The document discusses security practices and principles for cloud computing. It argues that the cloud provides opportunities to simplify security through automation and centralization of controls. By understanding the basic primitives of computing in the cloud (I/O, memory, storage, compute, code, data, access controls, interfaces), security professionals can design infrastructure that achieves minimalism, full default deny access, and emergent security through infrastructure coded as software rather than physical hardware.
Journey from Monolith to a Modularized Application - Approach and Key Learnin...mfrancis
OSGi Community Event 2017 Presentation by Emanoel Xavier (Intel) and Tim Ward (Paremus)
Open Security Controller (OSC) aims to increase the security of workloads running in cloud and data centers by orchestrating security virtual network functions (VNFs). To achieve that, one of the main design goals of OSC is to allow vendor customization while keeping its core code neutral. Additionally, as an open source project, another import design principal for OSC is code habitability. Evolving from a legacy monolithic application to a modularized one through OSGi has enabled OSC to implement these goals.
Bringing together a diverse group of security services and software defined network (SDN) providers was key to building the OSC community. This was possible due to the OSC plugin model using OSGi which allows specific vendors to integrate OSC with their existing solutions with minimum effort. Beyond its plugin model OSC also makes use of OSGi in its core components. This enables better extensibility, testability and overall maintainability of its code base. These aspects are key to OSC as it relates to the new and dynamic areas of SDN and security VNFs in cloud and data center environments and it must be able to easily adapt to the constantly changing requirements and technologies pertaining these fields.
In this talk we will explore the journey for turning OSC into a modularized application using OSGi, highlighting some of the achieved results, key learned lessons and the next steps for this work.
https://www.opensecuritycontroller.org/
Journey from Monolith to a Modularized Application - Approach and Key Learnin...mfrancis
OSGi Community Event 2017 Presentation by Emanoel Xavier (Intel) and Tim Ward (Paremus)
Open Security Controller (OSC) aims to increase the security of workloads running in cloud and data centers by orchestrating security virtual network functions (VNFs). To achieve that, one of the main design goals of OSC is to allow vendor customization while keeping its core code neutral. Additionally, as an open source project, another import design principal for OSC is code habitability. Evolving from a legacy monolithic application to a modularized one through OSGi has enabled OSC to implement these goals.
Bringing together a diverse group of security services and software defined network (SDN) providers was key to building the OSC community. This was possible due to the OSC plugin model using OSGi which allows specific vendors to integrate OSC with their existing solutions with minimum effort. Beyond its plugin model OSC also makes use of OSGi in its core components. This enables better extensibility, testability and overall maintainability of its code base. These aspects are key to OSC as it relates to the new and dynamic areas of SDN and security VNFs in cloud and data center environments and it must be able to easily adapt to the constantly changing requirements and technologies pertaining these fields.
In this talk we will explore the journey for turning OSC into a modularized application using OSGi, highlighting some of the achieved results, key learned lessons and the next steps for this work.
https://www.opensecuritycontroller.org/
SOC Meets Cloud: What Breaks, What Changes, What to Do?Anton Chuvakin
SOC Meets Cloud: What Breaks, What Changes, What to Do?
originally presented at Mandiant mWise 2023 by Dr Anton Chuvakin of Google Cloud Office of the CISO
Cloud changes everything (does it though?), including how we do threat detection and incident response in the SOC. As we continue to transform our attack surfaces, how do we make sure our detection and response are done "the cloud way"? There were also cases where both business and IT migrated to the cloud, but security was left behind and had to approach cloud challenges with on-premise tools and practices. How should a SOC born before cloud deal with cloud? What to watch for? What changes? What breaks? What stays the same?
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications and a hundred identical safes with their combinations so that the world’s best safecrackers can study it and you still can’t open the safe, that’s security.
Business applications like ERP, CRM, SRM, and others are one of the major topic of information security as these applications store business-critical data and any vulnerability in them can cause a significant monetary and reputational loss or even stoppage of business.
There are several myths about Business Applications Security such as:
Myth 1: Business Applications are available only internally.
Myth 2: ERP security is a vendors' problem.
