SlideShare a Scribd company logo
Multi-Cloud
SECURITY & COMPLIANCE
GOVERNANCE & BEST PRACTICES
• Kamran Mehboob
• Dir of Product Management
Security & Compliance
Meet Our Speakers
What we will learn today?
• What to govern in a multi cloud?
• Governance best practices
• Where and how to to start
• CIS control for all clouds
• Cloudnosys Security & Compliance Platform
• Q & A
Why even have a Multi Cloud Strategy
1. 85% of Enterprises now have Multi-Cloud
Strategy for Public Clouds. McKinsey, Forrester,
Gartner
2. Merger and Acquisions forcing companies to
quickly develop a model to govern and effectively
manage acquired company’s Cloud footprint.
3. Technology, Costs and Talent
Multi-Cloud is the new norm
Cloud COE Governance Core Focus
Areas
1. Security and Compliance (Today’s session focus)
2. Financial – Cost Control (Utilization, Capacity, Reserve
Instances, Tagging – FinOps.org)
3. Performance Management – (Machine Metrics, RightSizing,
APM)
Build : Automation, Enforcement and Self Healing Cloud
What are the common threads to Govern
security for Public Clouds at Scale?
1. Software define infrastructure controls – Core
2. Mostly process and technology automation – Very little People
Governance = Configurations + Collaboration + Enforcement + Self healing
Cloud Velocity requires Automations
Cannot humanly see or govern thousands of
configurations everyday and fix them!
• Need compliance framework control testing
• Need continuous monitoring & automation
• Need DevSecOps Governance for CI/CD automation
Security Governance for Public Clouds
1. Build a set of granular Corporate policies for Security and
Compliance configurations and OS levels for all cloud
services (Firewalls, Access, Encryption, IAM and more)
2. Enforcement of Policies in near time and analyzing any
additions or changes to existing cloud configuration services.
3. Monitor and measure risks continually then either allow or
deny services requests for out of policy actions
Invest in open source and commercial tools to deliver a 360 view
of all cloud assets running globally in a single pane of glass.
Key Focus areas to reach Scale on
Governance
1. Visibility - Considerable attention to Visibility and Change in
your Cloud services
2. Speed - Increase speed by “continues delivery or monitor
changes” Reduce human intervention
3. Self Healing – Fix the problems before they go into
production and while in production fix on the fly via
automation.
4. Leverage Partners and Vendors to understand what “Good”
looks like. You don’t have to build it yourself
Start here but end with a 360 view of all
cloud policies and risks?
AWS Azure GCP
Configuration
Management Config, CFT
Azure Policy, Azure
Security Center (ASC)
Configuration Mngt,
Anthos, Forseti
OS Management Inspector ASC
Security Command
Center (SCC) (in
beta)
Log Management
GuardDuty,
WatchTower ASC StackDriver
Automation - Self Healing Lambda Azure Functions GCP Functions
Monitoring PII Data usage
in DB Macie
MS Information
Protection DLP - SCC
Risk Management none none none
Best Practice Policies CIS CIS CIS
How to build, manage and enforce
Policies at scale in addition
understand risks?
1- CIS First
2- Custom Signatures
3- Automation
My budget is Zero and we have no time
• The Center for Internet Security is a non-profit entity
that harnesses the power of a global IT community to
safeguard private and public organizations against
cyber threats.
• CIS AWS Benchmarks
44 AWS Controls
• CIS - OS hardening & AWS
Configurations
• https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foun
dations_Benchmark.pdf
Sample AWS CIS Controls
© 2018 - Cloudnosys | Security, Compliance, Cost.
1. Unauthorized API calls
2. Management Console sign-in without MFA
3. Usage of “root” account
4. IAM policy changes
5. CloudTrail configuration changes
6. AWS Management Console authentication failures
7. Disabling or deletion of customer created CMKs
8. S3 bucket policy changes
9. AWS Config configuration changes
10. Security group changes
11. Changes to Network Access Control Lists (NACL)
12. Changes to network gateways
13. Route table changes
14. VPC changes
15. Ensure security contact information is registered
16. Ensure appropriate subscribers to each SNS topic
How we govern and audit S3 Bucket?
Note; 23 policies just for AWS •AWS S3 Bucket Authenticated 'FULL_CONTROL'
Access
•AWS S3 Bucket Authenticated 'READ' Access
•AWS S3 Bucket Authenticated 'READ_ACP' Access
•AWS S3 Bucket Authenticated 'WRITE' Access
•AWS S3 Bucket Authenticated 'WRITE_ACP' Access
•Enable S3 Bucket Default Encryption
•Enable Access Logging for AWS S3 Buckets
•Enable MFA Delete for AWS S3 Buckets
•S3 Bucket Public Access Via Policy
•Publicly Accessible AWS S3 Buckets
•AWS S3 Bucket Public 'READ' Access
•AWS S3 Bucket Public 'READ_ACP' Access
•AWS S3 Bucket Public 'WRITE' Access
•AWS S3 Bucket Public 'WRITE_ACP' Access
•Enable Versioning for AWS S3 Buckets
