SlideShare a Scribd company logo
11/7/2018 1www.secdata.com
F5 Networks
Bhavin Bhatt
Pre-Sales Consultant
November 2018
11/7/2018 2www.secdata.com
Ping of Death I Love You Worms
11/7/2018 3www.secdata.com
Take the Red Pill,
Secure your Cloud
Infrastructure
with industry
leading
technology and
expertise !!!
Take the Blue Pill
pretend you
know best and
are not a
potential target
!!!
11/7/2018 4www.secdata.com
SECUREDATA EUROPE & F5 NETWORKS
• F5 Network’s evolution.
• SecureData F5 Partner Status
• F5 Gold Partner
• F5 Guardian - Advanced Security Provider
• F5 Multi-Cloud Security.
@warburtr0n
f5labs.com
73%
HAVE A HYBRID
CLOUD STRATEGY
50%
OF ENTERPRISE
WORKLOADS MIGRATED TO
PUBLIC CLOUD BY 2018
8%
HAD NO INTEREST
IN CLOUD
OF ORGANISATIONS
USING PRIVATE CLOUD
66%
Multi-what now?
Multi-Cloud Complexity
Multi-Cloud Security Challenges
Operational
Agility
• Manual IT processes impede
developer’s agility needs
• Feature gaps in cloud native
services result in longer time
to value
• Basic native services tied
to each cloud provider
infrastructure
• Insufficient/basic security
services make apps more
vulnerable to attacks
• Inconsistent security services
increase compliance gaps
and audit risks
• No centralized method to
manage policy and enforce
compliance
• Poor cross-environment
visibility/analytics
• Lack of standardized and
common set of app
services result in
complexity and costs
• Disparate platforms and
toolsets exacerbate IT
skillset gaps and lead to
cloud lock-in
• Higher costs and inability to
scale with multiple different
app services to deploy and
maintain
APP SERVICES
ACCESS
TLS
DNS
NETWORK
CLIENT
THE APPLICATION
IS THE GATEWAY
TO DATA
Understand the
application
CLIENT
Man-in-the-browser
Session hijacking
Malware
Cross-site scripting
Cross-site request forgery
DNS hijacking
DNS spoofing
DNS cache poisoning
Man-in-the-middle
Dictionary attacks
DDoS
DNS
Eavesdropping
Protocol abuse
Man-in-the-middle
DDoS
NETWORK
Certificate spoofing
Protocol abuse
Session hijacking
Key disclosure
DDoS
TLS
Credential theft
Credential stuffing
Session hijacking
Brute force
Phishing
ACCESS
API attacks
Injection
Abuse of functionality
Man-in-the-middle
DDoS
Malware
Cross-site scripting
Cross-site request forgery
APP SERVICES
3%
11%
33%
53%
Other (VPN, PoS, infra.)
Physical
User / Identity
Web App Attacks
Web app
attacks are
the #1 single
source entry
point of
successful
data breaches…
Login
Form
UserID:
UserX
Password:
‘password’ OR 1=1
SQL DB
Risk
• Insufficiently sanitised or
un-escaped input data can
lead to unauthorised
command execution, data
exfiltration, or data deletion
• SQL injection is a classic
example
Successful
Authentication
of Internet traffic
is automated
of 2016 web application
breaches involved
the use of bots
98.6 million bots observed
Source: Internet Security Threat Report, Symantec, 2017
70
MILLION
427
MILLION
150
MILLION
3
BILLION
In the last 8 years more than 7.1 billion identities have been exposed in data breaches1
1) Symantec Internet Security Threat Report, April 2017
2) Password Statistics: The Bad, the Worse and the Ugly, Entrepreneur Media
117
MILLION
“Nearly 3 out of 4 consumers use duplicate passwords,
many of which have not been changed in five years or more”2
3 out of 4
~87%
Username == Password
Username Password
support support
root root
admin admin123
ubnt ubnt
usuario usuario
service service
pi raspberry
user user
guest guest
test test
mother f*****
supervisor supervisor
git git
0 0
ftp ftp
operator operator
oracle oracle
osmc osmc
ubuntu ubuntu
default 1
monitor monitor
postgres postgres
nagios nagios
1111 1111
api api
Username Password
10101 10101
dbadmin admin
butter xuelp123
ftpuser asteriskftp
PlcmSpIp PlcmSpIp
tomcat tomcat
hadoop hadoop
mysql mysql
vagrant vagrant
jenkins jenkins
www www
a a
apache apache
minecraft minecraft
testuser testuser
ts3 ts3
backup backup
vnc vnc
deploy deploy
odoo odoo
user1 user1
alex alex
zabbix zabbix
10101 10101
dbadmin admin
Top 50 Attacked Admin Creds
Username Password
root root
support support
admin admin123
ubnt ubnt
service service
