suspicious objects are analyzed in a
closed sandbox environment – to confirm
Ransomware attack
Deep Discovery Analyzer
Copyright 2017 Trend Micro Inc.17
Intelligent Detection and Protection against
Ransomware attacks
Deep Security Anti-
malware is protecting
server
Anti-malware
Behavior Monitoring
Unknown
Ransomware finds
server host and
starts legitimate
looking process
Deep Security detects and
monitors suspicious behavior
and begins backing up files
Deep Security determines behavior
to be a Ransomware Attack > Stops
process and quarantines file
Deep Security restores
original unencrypted files to
directory and logs event
Ransomware begins
encrypting files
Copyright 2017 Trend Micro Inc.18
Deep Security
Agent (DSA) Application
Container
(e.g. MySQL)
Application
Container
(e.g. NGINX)
Docker Engine
Operating SystemDS Kernel
Modules
Real-Time
Anti-Malware (AM)
Policy Enforcement (Containers)
Policy Enforcement (Host)
Intrusion Prevention /
Virtual Patching (IPS)
Runtime Protection for Docker Deployments
• Intrusion Prevention /
Virtual Patching (IPS)
• Anti-Malware (AM)
• Application Control
• Host Firewall, WRS
DSA is installed directly on
the Docker Host
• Docker Host visibility
reported to DSM
• Log inspection
• Integrity Monitoring
Copyright 2017 Trend Micro Inc.19
Submitting Suspicious Files
on a Cloud Instance
This is What Happened?
Attacker
Bad File
Upload
Affected
ECS Host
Detect and
Report
Deep Security
Manager
Trigger
Lambda Function
Affected
ECS Host
Terminate
Snapshot for
Investigation
Add More
Hosts
Create
Snapshot
Auto Scaling
Group
Copyright 2017 Trend Micro Inc.25
Shielding Vulnerabilities
on a Cloud Instance
This is what happened?
Attacker
Run
Exploit
EC2 Instance
Via Beanstalk
Deep Security
Manager
Prevent
And Report
Trigger
via SNS
Lambda Function
Database
Snapshot
Create
RDS DB Snapshot
Copyright 2017 Trend Micro Inc.32
XGen Approach to Hybrid Cloud Security
We have seen How To:
• Protect on-premises Datacenter Servers, Virtual or Cloud Instances using techniques such as
Advance Malware Protection, Vulnerability Shielding
• Central visibility, in built automation to scale up / down your security deployment and policy
assignments on public cloud platforms
• Automate threat response to on-premises DC server farms, Virtual and Cloud workloads
Key Benefits:
• Cross generational approach provides maximum protection against all types of threats
• Allows scalability without increasing complexity of management
• Helps customers with fastest Time to Protect
• Single pane visibility with actionable intelligence leads to better incident response
Confidential © 2017 Trend Micro Inc.
Gartner Magic Quadrant for
Endpoint Protection Platforms
January 2017
This graphic was published by Gartner, Inc. as part of a larger research document and
should be evaluated in the context of the entire document. The Gartner document is
available upon request from
https://resources.trendmicro.com/Gartner-Magic-Quadrant-Endpoints.html
Gartner does not endorse any vendor, product or service depicted in its research
publications, and does not advise technology users to select only those vendors with the
highest ratings or other designation. Gartner research publications consist of the opinions
of Gartner's research organization and should not be construed as statements of fact.
Gartner disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
Copyright 2017 Trend Micro Inc.34
Market Leadership Position
The market leader
in server security
for the 7th straight year
Highest and Furthest to the Right in
the Leader’s Quadrant in the Gartner
Magic Quadrant for Endpoint
Protection Platforms, Jan 2017
#1 in protection and performance
• Source: IDC, Securing the Server Compute Evolution: Hybrid Cloud Has
Transformed the Datacenter, January 2017 #US41867116
• NSS Labs Breach Detection Test Results (2014-2016);
NSS NGIPS Test Results, 2016
• http://www.trendmicro.com/us/business/cyber-security/gartner-idps-report/
• https://resources.trendmicro.com/Gartner-Magic-Quadrant-
Endpoints.html
• av-test.org (Jan 2014 to Dec 2016)
Recommended Breach Detection System
for 3 straight years, and
Recommended Next-generation IPS
Leader in Gartner Magic Quadrant for
Intrusion Detection and Prevention
Systems, January 2017