•DNS Compliant S3 Bucket Names
•Enable S3 Bucket Lifecycle Configuration
•Review S3 Buckets with Website Configuration
Enabled
•AWS S3 Unknown Cross Account Access
•Secure Transport
•Server Side Encryption
•Limit S3 Bucket Access by IP Address
https://docs.aws.amazon.com/AmazonS3/latest/dev/ex
ample-bucket-policies.html
You write these rules via API
How should we Govern VPC?
• Unused VPC Internet Gateways
• Use Managed NAT Gateway for AWS VPC
• Ineffective Network ACL DENY Rules
• Unrestricted Network ACL Inbound Traffic
• Unrestricted Network ACL Outbound Traffic
• Enable Flow Logs for VPC Subnets
• VPC Endpoint Unknown Cross Account Access
• AWS VPC Exposed Endpoints
• Enable AWS VPC Flow Logs
• AWS VPC Peering Connection Configuration
• AWS VPN Tunnel Redundancy
• AWS VPN Tunnel State
• Unused Virtual Private Gateways
• VPC Peering cross accounts
• Easy to turn on and collect
• Requires Log Correlations
• Information Latency
• Requires automation, integration & Analysis
All via APIs - Requires expert understanding
of AWS security at the component level.
Compliance as code is the new norm!
Custom Rules: Written by YOU!
You write these rules via API
Governance Model for Resources
Collection and Reporting
AWS Infra Logs and Config
Config, CloudTrail, Cloudwatch, VPC Flow
Logs
Easy
AWS Service Logs
S3 logs, RDS logs, Lambda etc.
Easy
Host Based Logs
Server logs, Audit logs, Applications etc.
Easy
Machine Meta Data and related
Configurations changes, limit reached etc.
All API based collections (Automations)
Very
Hard
Policies Output Collection
Policy Analysis for
Governance
Evidence based Governance/
Compliance Reporting -
PASS/FAIL with RISK
Ratings
All raw data but a core foundation of your compliance and security
gap reporting. It is not in a business ready usable format.
Security and Compliance Reporting for
“Governance and Security Risk Posture”
GDPR Compliance Reporting:
Date 6/20/2018
AWS Account Name: GDPR Prod
Inventory of Assets 10 EC2, 10 VPC, 20ELB, 18 S3, 12 RDS
Data Privacy By Design Article 25
Data controller is required to implement appropriate
technical and organisational measures both at the
time of determination of the means for processing
and at the time of the processing itself in order to
ensure data protection principles such as data
minimisation are met. Any such privacy by
design measures may include, for example,
pseudonymisation or other privacy-enhancing
technologies
FAIL
Access Control 100 29 129
Encryption RDS 200 32 232
Encryption S3 105 95 200
Encryption ELB - TLS 1.2 200 29 229
IAM Audit Controls 120 200 220
Summary : A quick checklist for your Cloud
Start with your Cloud native provided tools
GuardDuty, Security Center, Configuration Manager
Organizational Responsibilities
Assign a Data Protection and Security officer which will govern and benchmark the program.
Technical Responsibility and Obligations
CIS controls first then to NIST Controls- Inventory data, and implement strong
controls to maintain data privacy, build your “collection” expertise. Pay attention to DLP, Encryption, and
CIS/PCI/HIPAA equivalent controls around Cloud configuration monitoring. Audit trail management.
Implement cloud compliance automation to manage these controls and continually monitor in near real time.
Introducing…
CLOUDNOSYS
Cloud Security Governance
@ Scale
SECURITY & COMPLIANCE PLATFORM
Cloudnosys Security and Compliance Platform
CloudEye Continuously Secure your cloud services and automate
compliance. Over 150+ Cloudnosys best practice rules track and monitor
your AWS services for security and compliance violations. Dashboard and
reports keep you fully informed of any Risks. – Agentless!
• Continuous Security & Compliance Scanning
• Alert on Vulnerabilities
• Audit Reports on Security and Compliance
• Fast Remediation
• Supports GDPR, PCI-DSS, HIPPA, AWS CIS Benchmark and FISMA
mandates
© 2020 - Cloudnosys | Security, Compliance.
CloudEye Active Security Defence System
Visibility
• Asset Discovery
• Configurations
• Alerts & Drifts
• IAM Controls
Everything visible and secure
Governance
• Policy Guardrails
• Auto Enforcement
• DevSecOps Management
• Custom Policies
Accountability and control
Compliance
• PCI, HIPAA, NIST & more
• Risk Assessments
• Audit Reports
• Vulnerability & Remediation
Continuous compliance
Compliance Simplified – All Controls Mapped
Generate auditor ready compliance reports without specialized knowledge
Reporting: Compliance and Security
Security and Compliance reports shows, alerts, violations and how to
remediate these quickly to avoid any Cyber attacks. This is generated on the
fly after scanning all Cloud Services
© 2020 - Cloudnosys | Security, Compliance
Q & A - ANY QUESTIONS?
Type in your questions in chat box now…
Try Cloudnosys
For 14 Days Free
Start monitoring,
optimizing and securing
your AWS.
No Limits evaluation.
© 2020 - Cloudnosys | Security, Compliance.
info@Cloudnosys.com