Myth 3: Business Application internals are very specific and unknown to hackers.
Myth 4 ERP security is all about Segregation Of Duties.
Our findings explode these myths.
On your marks, get set GO!
Take a more in-depth look at the automation and orchestration journey and the future of SOAR.
Watch the SOCtails video here: https://www.youtube.com/watch?v=YzsGQzqaDYw&t=2s
Your Thing is Pwned - Security Challenges for the IoTWSO2
The Internet of Things and Machine to Machine are growing areas, and security and privacy are prime issues. In this session security challenges are examined around using M2M devices with protocols such as MQTT & CoAP - encryption, federated identity and authorisation models in particular.
On the topic of encryption, we’ll examine securing MQTT with TLS, challenges with Arduino, and using hardware encryption for microcontrollers. A key privacy requirement for user-centric IoT use cases will be giving users control over how their things collect and share data. On the Internet, protocols like OAuth 2.0, OpenID Connect & User Managed Access have been defined to enable a privacy-respecting user consent & authorization model. We'll look at the issues with applying these protocols to the M2M world and review existing proposals & activity for extending the above M2M protocols to include federated identity concepts.
The session included a live demonstration of Arduino and Eclipse Paho inter-operating secured by OAuth 2.0.
Lessons learned to keep cholesterol on proper level base on private cloud pr...Robert Bigos
Complicated IT is like bad cholesterol. Lessons
learned to keep cholesterol on proper level base on private cloud projects. My IBM Pulse2014 presentation.
Why the cloud is more secure than your existing systemsErnest Mueller
Talk presented by Ernest Mueller at LASCON 2010 on cloud computing security and why it's likely that the cloud is more secure than what you're doing right now.
You’ve probably heard the statement that there is no cloud, there’s just somebody else’s computer. How can we monitor what we don’t own?
Developers and operations teams are increasingly relying on cloud providers to manage and operate their infrastructure. While this can offer many benefits, it also presents new challenges when it comes to observability. In this talk, we’ll explore the unique challenges of observability in a cloud-native environment, and discuss some best practices for ensuring that you can effectively monitor and troubleshoot your applications, even when you don’t have direct access to the underlying infrastructure.
We’ll begin by discussing the basic principles of observability in a cloud-native context, including the importance of monitoring not just the application itself, but also the underlying infrastructure and the interactions between different components. We’ll then explore some common challenges that can arise when it comes to observability in a cloud-native environment, including issues with data access and the need to deal with large volumes of data from multiple sources.
We’ll also discuss some practical strategies for addressing these challenges, including the use of cloud-native observability tools such as Kubernetes metrics and logging frameworks, as well as best practices for configuring and deploying these tools effectively. We’ll also explore the role of observability in incident response and how it can help teams quickly diagnose and resolve issues in a cloud-native environment.
Whether you’re just getting started with cloud-native observability or you’re looking to take your observability practices to the next level, this talk will provide valuable insights and practical tips for ensuring that you can effectively monitor and troubleshoot your applications, even when they’re running on somebody else’s computer.
Chapter 5Overview of SecurityTechnologiesWe can’t hWilheminaRossi174
Chapter 5
Overview of Security
Technologies
“We can’t help everyone, but everyone can help someone.” —Ronald Reagan
This chapter discusses the use of technologies that have evolved to support and enhance
network security. Many of these technologies are used today without the user under-
standing when or where they operate. After reading this chapter, you will understand the
benefits of these technologies, where they operate, and some of the operational risks
associated with them. By the end of this chapter, you should know and be able to explain
the following:
■ How you can employ packet filtering to reduce threats to a network
■ Understand precisely what stateful packet inspection is, and why its important for
firewalls to use this technique
■ The role and placement of a proxy technology within a secure network
■ Network Address Translation (NAT) and how you can use it to allow the Internet to
continue to grow in IPv4
■ How Public Key Infrastructure (PKI) has the potential to protect the flow of informa-
tion in a global manner
Answering these key questions and understand the concepts behind them will enable you
to understand the overall characteristics and importance of the security technologies cov-
ered in this chapter. By the time you finish this book, you will have a solid appreciation for
network security, its issues, how it works, and why it is important.