More Related Content

What's hot

Secure Applications and FedRAMP in the AWS GovCloud (US) Region (SEC204) | AW...
Secure Applications and FedRAMP in the AWS GovCloud (US) Region (SEC204) | AW...Secure Applications and FedRAMP in the AWS GovCloud (US) Region (SEC204) | AW...
Secure Applications and FedRAMP in the AWS GovCloud (US) Region (SEC204) | AW...
Amazon Web Services
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Amazon Web Services
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in Practice
Alert Logic
 
Security Operations in the Cloud
Security Operations in the CloudSecurity Operations in the Cloud
Security Operations in the Cloud
Armor
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
Amazon Web Services
 
Five Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud ArchitectureFive Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud Architecture
Amazon Web Services
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
Amazon Web Services
 
(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS
Amazon Web Services
 
Architecting for Greater Security on AWS
Architecting for Greater Security on AWSArchitecting for Greater Security on AWS
Architecting for Greater Security on AWS
Amazon Web Services
 
Understanding AWS Managed Database and Analytics Services | AWS Public Sector...
Understanding AWS Managed Database and Analytics Services | AWS Public Sector...Understanding AWS Managed Database and Analytics Services | AWS Public Sector...
Understanding AWS Managed Database and Analytics Services | AWS Public Sector...
Amazon Web Services
 
F5 on AWS: How MailControl Improved their Application Visbility and Security
F5 on AWS:  How MailControl Improved their Application Visbility and Security F5 on AWS:  How MailControl Improved their Application Visbility and Security
F5 on AWS: How MailControl Improved their Application Visbility and Security
Amazon Web Services
 
Big Data in the Cloud: How the RISElab Enables Computers to Make Intelligent ...
Big Data in the Cloud: How the RISElab Enables Computers to Make Intelligent ...Big Data in the Cloud: How the RISElab Enables Computers to Make Intelligent ...
Big Data in the Cloud: How the RISElab Enables Computers to Make Intelligent ...
Amazon Web Services
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Web Services
 
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
Amazon Web Services
 
DDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS ShieldDDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS Shield
Amazon Web Services
 
Securing your cloud perimeter with azure network security brk3185
Securing your cloud perimeter with azure network security brk3185Securing your cloud perimeter with azure network security brk3185
Securing your cloud perimeter with azure network security brk3185
jtaylor707
 
How Serverless Computing Enables Microservices and Micropayment 
How Serverless Computing Enables Microservices and Micropayment  How Serverless Computing Enables Microservices and Micropayment 
How Serverless Computing Enables Microservices and Micropayment 
Amazon Web Services
 
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Amazon Web Services
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWS
Amazon Web Services
 
Putting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud ScalePutting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud Scale
Amazon Web Services
 

What's hot (20)

Secure Applications and FedRAMP in the AWS GovCloud (US) Region (SEC204) | AW...
Secure Applications and FedRAMP in the AWS GovCloud (US) Region (SEC204) | AW...Secure Applications and FedRAMP in the AWS GovCloud (US) Region (SEC204) | AW...
Secure Applications and FedRAMP in the AWS GovCloud (US) Region (SEC204) | AW...
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in Practice
 
Security Operations in the Cloud
Security Operations in the CloudSecurity Operations in the Cloud
Security Operations in the Cloud
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
 
Five Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud ArchitectureFive Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud Architecture
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
 
(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS
 
Architecting for Greater Security on AWS
Architecting for Greater Security on AWSArchitecting for Greater Security on AWS
Architecting for Greater Security on AWS
 
Understanding AWS Managed Database and Analytics Services | AWS Public Sector...
Understanding AWS Managed Database and Analytics Services | AWS Public Sector...Understanding AWS Managed Database and Analytics Services | AWS Public Sector...
Understanding AWS Managed Database and Analytics Services | AWS Public Sector...
 