More Related Content

What's hot

FinOps introduction
FinOps introductionFinOps introduction
FinOps introduction
Alexander Tokarev
 
An Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - WebinarAn Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - Webinar
Amazon Web Services
 
Disaster Recovery Options with AWS
Disaster Recovery Options with AWSDisaster Recovery Options with AWS
Disaster Recovery Options with AWS
Amazon Web Services
 
Getting started on your AWS migration journey
Getting started on your AWS migration journeyGetting started on your AWS migration journey
Getting started on your AWS migration journey
Amazon Web Services
 
Introduction to AWS Cost Management
Introduction to AWS Cost ManagementIntroduction to AWS Cost Management
Introduction to AWS Cost Management
Amazon Web Services
 
Cloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the CloudCloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the Cloud
Safe Software
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
Amazon Web Services
 
AWS Application Discovery Service
AWS Application Discovery ServiceAWS Application Discovery Service
AWS Application Discovery Service
Amazon Web Services
 
Tagging Best Practices for Cloud Governance
Tagging Best Practices for Cloud GovernanceTagging Best Practices for Cloud Governance
Tagging Best Practices for Cloud Governance
RightScale
 
Disaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWSDisaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWS
Amazon Web Services
 
Terraform on Azure
Terraform on AzureTerraform on Azure
Terraform on Azure
Mithun Shanbhag
 
Cost Optimisation on AWS
Cost Optimisation on AWSCost Optimisation on AWS
Cost Optimisation on AWS
Amazon Web Services
 
Microsoft Azure Cost Optimization and improve efficiency
Microsoft Azure Cost Optimization and improve efficiencyMicrosoft Azure Cost Optimization and improve efficiency
Microsoft Azure Cost Optimization and improve efficiency
Kushan Lahiru Perera
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
Amazon Web Services
 
Migrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with ConfidenceMigrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with Confidence
David J Rosenthal
 
Cloud ops
Cloud opsCloud ops
Cloud ops
jayaradhaa
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your Enterprise
RightScale
 
Cost optimization on AWS
Cost optimization on AWSCost optimization on AWS
Cost optimization on AWS
Amazon Web Services
 

What's hot (20)

FinOps introduction
FinOps introductionFinOps introduction
FinOps introduction
 
An Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - WebinarAn Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - Webinar
 
Cloud Migration Workshop
Cloud Migration WorkshopCloud Migration Workshop
Cloud Migration Workshop
 
Disaster Recovery Options with AWS
Disaster Recovery Options with AWSDisaster Recovery Options with AWS
Disaster Recovery Options with AWS
 
Getting started on your AWS migration journey
Getting started on your AWS migration journeyGetting started on your AWS migration journey
Getting started on your AWS migration journey
 
Introduction to AWS Cost Management
Introduction to AWS Cost ManagementIntroduction to AWS Cost Management
Introduction to AWS Cost Management
 
Terraform
TerraformTerraform
Terraform
 
Cloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the CloudCloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the Cloud
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 
AWS Application Discovery Service
AWS Application Discovery ServiceAWS Application Discovery Service
AWS Application Discovery Service
 
Tagging Best Practices for Cloud Governance
Tagging Best Practices for Cloud GovernanceTagging Best Practices for Cloud Governance
Tagging Best Practices for Cloud Governance
 
Disaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWSDisaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWS
 
Terraform on Azure
Terraform on AzureTerraform on Azure
Terraform on Azure
 
Cost Optimisation on AWS
Cost Optimisation on AWSCost Optimisation on AWS
Cost Optimisation on AWS
 
Microsoft Azure Cost Optimization and improve efficiency
Microsoft Azure Cost Optimization and improve efficiencyMicrosoft Azure Cost Optimization and improve efficiency
Microsoft Azure Cost Optimization and improve efficiency
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Migrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with ConfidenceMigrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with Confidence
 
Cloud ops
Cloud opsCloud ops
Cloud ops
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your Enterprise
 
Cost optimization on AWS
Cost optimization on AWSCost optimization on AWS
Cost optimization on AWS
 

Similar to Multi cloud governance best practices - AWS, Azure, GCP

CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
Faiza Mehar
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
Amazon Web Services
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
Amazon Web Services
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security
RightScale
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
Amazon Web Services
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
James Strong
 
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Amazon Web Services
 
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
Amazon Web Services
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
RightScale
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 
AWS Landing Zone - Architecting Security and Governance
AWS Landing Zone - Architecting Security and GovernanceAWS Landing Zone - Architecting Security and Governance
AWS Landing Zone - Architecting Security and Governance
Akesh Patil
 
Compliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesCompliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” Principles
Amazon Web Services
 
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
Amazon Web Services
 
AWS Webcast - Sumo Logic
AWS Webcast - Sumo LogicAWS Webcast - Sumo Logic
AWS Webcast - Sumo Logic
Amazon Web Services
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
Amazon Web Services
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By Design
Amazon Web Services
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Amazon Web Services
 

Similar to Multi cloud governance best practices - AWS, Azure, GCP (20)

CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
 
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
AWS Landing Zone - Architecting Security and Governance
AWS Landing Zone - Architecting Security and GovernanceAWS Landing Zone - Architecting Security and Governance
AWS Landing Zone - Architecting Security and Governance
 
Compliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesCompliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” Principles
 
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
 
AWS Webcast - Sumo Logic
AWS Webcast - Sumo LogicAWS Webcast - Sumo Logic
AWS Webcast - Sumo Logic
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS Security
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By Design
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Multi cloud governance best practices - AWS, Azure, GCP