So far, this book has painted in broad strokes the steps an attacker could possibly take to
gain access to sensitive resources. The first step in protecting these assets is the global
security policy created by combining the many aspects discussed in Chapter 2, “Security
Policies.” This chapter introduces some of the more broadly used security technologies.
Each of these technologies contains a concept or specific role that increases the security
of your network when designed and implemented in a layered design.
128 Network Security First-Step
Security First Design Concepts
Network security can be a hydra (many-headed beast) with regard to potential attacks and
threats against the network. The resources and opinions on this subject are incredible, and
opinions vary greatly depending on whom you ask. For example, in 2004 when I wrote the
first edition of this book, a simple Google search on “designing a secure network”
returned almost half a million results. In 2012, that same search string returns more than
five and a quarter million hits. It is no wonder that conflicting security concepts bombard
people, causing a great deal of confusion. To be honest, if you were to look up network
security books, any bookstore also reveals almost as many!
The point is that experts in each area of network design have written so much on design-
ing secure network architecture that to try to do the subject justice here is beyond the
scope of this book. Books and websites deal with every aspect of network security, server
security, application security, and so forth. We endeavor to prov ...
What frameworks can do for you – and what not (IPC14 SE)Robert Lemke
Companies often choose frameworks by the same criteria – which is popularity, documentation and matureness. And speed of course. Or only speed. But even if you found the "perfect" framework, what can you actually expect from it? And what are marketing promises even the best framework won't be able to deliver? From the perspective of someone who started an open source framework years ago I'll share my idea of where frameworks differ, where frameworks can help you and why engaging with one is unlike just buying a product.
SOC Meets Cloud: What Breaks, What Changes, What to Do?Anton Chuvakin
SOC Meets Cloud: What Breaks, What Changes, What to Do?
originally presented at Mandiant mWise 2023 by Dr Anton Chuvakin of Google Cloud Office of the CISO
Cloud changes everything (does it though?), including how we do threat detection and incident response in the SOC. As we continue to transform our attack surfaces, how do we make sure our detection and response are done "the cloud way"? There were also cases where both business and IT migrated to the cloud, but security was left behind and had to approach cloud challenges with on-premise tools and practices. How should a SOC born before cloud deal with cloud? What to watch for? What changes? What breaks? What stays the same?
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications and a hundred identical safes with their combinations so that the world’s best safecrackers can study it and you still can’t open the safe, that’s security.
Business applications like ERP, CRM, SRM, and others are one of the major topic of information security as these applications store business-critical data and any vulnerability in them can cause a significant monetary and reputational loss or even stoppage of business.
There are several myths about Business Applications Security such as:
Myth 1: Business Applications are available only internally.
Myth 2: ERP security is a vendors' problem.
Myth 3: Business Application internals are very specific and unknown to hackers.
Myth 4 ERP security is all about Segregation Of Duties.
Our findings explode these myths.
On your marks, get set GO!
Take a more in-depth look at the automation and orchestration journey and the future of SOAR.
Watch the SOCtails video here: https://www.youtube.com/watch?v=YzsGQzqaDYw&t=2s
Your Thing is Pwned - Security Challenges for the IoTWSO2
The Internet of Things and Machine to Machine are growing areas, and security and privacy are prime issues. In this session security challenges are examined around using M2M devices with protocols such as MQTT & CoAP - encryption, federated identity and authorisation models in particular.
On the topic of encryption, we’ll examine securing MQTT with TLS, challenges with Arduino, and using hardware encryption for microcontrollers. A key privacy requirement for user-centric IoT use cases will be giving users control over how their things collect and share data. On the Internet, protocols like OAuth 2.0, OpenID Connect & User Managed Access have been defined to enable a privacy-respecting user consent & authorization model. We'll look at the issues with applying these protocols to the M2M world and review existing proposals & activity for extending the above M2M protocols to include federated identity concepts.
The session included a live demonstration of Arduino and Eclipse Paho inter-operating secured by OAuth 2.0.