usuario usuario
pi raspberry
user user
test test
guest guest
mother f*****
oracle oracle
operator operator
supervisor supervisor
ftp ftp
git git
ubuntu ubuntu
nagios nagios
postgres postgres
uucp uucp
Admin admin
ftpuser asteriskftp
Root
1234 <Any Pass>
Username Password
tomcat tomcat
PlcmSpIp PlcmSpIp
sshd sshd
monitor monitor
butter xuelp123
mysql mysql
hadoop hadoop
user1 user1
cisco cisco
vagrant vagrant
101 101
ts3 ts3
FILTERC*** FILTERC***
apache apache
telnet telnet
jenkins jenkins
Management TestingR2
www www
zabbix zabbix
backup backup
anonymous any@
a a
osmc osmc
tomcat tomcat
PlcmSpIp PlcmSpIp
Q3 2017 Q4 2017
USERNAME Credit Card
Data
USERNAME Intellectual
Property
USERNAME Healthcare
Data
USERNAME Passport
Data
USERNAME Financial
Data
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
USERNAME
Credentials from
Previous Breaches
Dave’s Serious 6
Data loss Insufficient Identity and
Access Management
Application and API
Vulnerabilities
Insufficient Due
Dilligence
Shared Technology
Vulnerabilities
Denial of Service
Insufficient Due
Dilligence
Shared Technology
Vulnerabilities
Application and API
Vulnerabilities
TomCat
Networking and Failover
Browser Apache
MySQL
DB
StroreFrontUI
Accounting
Service
Inventory
Service
Shipping
Service
NIC
NIC
NIC
NIC
NIC
NIC
NIC
NIC
Networking and Failover
Microservices & APIs
Remote
Service
Client
CDN
Service
Service
Service
Service
Microservices
Management
Service
Discovery
API
Gateway
Static
Content
Identity
Provider
Public IP
on ADC
Customers Adopting an Array of Solutions…
Applications
100%0%
Open Source WAFs and proxies,
if anything, for remaining on-
premises and (virtual) private
cloud apps
More complex,
higher TCO
Cloud-native
Application
architecture
BIG-IP for most
critical, highest
TCO applications
Public cloud WAFS and load
balancers for native public
cloud apps
WAF
WAFs protect against application attacks, mitigate application
vulnerabilities, and prevent data leakage
WAFs inspect traffic to block known bad traffic and allow legitimate traffic
WAF
Injection
Attacks
Cross Site
Scripting
Known App
Vulnerabilities
Payment Card
Information
Customer
Information
Critical
Apps
On-premises Cloud-based As-a-service
Multi-cloud Architecture Options
3.
User ID
Location
End point
Device health
2FA
Malware
Sensitive Data
Human
User ID
Location
End point
Device health
2FA
Malware
Sensitive Data
Human
High-Value App
Low-Value AppNorth Korea
Allow
Challenge
OTP
Client Cert.
Deny
Allow
Challenge
OTP
Client Cert.
Deny
UK
•
•
•
•
•
•
Strong Multifactor Auth
•
•
•
Control SaaS Apps
Proactive Bot Defence
Advanced WAF
Credential Protection
DDoS Defence
Client-side Integrity
Defence
API SecurityMobile App Security
Mobile
•
•
•
TLS
+
User = user
Password = 12345
088373be1 = lsdkwe9
0x8xb28 = pei57
App-layer encryption
v
Users
USERNAME F5 Advanced
WAF
AJAX JSON Support
Field name obfuscation
Field value encryption
Attackers
Bots
Stolen credentials
are encrypted and
cannot be re-used
No app
updates
required
Goes beyond TLS/SSL
Credential Protection
•
•
•
Reduces Cloud Costs
Network
Floods
Malformed
Requests
Scanners
and Bots
Known Bad
Hosts
Workflow
Enforcement
WAF
Reduces Cloud Costs
Unified Security
Dashboards
Reports and Alerts
Get a Unified View
of the Health of
your Security
Devices
Centralized Security Policies
– across Data Centers
across Clouds
Improve Compliance
with Enterprise-Wide
Audit Trails
Role-Based Management Manage and Distribute
Signatures
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Consistent Security Visibility Measurement
• For all apps
• For all APIs
• For all users
• On-prem
• Multi-cloud
• Protocols
• Encryption
• Traffic patterns
• Server health
• Credential misuse
• Client device behavior
Audit, report and alert on…
• Suspected attacks
• Inconsistent policies
• Performance and
attacks over time
• Consistent metrics
across cloud providers
Certification
• Recognised framework
• ISO, CSA, CISPE, etc
• Self-certification
• Due-diligence with CSA
Matrix
• Look for external
certification
11/7/2018 44www.secdata.com
F5 NETWORKS
• Summary
• Questions?

