SlideShare a Scribd company logo
C L O U D Y W I T H A C H A N C E
O F B R E A C H E S
NAVIGATING THE STORMY SKIES OF DATA
SECURITY
S P E A K E R S P R O F I L E
Albertini Francis
DevSecOps and Cloud Security Engineer.
Cloud native security enthusiast.
AWS Community Builder
Gamer, Basketball
Ellan Wambugu is a DevSecOps
Engineer. Having experience as a
multi-cloud red teaming
professional and a
DevOps engineer . A stressed out
man united fan
S P E A K E R S P R O F I L E
CLOUD DATA BREACHES
DATA BREACHES STATISTICS
• The average cost of a data breach in 2023 of
USD 4.45 million, cost per record being 165
dollars
• Phishing or compromised creds(cloud
misconfigurations or business email
compromise)
• Misconfigurations still remain a major concern
and breach vector
• Secrets mismanagement is a key pain-point for
most organizations
MODERN DAY APP BREAKDOWN
The modern day app leverages newer delivery
methods:
• Containerization
• Embracing the open source(Libraries, software
etc)
• Automation of infrastructure
provisioning(Infrastructure as Code)
CLOUD NATIVE APP BREACH POINTS
Prisma-cloud
THREAT MODELLING
Threat modelling is the process of analysing various business and technical
requirements of a system, identifying the potential threats, and documenting how
vulnerable these threats make the system
https://cloudsecurityalliance.org/artifacts/cloud-threat-modeling/
THREAT MODELLING METHODOLOGIES
We have different approaches to Threat Modelling
depending on the CTI teams and Workloads
• Asset-centric
• Attacker-centric
• Software-centric
THREAT MODELLING YOUR CLOUD ENVIRONMENT
Inventory Of Your Account
-Determine what assets, data & resources are in your
environment
Understand Your Architecture
-Understand your network topology, data flows
Threat Profiling
-Understand threats & vulnerabilities your environment
might face
Attack Surface Analysis
-Identify Points of Entry for Attackers
Risk Matrix & Mitigation
-Create and update a risk matrix & mitigation list
“Identify and prioritize risks using a threat model: Use a threat model to identify and maintain an up-to-date
register of potential threats. Prioritize your threats and adapt your security controls to prevent, detect, and
respond. Revisit and maintain this in the context of the evolving security landscape.”
Do An Inventory Of Your Environment
Have visibility over:
• Organizational and personal accounts and their
levels of access
• Deployments: services and regions
• Data: classification, Access, location,
lifecycle management
Asset management introduces Visibility
• You know what(services) is running where(regions)
You can't protect what you don’t know
Understand your architecture
Have visibility over:
• Understand network and infra topologies to get
what's supposed to public and strictly internal
• Understand your Infrastructure flow and some
decisions as to its current state
• Understand your Data flows in relation to the app,
services and IAM
Asset management introduces Visibility
• You know what(services) is running where(regions)
"Know yourself and your enemy and you need not fear
the outcome of a thousand battles"
THREAT PROFILING
https://cloudsecurityalliance.org/research/working-groups/top-threats/
A structured, repeatable process for determining relevant, prioritized
cyber threats (adversaries, malware, & associated attack techniques),
based on quantifiable evidence
• Consider Organizational Context
• Identify Relevant Threats
• Quantify Threats
• Proactive Defensive Action
M I N D Y O U R AT TA C K
S U R FA C E
• Secrets: Credentials & api keys
• Misconfigurations
• Open/misconfigured blob storage
• Public EBS snapshots
• Android: hardcoded creds & misconfigured
storage and firebase dbs
Mind your attack surface: Initial access
• Application code/code repo: Secrets:
Credentials & api keys
• Live Application: Misconfigurations ports,
• Open/misconfigured blob storage
• Public EBS & RDS
• Android: hardcoded creds & misconfigured
storage and firebase dbs
Risk Matrix : Analyze, Manage & Mitigate
• Continuous Logging & Monitoring
• Proactive Security Guardrails with
DevSecOps
• Tailor Your Security Measures
Accordingly.
• Utilize CNAPPS to your Advantage.
• Address Challenges and Acknowledge
Issues Within Your Capabilities
DEMO
Have visibility over:
• Understand network and infra topologies to get
what's supposed to public and what's strictly
internal
• Understand your Infrastructure flow and some
decisions as to its current state
• Understand your Data flows in relation to the apps,
services and IAM
QA & Thanks
Thanks For Listening
FIN

More Related Content

Similar to BsidesNairobiPresentation.pptx for cloud threat intelligence presentation at Bsides Nairobi

Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
Invincea, Inc.
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
pbink
 
Unit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and securityUnit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and security
MonishaNehkal
 
chap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systemschap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systems
KashfUlHuda1
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
Alert Logic
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
New Horizons Computer Learning Centers / 5PE
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
Alert Logic
 
An Introduction of SQL Injection, Buffer Overflow & Wireless Attack
An Introduction of SQL Injection, Buffer Overflow & Wireless AttackAn Introduction of SQL Injection, Buffer Overflow & Wireless Attack
An Introduction of SQL Injection, Buffer Overflow & Wireless Attack
TechSecIT
 
Reality Check: Security in the Cloud
Reality Check: Security in the CloudReality Check: Security in the Cloud
Reality Check: Security in the Cloud
Alert Logic
 
SC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentitySC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and Identity
FredBrandonAuthorMCP
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
Pratap Dangeti
 
Outpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud securityOutpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud security
Outpost24
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
abhimanyubhogwan
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
Amazon Web Services
 
Maturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOpsMaturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOps
Amazon Web Services
 
EISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityEISA Considerations for Web Application Security
EISA Considerations for Web Application Security
Larry Ball
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
Jim Kaplan CIA CFE
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
CloudHesive
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
 
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
Amazon Web Services
 

Similar to BsidesNairobiPresentation.pptx for cloud threat intelligence presentation at Bsides Nairobi (20)

Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
Unit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and securityUnit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and security
 
chap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systemschap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systems
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
An Introduction of SQL Injection, Buffer Overflow & Wireless Attack
An Introduction of SQL Injection, Buffer Overflow & Wireless AttackAn Introduction of SQL Injection, Buffer Overflow & Wireless Attack
An Introduction of SQL Injection, Buffer Overflow & Wireless Attack
 
Reality Check: Security in the Cloud
Reality Check: Security in the CloudReality Check: Security in the Cloud
Reality Check: Security in the Cloud
 
SC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentitySC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and Identity
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
Outpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud securityOutpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud security
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 
Maturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOpsMaturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOps
 
EISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityEISA Considerations for Web Application Security
EISA Considerations for Web Application Security
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
 

Recently uploaded

leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 

Recently uploaded (20)

leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 

BsidesNairobiPresentation.pptx for cloud threat intelligence presentation at Bsides Nairobi

  • 1. C L O U D Y W I T H A C H A N C E O F B R E A C H E S NAVIGATING THE STORMY SKIES OF DATA SECURITY
  • 2. S P E A K E R S P R O F I L E Albertini Francis DevSecOps and Cloud Security Engineer. Cloud native security enthusiast. AWS Community Builder Gamer, Basketball
  • 3. Ellan Wambugu is a DevSecOps Engineer. Having experience as a multi-cloud red teaming professional and a DevOps engineer . A stressed out man united fan S P E A K E R S P R O F I L E
  • 5. DATA BREACHES STATISTICS • The average cost of a data breach in 2023 of USD 4.45 million, cost per record being 165 dollars • Phishing or compromised creds(cloud misconfigurations or business email compromise) • Misconfigurations still remain a major concern and breach vector • Secrets mismanagement is a key pain-point for most organizations
  • 6. MODERN DAY APP BREAKDOWN The modern day app leverages newer delivery methods: • Containerization • Embracing the open source(Libraries, software etc) • Automation of infrastructure provisioning(Infrastructure as Code)
  • 7. CLOUD NATIVE APP BREACH POINTS Prisma-cloud
  • 8. THREAT MODELLING Threat modelling is the process of analysing various business and technical requirements of a system, identifying the potential threats, and documenting how vulnerable these threats make the system https://cloudsecurityalliance.org/artifacts/cloud-threat-modeling/
  • 9. THREAT MODELLING METHODOLOGIES We have different approaches to Threat Modelling depending on the CTI teams and Workloads • Asset-centric • Attacker-centric • Software-centric
  • 10. THREAT MODELLING YOUR CLOUD ENVIRONMENT Inventory Of Your Account -Determine what assets, data & resources are in your environment Understand Your Architecture -Understand your network topology, data flows Threat Profiling -Understand threats & vulnerabilities your environment might face Attack Surface Analysis -Identify Points of Entry for Attackers Risk Matrix & Mitigation -Create and update a risk matrix & mitigation list “Identify and prioritize risks using a threat model: Use a threat model to identify and maintain an up-to-date register of potential threats. Prioritize your threats and adapt your security controls to prevent, detect, and respond. Revisit and maintain this in the context of the evolving security landscape.”
  • 11. Do An Inventory Of Your Environment Have visibility over: • Organizational and personal accounts and their levels of access • Deployments: services and regions • Data: classification, Access, location, lifecycle management Asset management introduces Visibility • You know what(services) is running where(regions) You can't protect what you don’t know
  • 12. Understand your architecture Have visibility over: • Understand network and infra topologies to get what's supposed to public and strictly internal • Understand your Infrastructure flow and some decisions as to its current state • Understand your Data flows in relation to the app, services and IAM Asset management introduces Visibility • You know what(services) is running where(regions) "Know yourself and your enemy and you need not fear the outcome of a thousand battles"
  • 13. THREAT PROFILING https://cloudsecurityalliance.org/research/working-groups/top-threats/ A structured, repeatable process for determining relevant, prioritized cyber threats (adversaries, malware, & associated attack techniques), based on quantifiable evidence • Consider Organizational Context • Identify Relevant Threats • Quantify Threats • Proactive Defensive Action
  • 14. M I N D Y O U R AT TA C K S U R FA C E • Secrets: Credentials & api keys • Misconfigurations • Open/misconfigured blob storage • Public EBS snapshots • Android: hardcoded creds & misconfigured storage and firebase dbs
  • 15. Mind your attack surface: Initial access • Application code/code repo: Secrets: Credentials & api keys • Live Application: Misconfigurations ports, • Open/misconfigured blob storage • Public EBS & RDS • Android: hardcoded creds & misconfigured storage and firebase dbs
  • 16. Risk Matrix : Analyze, Manage & Mitigate • Continuous Logging & Monitoring • Proactive Security Guardrails with DevSecOps • Tailor Your Security Measures Accordingly. • Utilize CNAPPS to your Advantage. • Address Challenges and Acknowledge Issues Within Your Capabilities
  • 17. DEMO Have visibility over: • Understand network and infra topologies to get what's supposed to public and what's strictly internal • Understand your Infrastructure flow and some decisions as to its current state • Understand your Data flows in relation to the apps, services and IAM
  • 18. QA & Thanks Thanks For Listening FIN