Lessons learned to keep cholesterol on proper level base on private cloud pr...Robert Bigos
Complicated IT is like bad cholesterol. Lessons
learned to keep cholesterol on proper level base on private cloud projects. My IBM Pulse2014 presentation.
Why the cloud is more secure than your existing systemsErnest Mueller
Talk presented by Ernest Mueller at LASCON 2010 on cloud computing security and why it's likely that the cloud is more secure than what you're doing right now.
You’ve probably heard the statement that there is no cloud, there’s just somebody else’s computer. How can we monitor what we don’t own?
Developers and operations teams are increasingly relying on cloud providers to manage and operate their infrastructure. While this can offer many benefits, it also presents new challenges when it comes to observability. In this talk, we’ll explore the unique challenges of observability in a cloud-native environment, and discuss some best practices for ensuring that you can effectively monitor and troubleshoot your applications, even when you don’t have direct access to the underlying infrastructure.
We’ll begin by discussing the basic principles of observability in a cloud-native context, including the importance of monitoring not just the application itself, but also the underlying infrastructure and the interactions between different components. We’ll then explore some common challenges that can arise when it comes to observability in a cloud-native environment, including issues with data access and the need to deal with large volumes of data from multiple sources.
We’ll also discuss some practical strategies for addressing these challenges, including the use of cloud-native observability tools such as Kubernetes metrics and logging frameworks, as well as best practices for configuring and deploying these tools effectively. We’ll also explore the role of observability in incident response and how it can help teams quickly diagnose and resolve issues in a cloud-native environment.
Whether you’re just getting started with cloud-native observability or you’re looking to take your observability practices to the next level, this talk will provide valuable insights and practical tips for ensuring that you can effectively monitor and troubleshoot your applications, even when they’re running on somebody else’s computer.
Chapter 5Overview of SecurityTechnologiesWe can’t hWilheminaRossi174
Chapter 5
Overview of Security
Technologies
“We can’t help everyone, but everyone can help someone.” —Ronald Reagan
This chapter discusses the use of technologies that have evolved to support and enhance
network security. Many of these technologies are used today without the user under-
standing when or where they operate. After reading this chapter, you will understand the
benefits of these technologies, where they operate, and some of the operational risks
associated with them. By the end of this chapter, you should know and be able to explain
the following:
■ How you can employ packet filtering to reduce threats to a network
■ Understand precisely what stateful packet inspection is, and why its important for
firewalls to use this technique
■ The role and placement of a proxy technology within a secure network
■ Network Address Translation (NAT) and how you can use it to allow the Internet to
continue to grow in IPv4
■ How Public Key Infrastructure (PKI) has the potential to protect the flow of informa-
tion in a global manner
Answering these key questions and understand the concepts behind them will enable you
to understand the overall characteristics and importance of the security technologies cov-
ered in this chapter. By the time you finish this book, you will have a solid appreciation for
network security, its issues, how it works, and why it is important.
So far, this book has painted in broad strokes the steps an attacker could possibly take to
gain access to sensitive resources. The first step in protecting these assets is the global
security policy created by combining the many aspects discussed in Chapter 2, “Security
Policies.” This chapter introduces some of the more broadly used security technologies.
Each of these technologies contains a concept or specific role that increases the security
of your network when designed and implemented in a layered design.
128 Network Security First-Step
Security First Design Concepts
Network security can be a hydra (many-headed beast) with regard to potential attacks and
threats against the network. The resources and opinions on this subject are incredible, and
opinions vary greatly depending on whom you ask. For example, in 2004 when I wrote the
first edition of this book, a simple Google search on “designing a secure network”
returned almost half a million results. In 2012, that same search string returns more than
five and a quarter million hits. It is no wonder that conflicting security concepts bombard
people, causing a great deal of confusion. To be honest, if you were to look up network
security books, any bookstore also reveals almost as many!
The point is that experts in each area of network design have written so much on design-
ing secure network architecture that to try to do the subject justice here is beyond the
scope of this book. Books and websites deal with every aspect of network security, server
security, application security, and so forth. We endeavor to prov ...