F5 on AWS: How MailControl Improved their Application Visbility and Security
F5 on AWS:  How MailControl Improved their Application Visbility and Security F5 on AWS:  How MailControl Improved their Application Visbility and Security
F5 on AWS: How MailControl Improved their Application Visbility and Security
 
Big Data in the Cloud: How the RISElab Enables Computers to Make Intelligent ...
Big Data in the Cloud: How the RISElab Enables Computers to Make Intelligent ...Big Data in the Cloud: How the RISElab Enables Computers to Make Intelligent ...
Big Data in the Cloud: How the RISElab Enables Computers to Make Intelligent ...
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
 
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
 
DDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS ShieldDDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS Shield
 
Securing your cloud perimeter with azure network security brk3185
Securing your cloud perimeter with azure network security brk3185Securing your cloud perimeter with azure network security brk3185
Securing your cloud perimeter with azure network security brk3185
 
How Serverless Computing Enables Microservices and Micropayment 
How Serverless Computing Enables Microservices and Micropayment  How Serverless Computing Enables Microservices and Micropayment 
How Serverless Computing Enables Microservices and Micropayment 
 
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWS
 
Putting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud ScalePutting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud Scale
 

Similar to Automating Event Driven Security in the AWS Cloud

Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
Integral university, India
 
How to protect my cloud workload from Ransomware?
How to protect my cloud workload from Ransomware?How to protect my cloud workload from Ransomware?
How to protect my cloud workload from Ransomware?
Raphael Bottino
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterNicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security Center
Microsoft Österreich
 
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
Capgemini
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
Minh Le
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
Amazon Web Services
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Adam Levithan
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
 
Security management
Security managementSecurity management
Security management
Dean Iacovelli
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
Invincea, Inc.
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
Cisco Canada
 
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Amazon Web Services
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
Mediehuset Ingeniøren Live
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Clearnetwork
 
endpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdfendpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdf
Olufemi37
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
Teemu Tiainen
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 

Similar to Automating Event Driven Security in the AWS Cloud (20)

Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
How to protect my cloud workload from Ransomware?
How to protect my cloud workload from Ransomware?How to protect my cloud workload from Ransomware?
How to protect my cloud workload from Ransomware?
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterNicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security Center
 
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Security management
Security managementSecurity management
Security management
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
 
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
endpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdfendpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdf
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Automating Event Driven Security in the AWS Cloud