  • 2. • Kamran Mehboob • Dir of Product Management Security & Compliance Meet Our Speakers
  • 3. What we will learn today? • What to govern in a multi cloud? • Governance best practices • Where and how to to start • CIS control for all clouds • Cloudnosys Security & Compliance Platform • Q & A
  • 4. Why even have a Multi Cloud Strategy 1. 85% of Enterprises now have Multi-Cloud Strategy for Public Clouds. McKinsey, Forrester, Gartner 2. Merger and Acquisions forcing companies to quickly develop a model to govern and effectively manage acquired company’s Cloud footprint. 3. Technology, Costs and Talent Multi-Cloud is the new norm
  • 5. Cloud COE Governance Core Focus Areas 1. Security and Compliance (Today’s session focus) 2. Financial – Cost Control (Utilization, Capacity, Reserve Instances, Tagging – FinOps.org) 3. Performance Management – (Machine Metrics, RightSizing, APM) Build : Automation, Enforcement and Self Healing Cloud
  • 6. What are the common threads to Govern security for Public Clouds at Scale? 1. Software define infrastructure controls – Core 2. Mostly process and technology automation – Very little People Governance = Configurations + Collaboration + Enforcement + Self healing
  • 7. Cloud Velocity requires Automations Cannot humanly see or govern thousands of configurations everyday and fix them! • Need compliance framework control testing • Need continuous monitoring & automation • Need DevSecOps Governance for CI/CD automation
  • 8. Security Governance for Public Clouds 1. Build a set of granular Corporate policies for Security and Compliance configurations and OS levels for all cloud services (Firewalls, Access, Encryption, IAM and more) 2. Enforcement of Policies in near time and analyzing any additions or changes to existing cloud configuration services. 3. Monitor and measure risks continually then either allow or deny services requests for out of policy actions Invest in open source and commercial tools to deliver a 360 view of all cloud assets running globally in a single pane of glass.
  • 9. Key Focus areas to reach Scale on Governance 1. Visibility - Considerable attention to Visibility and Change in your Cloud services 2. Speed - Increase speed by “continues delivery or monitor changes” Reduce human intervention 3. Self Healing – Fix the problems before they go into production and while in production fix on the fly via automation. 4. Leverage Partners and Vendors to understand what “Good” looks like. You don’t have to build it yourself
  • 10. Start here but end with a 360 view of all cloud policies and risks? AWS Azure GCP Configuration Management Config, CFT Azure Policy, Azure Security Center (ASC) Configuration Mngt, Anthos, Forseti OS Management Inspector ASC Security Command Center (SCC) (in beta) Log Management GuardDuty, WatchTower ASC StackDriver Automation - Self Healing Lambda Azure Functions GCP Functions Monitoring PII Data usage in DB Macie MS Information Protection DLP - SCC Risk Management none none none Best Practice Policies CIS CIS CIS
  • 11. How to build, manage and enforce Policies at scale in addition understand risks? 1- CIS First 2- Custom Signatures 3- Automation My budget is Zero and we have no time
  • 12. • The Center for Internet Security is a non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. • CIS AWS Benchmarks 44 AWS Controls • CIS - OS hardening & AWS Configurations • https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foun dations_Benchmark.pdf Sample AWS CIS Controls © 2018 - Cloudnosys | Security, Compliance, Cost. 1. Unauthorized API calls 2. Management Console sign-in without MFA 3. Usage of “root” account 4. IAM policy changes 5. CloudTrail configuration changes 6. AWS Management Console authentication failures 7. Disabling or deletion of customer created CMKs 8. S3 bucket policy changes 9. AWS Config configuration changes 10. Security group changes 11. Changes to Network Access Control Lists (NACL) 12. Changes to network gateways 13. Route table changes 14. VPC changes 15. Ensure security contact information is registered 16. Ensure appropriate subscribers to each SNS topic
  • 13. How we govern and audit S3 Bucket? Note; 23 policies just for AWS •AWS S3 Bucket Authenticated 'FULL_CONTROL' Access •AWS S3 Bucket Authenticated 'READ' Access •AWS S3 Bucket Authenticated 'READ_ACP' Access •AWS S3 Bucket Authenticated 'WRITE' Access •AWS S3 Bucket Authenticated 'WRITE_ACP' Access •Enable S3 Bucket Default Encryption •Enable Access Logging for AWS S3 Buckets •Enable MFA Delete for AWS S3 Buckets •S3 Bucket Public Access Via Policy •Publicly Accessible AWS S3 Buckets •AWS S3 Bucket Public 'READ' Access •AWS S3 Bucket Public 'READ_ACP' Access •AWS S3 Bucket Public 'WRITE' Access •AWS S3 Bucket Public 'WRITE_ACP' Access •Enable Versioning for AWS S3 Buckets •DNS Compliant S3 Bucket Names •Enable S3 Bucket Lifecycle Configuration •Review S3 Buckets with Website Configuration Enabled •AWS S3 Unknown Cross Account Access •Secure Transport •Server Side Encryption •Limit S3 Bucket Access by IP Address https://docs.aws.amazon.com/AmazonS3/latest/dev/ex ample-bucket-policies.html You write these rules via API
  • 14. How should we Govern VPC? • Unused VPC Internet Gateways • Use Managed NAT Gateway for AWS VPC • Ineffective Network ACL DENY Rules • Unrestricted Network ACL Inbound Traffic • Unrestricted Network ACL Outbound Traffic • Enable Flow Logs for VPC Subnets • VPC Endpoint Unknown Cross Account Access • AWS VPC Exposed Endpoints • Enable AWS VPC Flow Logs • AWS VPC Peering Connection Configuration • AWS VPN Tunnel Redundancy • AWS VPN Tunnel State • Unused Virtual Private Gateways • VPC Peering cross accounts • Easy to turn on and collect • Requires Log Correlations • Information Latency • Requires automation, integration & Analysis All via APIs - Requires expert understanding of AWS security at the component level. Compliance as code is the new norm! Custom Rules: Written by YOU! You write these rules via API