What frameworks can do for you – and what not (IPC14 SE)Robert Lemke
Companies often choose frameworks by the same criteria – which is popularity, documentation and matureness. And speed of course. Or only speed. But even if you found the "perfect" framework, what can you actually expect from it? And what are marketing promises even the best framework won't be able to deliver? From the perspective of someone who started an open source framework years ago I'll share my idea of where frameworks differ, where frameworks can help you and why engaging with one is unlike just buying a product.
Similar to Cloud Security Practices and Principles (20)
Sumo Logic Cert Jam - Security AnalyticsSumo Logic
With security threats on the rise, come join our Security and Compliance experts to learn how Sumo Logic’s Threat Intelligence can help you stay on top of your environment by matching IOCs like IP address, domain names, URL, email addresses, MD5 hashes and more, to increase velocity and accuracy of threat detection. Hands on labs help cement the knowledge learned.
Designed for Sumo Administrators, this course shows you how to set up your data collection according to your organization’s data sources. Best practices around deployment options ensure you choose a deployment that scales as your organization grows. Because metadata is so important to a healthy environment, learn how to design and set up a naming convention that works best for your teams. Use Chef, Puppet or the likes? Learn how to automate your deployment. Test your deployment with simple searches, and learn to take advantage of optimization tools that can help you stay on top of your deployment.
Designed for all Sumo users, this series deep-dives into every aspect of analyzing your data. Run as a "how-to" webinar, this session walks viewers through data searching, filtering, parsing, and advanced analytics. This series concludes with "how to"details to create dashboards and alerts to monitor your data and get Sumo Logic to work for you.
Brand new to Sumo Logic? Get started with these 5 easy steps and get certified!
Learn the basics for how to search, parse and analyze the logs and metrics that are important to your organization. This session will guide you through running searches, simple parsing and basic analytics on your data. Learn how to convert your queries to charts and add them to Dashboards to help you visualize trends and easily identify anomalies. Lastly, learn how Alerts can help you stay on top of your critical events.
Security Certification: Security Analytics using Sumo Logic - Oct 2018Sumo Logic
Get Certified as a Sumo Security Power User!
With security threats on the rise, come join our Security and Compliance experts to learn how Sumo Logic’s Threat Intelligence can help you stay on top of your environment by matching IOCs like IP address, domain names, URL, email addresses, MD5 hashes and more, to increase velocity and accuracy of threat detection. Hands on labs help cement the knowledge learned.
Level 3 Certification: Setting up Sumo Logic - Oct 2018Sumo Logic
Get Certified as a Sumo Power Admin!
Designed for Administrators, this course shows you how to set up your data collection according to your organization’s data sources. Best practices around deployment options ensure you choose a deployment that scales as your organization grows. Because metadata is so important to a healthy environment, learn how to design and set up a naming convention that works best for your teams. Use Chef, Puppet or the likes? Learn how to automate your deployment. Test your deployment with simple searches, and learn to take advantage of optimization tools that can help you stay on top of your deployment.
Level 2 Certification: Using Sumo Logic - Oct 2018Sumo Logic
Get Certified as a Sumo Power User!
Designed for users, this series deep-dives into every aspect of analyzing your data. Run as a "how-to" webinar, this session walks viewers through data searching, filtering, parsing, and advanced analytics. This series concludes with "how to"details to create dashboards and alerts to monitor your data and get Sumo Logic to work for you.
Get Certified as a Sumo Power User!
Video: Video: https://www.sumologic.com/online-training/#Start
Designed for users, this series deep-dives into every aspect of analyzing your data. Run as a "how-to" webinar, this session walks viewers through data searching, filtering, parsing, and advanced analytics. This series concludes with "how to"details to create dashboards and alerts to monitor your data and get Sumo Logic to work for you.
Sumo Logic QuickStart Webinar - Get CertifiedSumo Logic
Video: https://www.sumologic.com/online-training/#start
Brand new to Sumo Logic?
Get started with these 5 easy steps. Learn how to capitalize on critical capabilities that can amplify your log analytics and monitoring experience while providing you with meaningful business and IT insights.