  • 1. Automating Security in the AWS Cloud
  • 2. Copyright 2017 Trend Micro Inc.2 ContainersCloudVirtualPhysical Serverless 101 010 SecondsMinutesDaysWeeks ImmediateTime to deploy Deep Security Protecting the server compute evolution Teams: SecOps to DevSecOps Applications: Changing more frequently, shorter lifespan Threat Sophistication: Known Threats to Unknown, Targeted Threats Licensing & Procurement: Static to Consumption-based, cross-environment Protecting the Compute Evolution
  • 3. Copyright 2017 Trend Micro Inc.3 Deep Security vs. Point Solutions over the Evolving Server Threat Landscape Firewall Intrusion Prevention Application Control Sandbox Analysis Web Reputation Log Inspection Anti-Malware File Integrity Virtualization Optimized Machine Learning ThreatSophistication “History has clearly shown that no single approach will be successful for thwarting all types of malware attacks. Organizations and solution providers have to use an adaptive and strategic approach to malware protection.” - Gartner EPP MQ 2016 quote
  • 4. Copyright 2017 Trend Micro Inc.4 Anti-Malware & Web Reputation Intrusion Prevention (IPS) & Firewall Integrity Monitoring & Log Inspection Application Control Safe files & actions allowed Malicious files & actions blocked LEGEND Known Good Known Bad Unknown Machine Learning Behavioral Analysis Custom Sandbox Analysis Cross-generational Blend of Threat Defense Techniques SOON! NEW! NEW! NEW!
  • 5. Copyright 2017 Trend Micro Inc.5 Threat Researchers • 450 researchers • Threat lifecycle and distribution research • 3k+ external vulnerability & exploit researchers (ZDI) Algorithm Accuracy Determined by Quality & Volume of Training Data from SPN Global Threat Intelligence • 100 TB analyzed daily • 500k new threats daily • 800M+ good file whitelist • 100s of millions of sensors
  • 6. Copyright 2017 Trend Micro Inc.6 Network Based Security is Great • It can be really expensive in the beginning of operations • Throughput is capped by appliance • Network Re-Configuration is required
  • 7. Copyright 2017 Trend Micro Inc.7 East-West Traffic80% of Network Traffic is East-West
  • 8. Copyright 2017 Trend Micro Inc.8 Defend Against Network & App Threats Response & Containment Intrusion Prevention Integrity Monitoring Anti-Malware & Content Filtering Machine Learning SOON! Sandbox Analysis NEW! Behavioral Analysis NEW! Application Control NEW!
  • 9. Copyright 2017 Trend Micro Inc.9 Threat Sophistication Evolving Infrastructure Speed of App Changes IT Dynamics Hybrid Cloud Security Challenges Customer Pain Lack of resources, need to simplify Threat protection & audit Performance across hybrid cloud Overwhelmed Incompatible Audit TooMany Tools ZeroDay ScanStorm
  • 10. Copyright 2017 Trend Micro Inc.10 Customized views with Smart Folders • Different teams have different requirements • The security team is responsible for protecting the computers within that infrastructure • The infrastructure team is usually responsible for deploying computers and ensuring the infrastructure remains stable and reliable • Deep Security Smart Folders allow Security Administrators to arrange computers in a way that makes sense from a security perspective – regardless of where the infrastructure team has provisioned them • Security Administrators can specify criteria that will dynamically populate the smart folder
  • 11. Copyright 2017 Trend Micro Inc.11 Customized View of Computers and Workloads 1. Create your Smart Folder 2. Define filter rules based on Computer Properties 3. Custom organized system-wide view of Data Center and Cloud workloads
  • 12. Copyright 2017 Trend Micro Inc.12 AWS Simple Notification Service (SNS) Integration • Send key events to the right system or team via SNS topic • Create automated responses to security events – Anti-malware events – Web reputation events – Firewall events – Intrusion prevention events – Integrity events – Log inspection events
  • 13. Block unknown software from running on Protected Servers • When enabled, Application Control will scan servers and create a whitelist of approved software • Administrator defined rules can block all unknown software (not included in the whitelist) until explicitly allowed – Effectively “locks down” servers to significantly reduce its attack surface • Real-time protection against unknown software • Included with the System Security License (along with Integrity Monitoring and Log Inspection) Application Control Many ways for malware to install on your servers • Intrusions • Lateral Movement • Human Error • Authorized users installing custom/personalized tools
  • 14. Copyright 2017 Trend Micro Inc.14 Administrator Control See how many unknown software events occurred hourly, daily, monthly or in total Customize view by File or Computer Lockdown Servers across the Hybrid Cloud even when workloads are elastic Choose ”Allow” to add software to whitelist Choose ”Block” to exclude from whitelist List view of all unknown software events Share rulesets with other computers Detailed view shows who changed the file