More Related Content

What's hot

Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
Zscaler
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
Zscaler
 
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...
BlueHat Security Conference
 
Cloudflare Speed Week Recap
Cloudflare Speed Week RecapCloudflare Speed Week Recap
Cloudflare Speed Week Recap
Cloudflare
 
Zero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOpsZero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOps
Araf Karsh Hamid
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
OneLogin
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South Africa
Cloudflare
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Cisco do Brasil
 
[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps
OWASP
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
Okta-Inc
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
Ping Identity
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
 
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019]  AST Platform and the importance of multi-layered application secu...[OPD 2019]  AST Platform and the importance of multi-layered application secu...
[OPD 2019] AST Platform and the importance of multi-layered application secu...
OWASP
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Ping Identity
 
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat Security Conference
 
Mobile App Hacking In A Nutshell
Mobile App Hacking In A NutshellMobile App Hacking In A Nutshell
Mobile App Hacking In A Nutshell
Prathan Phongthiproek
 
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
Netskope
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
Ping Identity
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CloudIDSummit
 

What's hot (20)

Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
 
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...
 
Cloudflare Speed Week Recap
Cloudflare Speed Week RecapCloudflare Speed Week Recap
Cloudflare Speed Week Recap
 
Zero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOpsZero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOps
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South Africa
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019]  AST Platform and the importance of multi-layered application secu...[OPD 2019]  AST Platform and the importance of multi-layered application secu...
[OPD 2019] AST Platform and the importance of multi-layered application secu...
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow up
 
Mobile App Hacking In A Nutshell
Mobile App Hacking In A NutshellMobile App Hacking In A Nutshell
Mobile App Hacking In A Nutshell
 
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 

Similar to Cloud Security Primer - F5 Networks

APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
apidays
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
Cloudflare
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
BeyondTrust
 
API security
API securityAPI security
API security
Eduards Salnikovs
 
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
NetworkCollaborators
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
Matteo Masi
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing presentJames Sutter
 
D3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceD3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients Performance
Imperva Incapsula
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
Mihajlo Prerad
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Adam Pennington
 
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
Ravinder Reddy Amanaganti
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
NetworkCollaborators
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
Ulf Mattsson
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
Cloudflare
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
Amazon Web Services
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
Cloudflare
 
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
Cloudflare
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
ssusera76ea9
 

Similar to Cloud Security Primer - F5 Networks (20)

APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
API security
API securityAPI security
API security
 
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
D3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceD3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients Performance
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
 
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 

More from Harry Gunns

Why understanding your attack surface matters
Why understanding your attack surface mattersWhy understanding your attack surface matters
Why understanding your attack surface matters
Harry Gunns
 