You Build It, You Secure It: Introduction to DevSecOpsSumo Logic
In this presentation, DevOps and DevSecOps expert John Willis dives into how to implement DevSecOps, including:
- Why traditional DevOps has shifted and what this shift means
- How DevSecOps can change the game for your team
- Tips and tricks for getting DevSecOps started within your organization
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic WebinarSumo Logic
In this webinar, Sumo Logic VP of Security and Compliance George Gerchow dives into how to make the shift to DevSecOps, discussing how to:
- Incorporate fundamental and high impact security best practices into your current DevOps operations
- Gain visibility into your compliance posture
- Identify potential risks and threats in your environments
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
2. ! An
opportunity
to
simplify
and
increase
security
! Misunderstood
! A
vic0m
of
FUD
– Take
0me
to
examine
it?
– Or
DOOM?
! Fearing
what
you
do
not
understand
is
reasonable
from
an
IT
perspec9ve.
But
this
is
worth
the
9me
to
understand.
The
Public
Cloud
Is:
Sumo
Logic
Confiden0al
2
3. ! You
have
people
on
your
staff
who
know
way
too
much
about
waMage,
and
BTUs
and
rack
density
and
how
raised,
exactly,
the
floor
needs
to
be
! So
you
think
in
certain
ways:
– Hardware
rotates
and
depreciates
on
a
fixed
36-‐month
cycle
– This
is
the
mix
of
RAM,
Disk,
and
CPU
I
have
to
work
with
– This
is
how
many
waMs
we've
got
– And
this
is
the
bandwidth
capacity
of
the
datacenter
The
Old
World
Sumo
Logic
Confiden0al
3
4. ! Trying
to
insert
yourself
in
the
process
run
by
ping
power
and
pipe
guys
! Dealing
with
span
ports
! Dealing
with
legacy
compromises
and
legacy
infrastructure
that
no
longer
matches
your
security
requirements…
! And
probably
never
did
! We
do
lots
of
things
in
this
business
where
we
transit
public
space,
and
we
take
steps
to
secure
that
transit
Where
Does
This
Leave
You?
Sumo
Logic
Confiden0al
4
5. ! Cloud
compu0ng
is
truly
a
different
paradigm
with
different
rules
and
different
logic
A
New
World
Sumo
Logic
Confiden0al
5
The
Old
World
Cloud
Compu9ng
Precise
Control
Sta0s0cs
Scripts
and
Capacity
Planning
Spreadsheets
Feedback
Loops/Auto-‐scaling
36-‐month
Refresh
Cycles
Bids
for
Spot
Instances
Physical
Control
Process,
Automa0on,
Design
6. ! What
security
professionals
are
looking
for
is
control
! You
can
achieve
control
in
the
cloud,
by
playing
a
new
game
! “The
highest
form
of
generalship
is
to
thwart
your
enemies
plans.”
–Sun
Tzu
But
The
FUD!
Sumo
Logic
Confiden0al
6
7. ! Not
needing
to
regularly
review
firewall
rule
ordering
as
part
of
your
opera0onal
process,
as
one
example
! Instrument
! Gather
data
! Design
your
rules
! Iterate
from
the
whiteboard
! Not
a
live
firewall
console
! For
instance
J
What’s
In
It
For
Me?
Sumo
Logic
Confiden0al
7
8. ! In
the
cloud
you
have
the
tools
to
design,
implement
and
refine
your
policies,
controls
and
enforcement
in
a
centralized
fashion
! Your
code
is
your
infrastructure
! Your
SDLC
can
now
be
brought
to
bear
on
areas
tradi0onally
out-‐of-‐sync
with
your
security
posture
! Scale
to
massive
sizes
without
having
to
worry
about
things
like
firewall
rule
ordering,
op0miza0on
or
audit
as
part
of
your
opera0onal
cycle
! Your
security
will
become
fractal,
and
embedded
in
every
layer
of
your
system.
Design
Design
Design
Sumo
Logic
Confiden0al
8
9. ! What
are
your
primi0ves?