  • 15. Copyright 2017 Trend Micro Inc.15 Application Control CI/CD Integration Build Software Notify Deep Security - New Software Deploy Software Notify Deep Security - Deployment Complete Analyze, Detect, and Prevent Use Deep Security API's to notify DS that new software will be deployed to host Use Deep Security API's to notify DS that the deployment is complete OR Application Control
  • 16. 16 Trend Micro Control Manager Detect, analyze and contain suspicious document files ANALYZE DETECT PREVENTRESPOND Insight & Control Deep Security Deep Security receives updated signature and policy (eg. Quarantine) Suspicious files are detected by Deep Security and submitted to Deep Discovery Analyzer Sandbox analysis results are sent to Trend Micro Control Manager where remediation actions are set Suspicious objects are analyzed in a closed sandbox environment – to confirm Ransomware attack Deep Discovery Analyzer
  • 17. Copyright 2017 Trend Micro Inc.17 Intelligent Detection and Protection against Ransomware attacks Deep Security Anti- malware is protecting server Anti-malware Behavior Monitoring Unknown Ransomware finds server host and starts legitimate looking process Deep Security detects and monitors suspicious behavior and begins backing up files Deep Security determines behavior to be a Ransomware Attack > Stops process and quarantines file Deep Security restores original unencrypted files to directory and logs event Ransomware begins encrypting files
  • 18. Copyright 2017 Trend Micro Inc.18 Deep Security Agent (DSA) Application Container (e.g. MySQL) Application Container (e.g. NGINX) Docker Engine Operating SystemDS Kernel Modules Real-Time Anti-Malware (AM) Policy Enforcement (Containers) Policy Enforcement (Host) Intrusion Prevention / Virtual Patching (IPS) Runtime Protection for Docker Deployments • Intrusion Prevention / Virtual Patching (IPS) • Anti-Malware (AM) • Application Control • Host Firewall, WRS DSA is installed directly on the Docker Host • Docker Host visibility reported to DSM • Log inspection • Integrity Monitoring
  • 19. Copyright 2017 Trend Micro Inc.19 Submitting Suspicious Files on a Cloud Instance
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. This is What Happened? Attacker Bad File Upload Affected ECS Host Detect and Report Deep Security Manager Trigger Lambda Function Affected ECS Host Terminate Snapshot for Investigation Add More Hosts Create Snapshot Auto Scaling Group
  • 25. Copyright 2017 Trend Micro Inc.25 Shielding Vulnerabilities on a Cloud Instance
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. This is what happened? Attacker Run Exploit EC2 Instance Via Beanstalk Deep Security Manager Prevent And Report Trigger via SNS Lambda Function Database Snapshot Create RDS DB Snapshot
  • 32. Copyright 2017 Trend Micro Inc.32 XGen Approach to Hybrid Cloud Security We have seen How To: • Protect on-premises Datacenter Servers, Virtual or Cloud Instances using techniques such as Advance Malware Protection, Vulnerability Shielding • Central visibility, in built automation to scale up / down your security deployment and policy assignments on public cloud platforms • Automate threat response to on-premises DC server farms, Virtual and Cloud workloads Key Benefits: • Cross generational approach provides maximum protection against all types of threats • Allows scalability without increasing complexity of management • Helps customers with fastest Time to Protect • Single pane visibility with actionable intelligence leads to better incident response
  • 33. Confidential © 2017 Trend Micro Inc. Gartner Magic Quadrant for Endpoint Protection Platforms January 2017 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from https://resources.trendmicro.com/Gartner-Magic-Quadrant-Endpoints.html Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
  • 34. Copyright 2017 Trend Micro Inc.34 Market Leadership Position The market leader in server security for the 7th straight year Highest and Furthest to the Right in the Leader’s Quadrant in the Gartner Magic Quadrant for Endpoint Protection Platforms, Jan 2017 #1 in protection and performance • Source: IDC, Securing the Server Compute Evolution: Hybrid Cloud Has Transformed the Datacenter, January 2017 #US41867116 • NSS Labs Breach Detection Test Results (2014-2016); NSS NGIPS Test Results, 2016 • http://www.trendmicro.com/us/business/cyber-security/gartner-idps-report/ • https://resources.trendmicro.com/Gartner-Magic-Quadrant- Endpoints.html • av-test.org (Jan 2014 to Dec 2016) Recommended Breach Detection System for 3 straight years, and Recommended Next-generation IPS Leader in Gartner Magic Quadrant for Intrusion Detection and Prevention Systems, January 2017