How major changes to the IT landscape are leading to new approaches in security
How major changes to the IT landscape are leading to new approaches in securityHow major changes to the IT landscape are leading to new approaches in security
How major changes to the IT landscape are leading to new approaches in security
Harry Gunns
 
Confusing the myths with some facts
Confusing the myths with some factsConfusing the myths with some facts
Confusing the myths with some facts
Harry Gunns
 
Weaponised Information - Geoff White
Weaponised Information - Geoff WhiteWeaponised Information - Geoff White
Weaponised Information - Geoff White
Harry Gunns
 
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Harry Gunns
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
Harry Gunns
 
Understanding your own data - Varonis
Understanding your own data - VaronisUnderstanding your own data - Varonis
Understanding your own data - Varonis
Harry Gunns
 
Smart security people - Dominic White - SensePost
Smart security people - Dominic White - SensePostSmart security people - Dominic White - SensePost
Smart security people - Dominic White - SensePost
Harry Gunns
 
Security Debt - Charl van der Walt - SecureData
Security Debt - Charl van der Walt - SecureDataSecurity Debt - Charl van der Walt - SecureData
Security Debt - Charl van der Walt - SecureData
Harry Gunns
 
Pick a password, any password - Wicus Ross - SensePost
Pick a password, any password - Wicus Ross - SensePostPick a password, any password - Wicus Ross - SensePost
Pick a password, any password - Wicus Ross - SensePost
Harry Gunns
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
Harry Gunns
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
Harry Gunns
 
Hacking our chairmans inbox - Charl van der Walt - SensePost
Hacking our chairmans inbox - Charl van der Walt - SensePostHacking our chairmans inbox - Charl van der Walt - SensePost
Hacking our chairmans inbox - Charl van der Walt - SensePost
Harry Gunns
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
Harry Gunns
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
Harry Gunns
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
Harry Gunns
 
AI & Machine Learning - Etienne Greeff - SecureData
AI & Machine Learning - Etienne Greeff - SecureDataAI & Machine Learning - Etienne Greeff - SecureData
AI & Machine Learning - Etienne Greeff - SecureData
Harry Gunns
 

More from Harry Gunns (17)

Why understanding your attack surface matters
Why understanding your attack surface mattersWhy understanding your attack surface matters
Why understanding your attack surface matters
 
How major changes to the IT landscape are leading to new approaches in security
How major changes to the IT landscape are leading to new approaches in securityHow major changes to the IT landscape are leading to new approaches in security
How major changes to the IT landscape are leading to new approaches in security
 
Confusing the myths with some facts
Confusing the myths with some factsConfusing the myths with some facts
Confusing the myths with some facts
 
Weaponised Information - Geoff White
Weaponised Information - Geoff WhiteWeaponised Information - Geoff White
Weaponised Information - Geoff White
 
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
 
Understanding your own data - Varonis
Understanding your own data - VaronisUnderstanding your own data - Varonis
Understanding your own data - Varonis
 
Smart security people - Dominic White - SensePost
Smart security people - Dominic White - SensePostSmart security people - Dominic White - SensePost
Smart security people - Dominic White - SensePost
 
Security Debt - Charl van der Walt - SecureData
Security Debt - Charl van der Walt - SecureDataSecurity Debt - Charl van der Walt - SecureData
Security Debt - Charl van der Walt - SecureData
 
Pick a password, any password - Wicus Ross - SensePost
Pick a password, any password - Wicus Ross - SensePostPick a password, any password - Wicus Ross - SensePost
Pick a password, any password - Wicus Ross - SensePost
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
 
Hacking our chairmans inbox - Charl van der Walt - SensePost
Hacking our chairmans inbox - Charl van der Walt - SensePostHacking our chairmans inbox - Charl van der Walt - SensePost
Hacking our chairmans inbox - Charl van der Walt - SensePost
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
AI & Machine Learning - Etienne Greeff - SecureData
AI & Machine Learning - Etienne Greeff - SecureDataAI & Machine Learning - Etienne Greeff - SecureData
AI & Machine Learning - Etienne Greeff - SecureData
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Cloud Security Primer - F5 Networks