  • 15. Governance Model for Resources Collection and Reporting AWS Infra Logs and Config Config, CloudTrail, Cloudwatch, VPC Flow Logs Easy AWS Service Logs S3 logs, RDS logs, Lambda etc. Easy Host Based Logs Server logs, Audit logs, Applications etc. Easy Machine Meta Data and related Configurations changes, limit reached etc. All API based collections (Automations) Very Hard Policies Output Collection Policy Analysis for Governance Evidence based Governance/ Compliance Reporting - PASS/FAIL with RISK Ratings All raw data but a core foundation of your compliance and security gap reporting. It is not in a business ready usable format.
  • 16. Security and Compliance Reporting for “Governance and Security Risk Posture” GDPR Compliance Reporting: Date 6/20/2018 AWS Account Name: GDPR Prod Inventory of Assets 10 EC2, 10 VPC, 20ELB, 18 S3, 12 RDS Data Privacy By Design Article 25 Data controller is required to implement appropriate technical and organisational measures both at the time of determination of the means for processing and at the time of the processing itself in order to ensure data protection principles such as data minimisation are met. Any such privacy by design measures may include, for example, pseudonymisation or other privacy-enhancing technologies FAIL Access Control 100 29 129 Encryption RDS 200 32 232 Encryption S3 105 95 200 Encryption ELB - TLS 1.2 200 29 229 IAM Audit Controls 120 200 220
  • 17. Summary : A quick checklist for your Cloud Start with your Cloud native provided tools GuardDuty, Security Center, Configuration Manager Organizational Responsibilities Assign a Data Protection and Security officer which will govern and benchmark the program. Technical Responsibility and Obligations CIS controls first then to NIST Controls- Inventory data, and implement strong controls to maintain data privacy, build your “collection” expertise. Pay attention to DLP, Encryption, and CIS/PCI/HIPAA equivalent controls around Cloud configuration monitoring. Audit trail management. Implement cloud compliance automation to manage these controls and continually monitor in near real time.
  • 18. Introducing… CLOUDNOSYS Cloud Security Governance @ Scale SECURITY & COMPLIANCE PLATFORM
  • 19. Cloudnosys Security and Compliance Platform CloudEye Continuously Secure your cloud services and automate compliance. Over 150+ Cloudnosys best practice rules track and monitor your AWS services for security and compliance violations. Dashboard and reports keep you fully informed of any Risks. – Agentless! • Continuous Security & Compliance Scanning • Alert on Vulnerabilities • Audit Reports on Security and Compliance • Fast Remediation • Supports GDPR, PCI-DSS, HIPPA, AWS CIS Benchmark and FISMA mandates © 2020 - Cloudnosys | Security, Compliance.
  • 20. CloudEye Active Security Defence System Visibility • Asset Discovery • Configurations • Alerts & Drifts • IAM Controls Everything visible and secure Governance • Policy Guardrails • Auto Enforcement • DevSecOps Management • Custom Policies Accountability and control Compliance • PCI, HIPAA, NIST & more • Risk Assessments • Audit Reports • Vulnerability & Remediation Continuous compliance
  • 21. Compliance Simplified – All Controls Mapped Generate auditor ready compliance reports without specialized knowledge
  • 22.
  • 23.
  • 24.
  • 25. Reporting: Compliance and Security Security and Compliance reports shows, alerts, violations and how to remediate these quickly to avoid any Cyber attacks. This is generated on the fly after scanning all Cloud Services © 2020 - Cloudnosys | Security, Compliance
  • 26. Q & A - ANY QUESTIONS? Type in your questions in chat box now… Try Cloudnosys For 14 Days Free Start monitoring, optimizing and securing your AWS. No Limits evaluation. © 2020 - Cloudnosys | Security, Compliance. info@Cloudnosys.com

Editor's Notes

  1. Three cores areas to focus on for building Cloud COE to run at scale. These also align to well architected framework for the cloud.
  2. cloud is nothing more then lego blocks, each block has its set of controls or configurations. You need to master them, control them and monitor them for changes and perform risk management.
  3. Velocity means better have a well defined automated process, or else you will loose the cloud race and get ready for a breach.
  4. Policies are your guardrails and this is where you focus. Polices are configurations that’s all.
  5. Start with Cloud vendors tool, then try to consolidate all the data and build out an alert and reporting system. You can also look for tools that augment this like a opensource tool called Cloudcustodian.
  6. Start small and simple and then fan out as yo grow
  7. The hard part is building APIs based control and tht is where most people fail. If you don’t have time for this, then invest in a COTS products like Cloudnosys.
  8. This is what you need when someone comes to you and say we need a GDPR report on our infra. You should be able to do this in 5 min or less, if you have all the automation build out.
  9. WE mapped all the controls already and coded that to run at scale for all clouds.
  10. Summary of all your security risks
  11. A business view for compliance engineers to give them information on what is failing and where for which compliaces.
  12. Lots of security framework and compliance standards
  13. Reproting is key and also available in JSON format to feed into 3rd party GRC and SIEM system.