! I/O,
Memory,
Storage,
Compute,
and
Code
! Data
– At
Rest,
in
Mo0on,
and
in
Use
! Access
control
– Monitoring
tools,
third-‐party
apps,
troubleshoo0ng
tools
! Interfaces/APIs
– Clean,
Minimal,
Authen0cated,
Validated
The
Primi0ves
Sumo
Logic
Confiden0al
9
10. ! Each
of
those
must
be
thought
of
on
its
own
and
in
combina0on
with
the
other
components
it
interacts
with
! It
is
both
that
simple
and
that
complicated.
Minimalism
Sumo
Logic
Confiden0al
10
11. ! That
simplicity
gives
you
the
power
to
understand
everything
! Every
protocol
! Every
interface
! If
you
want
to
achieve
true
and
full
Default
Deny
on
everything,
everywhere,
this
is
where
it
starts
! Understand
your
state
changes
! Bring
that
understanding
to
bear
through
development
! And
you
can
aMain
Emergent
Security
Understand
Everything
Sumo
Logic
Confiden0al
11
12. ! Your
en0re
infrastructure
is
your
code-‐base
! There
is
no
gap
between
the
opera0onal
physical
layer
and
the
sojware
that
runs
on
top
of
it.
! Machine
and
network
failures
are
just
excep0ons
to
be
caught
and
handled
! Your
infrastructure
can
now
evolve
and
support
your
system
! because
it
is
the
system
With
Automa0on,
All
Things
are
Possible
Sumo
Logic
Confiden0al
12
13. ! Register
all
of
your
VMs
services,
IPs,
and
ports
! Automa0cally
build
firewall
policies
based
on
that
! Re-‐build
and
distribute
ssl/tls
keys
! Whenever
you
want
! HIDS,
HFW
and
File
Integrity
Checkers
configured
with
instance
tags
! Unit
test
everything
! Allowing
security
to
keep
up
with
your
product
Like
What?
Sumo
Logic
Confiden0al
13
14. ! You
know…
like
we
do…
on
the
Internet
;)
! At
rest
and
in
mo0on.
! Any
data
that
is
ephemeral
can
be
kept
on
encrypted
ephemeral
storage
with
keys
can
simply
be
kept
in
memory.
– When
the
instance
dies,
the
key
dies
with
it.
! Longer-‐lived
data
should
be
stored
away
from
the
keys
that
secure
it
– If
the
data
is
par0cularly
sensi0ve,
Securely
wipe
the
data
before
spinning
down
the
disk
and
giving
it
back
to
the
pool
Encrypt
It
All
Sumo
Logic
Confiden0al
14
15. ! Allow
only
expected
connec0ons
! Front-‐end
web-‐applica0ons
need
to
accept
connec0ons
from
anyone
in
the
world
– (but
it's
more
likely
only
your
load
balancer
does)
! As
part
of
your
infrastructure
as
sojware
design
– Know
what
needs
to
talk
to
what
• on
what
port
and
under
what
circumstances,
– And
only
allow
that,
• everything
else
is
bit-‐bucketed
and
alerted
on.
! In
sojware-‐driven
cloud-‐based
deployments,
there
is
no
longer
any
excuse
for
any
other
way
of
doing
it
Default
Deny
Nirvana
Sumo
Logic
Confiden0al
15
16. ! The
public
u0lity
model
of
cloud
compu0ng
brings
substan0al
advantages
of
scalability
and
automa0on
which
can
be
leveraged
by
informa0on
security
professionals
! As
a
result,
a
more
secure
service
can
be
built
on
the
public
cloud
for
less
investment
than
in
a
tradi0onal
data
center
! Just
remember
your
fundamentals
! And
always
shoot
the
messenger
Conclusion
Sumo
Logic
Confiden0al
16
17. ! Download
our
white
paper,
Building
Secure
Services
in
the
Cloud:
www.sumologic.com/resources/
! Register
for
Sumo
Logic
Free
www.freesumo.com
! Contact
joan@sumologic.com
or
info@sumologic.com
Q&A
and
Next
Steps
Sumo
Logic
Confiden0al
17