  • 1. 11/7/2018 1www.secdata.com F5 Networks Bhavin Bhatt Pre-Sales Consultant November 2018
  • 2. 11/7/2018 2www.secdata.com Ping of Death I Love You Worms
  • 3. 11/7/2018 3www.secdata.com Take the Red Pill, Secure your Cloud Infrastructure with industry leading technology and expertise !!! Take the Blue Pill pretend you know best and are not a potential target !!!
  • 4. 11/7/2018 4www.secdata.com SECUREDATA EUROPE & F5 NETWORKS • F5 Network’s evolution. • SecureData F5 Partner Status • F5 Gold Partner • F5 Guardian - Advanced Security Provider • F5 Multi-Cloud Security.
  • 6. 73% HAVE A HYBRID CLOUD STRATEGY 50% OF ENTERPRISE WORKLOADS MIGRATED TO PUBLIC CLOUD BY 2018 8% HAD NO INTEREST IN CLOUD OF ORGANISATIONS USING PRIVATE CLOUD 66%
  • 9. Multi-Cloud Security Challenges Operational Agility • Manual IT processes impede developer’s agility needs • Feature gaps in cloud native services result in longer time to value • Basic native services tied to each cloud provider infrastructure • Insufficient/basic security services make apps more vulnerable to attacks • Inconsistent security services increase compliance gaps and audit risks • No centralized method to manage policy and enforce compliance • Poor cross-environment visibility/analytics • Lack of standardized and common set of app services result in complexity and costs • Disparate platforms and toolsets exacerbate IT skillset gaps and lead to cloud lock-in • Higher costs and inability to scale with multiple different app services to deploy and maintain
  • 10.
  • 11. APP SERVICES ACCESS TLS DNS NETWORK CLIENT THE APPLICATION IS THE GATEWAY TO DATA Understand the application
  • 12. CLIENT Man-in-the-browser Session hijacking Malware Cross-site scripting Cross-site request forgery DNS hijacking DNS spoofing DNS cache poisoning Man-in-the-middle Dictionary attacks DDoS DNS Eavesdropping Protocol abuse Man-in-the-middle DDoS NETWORK Certificate spoofing Protocol abuse Session hijacking Key disclosure DDoS TLS Credential theft Credential stuffing Session hijacking Brute force Phishing ACCESS API attacks Injection Abuse of functionality Man-in-the-middle DDoS Malware Cross-site scripting Cross-site request forgery APP SERVICES
  • 13. 3% 11% 33% 53% Other (VPN, PoS, infra.) Physical User / Identity Web App Attacks Web app attacks are the #1 single source entry point of successful data breaches…
  • 14. Login Form UserID: UserX Password: ‘password’ OR 1=1 SQL DB Risk • Insufficiently sanitised or un-escaped input data can lead to unauthorised command execution, data exfiltration, or data deletion • SQL injection is a classic example Successful Authentication
  • 15. of Internet traffic is automated of 2016 web application breaches involved the use of bots 98.6 million bots observed Source: Internet Security Threat Report, Symantec, 2017
  • 16. 70 MILLION 427 MILLION 150 MILLION 3 BILLION In the last 8 years more than 7.1 billion identities have been exposed in data breaches1 1) Symantec Internet Security Threat Report, April 2017 2) Password Statistics: The Bad, the Worse and the Ugly, Entrepreneur Media 117 MILLION “Nearly 3 out of 4 consumers use duplicate passwords, many of which have not been changed in five years or more”2 3 out of 4
  • 17. ~87% Username == Password Username Password support support root root admin admin123 ubnt ubnt usuario usuario service service pi raspberry user user guest guest test test mother f***** supervisor supervisor git git 0 0 ftp ftp operator operator oracle oracle osmc osmc ubuntu ubuntu default 1 monitor monitor postgres postgres nagios nagios 1111 1111 api api Username Password 10101 10101 dbadmin admin butter xuelp123 ftpuser asteriskftp PlcmSpIp PlcmSpIp tomcat tomcat hadoop hadoop mysql mysql vagrant vagrant jenkins jenkins www www a a apache apache minecraft minecraft testuser testuser ts3 ts3 backup backup vnc vnc deploy deploy odoo odoo user1 user1 alex alex zabbix zabbix 10101 10101 dbadmin admin Top 50 Attacked Admin Creds Username Password root root support support admin admin123 ubnt ubnt service service usuario usuario pi raspberry user user test test guest guest mother f***** oracle oracle operator operator supervisor supervisor ftp ftp git git ubuntu ubuntu nagios nagios postgres postgres uucp uucp Admin admin ftpuser asteriskftp Root 1234 <Any Pass> Username Password tomcat tomcat PlcmSpIp PlcmSpIp sshd sshd monitor monitor butter xuelp123 mysql mysql hadoop hadoop user1 user1 cisco cisco vagrant vagrant 101 101 ts3 ts3 FILTERC*** FILTERC*** apache apache telnet telnet jenkins jenkins Management TestingR2 www www zabbix zabbix backup backup anonymous any@ a a osmc osmc tomcat tomcat PlcmSpIp PlcmSpIp Q3 2017 Q4 2017
  • 18. USERNAME Credit Card Data USERNAME Intellectual Property USERNAME Healthcare Data USERNAME Passport Data USERNAME Financial Data USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME USERNAME Credentials from Previous Breaches
  • 19.
  • 20. Dave’s Serious 6 Data loss Insufficient Identity and Access Management Application and API Vulnerabilities Insufficient Due Dilligence Shared Technology Vulnerabilities Denial of Service Insufficient Due Dilligence Shared Technology Vulnerabilities Application and API Vulnerabilities
  • 21. TomCat Networking and Failover Browser Apache MySQL DB StroreFrontUI Accounting Service Inventory Service Shipping Service
  • 25. Customers Adopting an Array of Solutions… Applications 100%0% Open Source WAFs and proxies, if anything, for remaining on- premises and (virtual) private cloud apps More complex, higher TCO Cloud-native Application architecture BIG-IP for most critical, highest TCO applications Public cloud WAFS and load balancers for native public cloud apps
  • 26. WAF WAFs protect against application attacks, mitigate application vulnerabilities, and prevent data leakage WAFs inspect traffic to block known bad traffic and allow legitimate traffic
  • 27. WAF Injection Attacks Cross Site Scripting Known App Vulnerabilities Payment Card Information Customer Information Critical Apps On-premises Cloud-based As-a-service
  • 28.
  • 29.
  • 31. User ID Location End point Device health 2FA Malware Sensitive Data Human User ID Location End point Device health 2FA Malware Sensitive Data Human High-Value App Low-Value AppNorth Korea Allow Challenge OTP Client Cert. Deny Allow Challenge OTP Client Cert. Deny UK • • •
  • 34. Proactive Bot Defence Advanced WAF Credential Protection DDoS Defence Client-side Integrity Defence API SecurityMobile App Security Mobile • • •
  • 35. TLS + User = user Password = 12345 088373be1 = lsdkwe9 0x8xb28 = pei57 App-layer encryption v Users USERNAME F5 Advanced WAF AJAX JSON Support Field name obfuscation Field value encryption Attackers Bots Stolen credentials are encrypted and cannot be re-used No app updates required Goes beyond TLS/SSL Credential Protection • • •
  • 38. Unified Security Dashboards Reports and Alerts Get a Unified View of the Health of your Security Devices Centralized Security Policies – across Data Centers across Clouds Improve Compliance with Enterprise-Wide Audit Trails Role-Based Management Manage and Distribute Signatures • • • •
  • 40.
  • 42. Consistent Security Visibility Measurement • For all apps • For all APIs • For all users • On-prem • Multi-cloud • Protocols • Encryption • Traffic patterns • Server health • Credential misuse • Client device behavior Audit, report and alert on… • Suspected attacks • Inconsistent policies • Performance and attacks over time • Consistent metrics across cloud providers Certification • Recognised framework • ISO, CSA, CISPE, etc • Self-certification • Due-diligence with CSA Matrix • Look for external certification
  • 43.